This work examines controller design based on feedback linearization of a nonlinear system in the presence of time delay. Various analytic constraints make it difficult to design a controller in the conventional manner for a nonlinear system with input delay. Using a input delaydependent feedback linearization algorithm, a nonlinear input delay system having a linear input-output map can be determined. In this work both the nominal and compensating parts of the system are individually handled and then combined to get a complete linear representation of the original system. A controller is designed base on Linear Quadratic regulator (LQR) theory for the linearized system to illustrate the effectiveness of the proposed method. Also sufficient conditions are mentioned which guarantee the stability of the closed loop system with input delay.
{"title":"Control of a Class of Nonlinear Systems with Input Delay Using Mean Value Theorem Approach","authors":"C. Sarkar, A. Sengupta","doi":"10.1109/CIMSIM.2013.37","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.37","url":null,"abstract":"This work examines controller design based on feedback linearization of a nonlinear system in the presence of time delay. Various analytic constraints make it difficult to design a controller in the conventional manner for a nonlinear system with input delay. Using a input delaydependent feedback linearization algorithm, a nonlinear input delay system having a linear input-output map can be determined. In this work both the nominal and compensating parts of the system are individually handled and then combined to get a complete linear representation of the original system. A controller is designed base on Linear Quadratic regulator (LQR) theory for the linearized system to illustrate the effectiveness of the proposed method. Also sufficient conditions are mentioned which guarantee the stability of the closed loop system with input delay.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125787714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this present work is to numerically estimate via neural network the scattering elastic-collision phase shift from electron hydrogen interaction. Previous works have shown reliable results using runge-kutta 4th order (RK-4). This can be achieved by solving the 2nd Order Differential Equation (ODE) that is found commonly in physical scattering problem. A number of trial functions was tested that describe the Schrodinger Equation in which solves the static field approximation of the wave equation. Results have shown comparable but inferior results relatively to the RK-4 method. It can be said that NN approach shows promise with the advantage of continuous estimation but lack the accuracy that can be produced by RK-4.
{"title":"A Neural Network (NN) Approach to Solving a Static-non-exchange Scattering of Electron-Hydrogen","authors":"Mohammad Shazri Bin Shahrir, Kurunathan Ratnavely","doi":"10.1109/CIMSIM.2013.11","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.11","url":null,"abstract":"In this present work is to numerically estimate via neural network the scattering elastic-collision phase shift from electron hydrogen interaction. Previous works have shown reliable results using runge-kutta 4th order (RK-4). This can be achieved by solving the 2nd Order Differential Equation (ODE) that is found commonly in physical scattering problem. A number of trial functions was tested that describe the Schrodinger Equation in which solves the static field approximation of the wave equation. Results have shown comparable but inferior results relatively to the RK-4 method. It can be said that NN approach shows promise with the advantage of continuous estimation but lack the accuracy that can be produced by RK-4.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of the research work is to performa predictive analysis of an adaptive and descriptive mobilehealth care system in the context of Health InsurancePortability and Accountability Act (HIPAA). This analyticalstudy has assumed a set of policies encompassing health careorganizations, service providers and the end users. Theelectronic medical records of the patients are clustered so asto fasten the detection and data extraction of records usingmobile ambience. The non-adaptive strategies, mistakes inthe earlier collaboration models and the late enforcementare the basic issues and challenges for the proposed work.The predictability analysis over the scalability of mobilehealth application with several uncertainty nature ofinsurance fraud is performed. The focus is to frame adescriptive logic for an adaptable health care system withuser expected analytics. A case study, Blood Seeker, isdesigned and deployed to substantiate the proposedanalytics over concurrency and reachability of thesystem.
{"title":"HIPAA Based Predictive Analytics for an Adaptive and Descriptive Mobile Healthcare System","authors":"C. Subramaniam, Abhishek Balaji Radhakrishnan, Vignesh Raj Somu, Harshinee Chandraskear, Janani Balasubramaniam","doi":"10.1109/CIMSIM.2013.32","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.32","url":null,"abstract":"The objective of the research work is to performa predictive analysis of an adaptive and descriptive mobilehealth care system in the context of Health InsurancePortability and Accountability Act (HIPAA). This analyticalstudy has assumed a set of policies encompassing health careorganizations, service providers and the end users. Theelectronic medical records of the patients are clustered so asto fasten the detection and data extraction of records usingmobile ambience. The non-adaptive strategies, mistakes inthe earlier collaboration models and the late enforcementare the basic issues and challenges for the proposed work.The predictability analysis over the scalability of mobilehealth application with several uncertainty nature ofinsurance fraud is performed. The focus is to frame adescriptive logic for an adaptable health care system withuser expected analytics. A case study, Blood Seeker, isdesigned and deployed to substantiate the proposedanalytics over concurrency and reachability of thesystem.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115314467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing environment to the most modern means of attacks. In this paper, we propose a new multi-factor authentication framework for cloud computing. The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system.The proposed framework is verified by developing Cloud Access Management (CAM) system which authenticates the user based on multiple factors. Also using secret-splitting and encrypted value of arithmetic captcha is innovative factor for user authentication for cloud computing environment. Prototype model for cloud computing own cloud server is implemented using open sources technology. The proposed framework shows the close agreement with the standard criteria for security.
{"title":"Multi-factor Authentication Framework for Cloud Computing","authors":"R. K. Banyal, Pragya Jain, V. K. Jain","doi":"10.1109/CIMSIM.2013.25","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.25","url":null,"abstract":"Cloud computing is a new paradigm to deliver services over the Internet. Data Security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing environment to the most modern means of attacks. In this paper, we propose a new multi-factor authentication framework for cloud computing. The proposed framework provides a feasible and a most efficient mechanism which can closely integrate with the traditional authentication system.The proposed framework is verified by developing Cloud Access Management (CAM) system which authenticates the user based on multiple factors. Also using secret-splitting and encrypted value of arithmetic captcha is innovative factor for user authentication for cloud computing environment. Prototype model for cloud computing own cloud server is implemented using open sources technology. The proposed framework shows the close agreement with the standard criteria for security.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121372708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weather forecasting has been one of the most scientifically and technologically challenging problem around the world. Weather data is one of the meteorological data that is rich with important information, which can be used for weather prediction We extract knowledge from weather historical data collected from Indian Meteorological Department (IMD) Pune. From the collected weather data comprising of 36 attributes, only 7 attributes are most relevant to rainfall prediction. We made data preprocessing and data transformation on raw weather data set, so that it shall be possible to work on Bayesian, the data mining, prediction model used for rainfall prediction. The model is trained using the training data set and has been tested for accuracy on available test data. The meteorological centers uses high performance computing and supercomputing power to run weather prediction model. To address the issue of compute intensive rainfall prediction model, we proposed and implemented data intensive model using data mining technique. Our model works with good accuracy and takes moderate compute resources to predict the rainfall. We have used Bayesian approach to prove our model for rainfall prediction, and found to be working well with good accuracy.
{"title":"Modeling Rainfall Prediction Using Data Mining Method: A Bayesian Approach","authors":"V. Nikam, Bandu B. Meshram","doi":"10.1109/CIMSIM.2013.29","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.29","url":null,"abstract":"Weather forecasting has been one of the most scientifically and technologically challenging problem around the world. Weather data is one of the meteorological data that is rich with important information, which can be used for weather prediction We extract knowledge from weather historical data collected from Indian Meteorological Department (IMD) Pune. From the collected weather data comprising of 36 attributes, only 7 attributes are most relevant to rainfall prediction. We made data preprocessing and data transformation on raw weather data set, so that it shall be possible to work on Bayesian, the data mining, prediction model used for rainfall prediction. The model is trained using the training data set and has been tested for accuracy on available test data. The meteorological centers uses high performance computing and supercomputing power to run weather prediction model. To address the issue of compute intensive rainfall prediction model, we proposed and implemented data intensive model using data mining technique. Our model works with good accuracy and takes moderate compute resources to predict the rainfall. We have used Bayesian approach to prove our model for rainfall prediction, and found to be working well with good accuracy.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116528465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multi-Constrained Path (MCP) algorithms are path finding algorithms, unlike conventional routing algorithms, they not only give a path between source and destination, also verifies whether the path satisfies the given constraints (Right turn, Left turn and U turn). MCP algorithms are NPComplete. The MCP algorithms are aimed to find the shortest path in a road network that satisfies the turn prohibitions and has many applications such as route guidance in Intelligent Transport System (ITS). In this paper, roads are considered as nodes and junctions as edges, as it reduces the amount of data to be processed. The output consists of a list of paths that can be used to reach the destination. The algorithms have be tested and analysed with the real data of Bangalore road network. The results show that the efficiency of MCP is 84.5% better than conventional routing algorithms in terms of execution time.
{"title":"Approximating Shortest Path in Large-Scale Road Networks with Turn Prohibitions Using Multi-constrained Path Algorithm","authors":"K. Girish, Sandeep Sarkar, S. Rajagopalan","doi":"10.1109/CIMSIM.2013.56","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.56","url":null,"abstract":"Multi-Constrained Path (MCP) algorithms are path finding algorithms, unlike conventional routing algorithms, they not only give a path between source and destination, also verifies whether the path satisfies the given constraints (Right turn, Left turn and U turn). MCP algorithms are NPComplete. The MCP algorithms are aimed to find the shortest path in a road network that satisfies the turn prohibitions and has many applications such as route guidance in Intelligent Transport System (ITS). In this paper, roads are considered as nodes and junctions as edges, as it reduces the amount of data to be processed. The output consists of a list of paths that can be used to reach the destination. The algorithms have be tested and analysed with the real data of Bangalore road network. The results show that the efficiency of MCP is 84.5% better than conventional routing algorithms in terms of execution time.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122907678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Saad, Mohd Zuhir Bin Hamzah, C. B. Seng, K. A. Mohamad, B. Ghosh, N. Bolong, R. Ismail
The Vertical Strained Silicon Germanium (SiGe) Impact Ionization MOSFET with Dielectric Pocket (VESIMOS-DP) has been successfully developed and analyzed in this paper. The comparison between VESIMOS and VESIMOS-DP was done to show the advantages of incorporating dielectric pocket (DP) to the performance of the device. An improved stability of threshold voltage, VTH was found for VESIMOS-DP device of various DP size ranging from 20nm to 80nm. The stability is due to the reducing charge sharing effects between source and drain region. However, the presence of DP layer has introduced another potential barrier in addition to the delta p+ (dp+) triangular potential barrier. Thus, increased amount of gate voltage needed to overcome those barriers and allows the electrons to flow from source to drain. Moreover, the DP layer has suppressed the parasitic bipolar transistor effect (PBT) with higher breakdown voltage as compared to without DP layer. Hence, the incorporation of DP into VESIMOS has enhanced its performance and presents elevated characteristics for nano-electronics device.
{"title":"Performance Analysis of Vertical Strained-SiGe Impact Ionization MOSFET Incorporating Dielectric Pocket (VESIMOS-DP)","authors":"I. Saad, Mohd Zuhir Bin Hamzah, C. B. Seng, K. A. Mohamad, B. Ghosh, N. Bolong, R. Ismail","doi":"10.1109/CIMSIM.2013.66","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.66","url":null,"abstract":"The Vertical Strained Silicon Germanium (SiGe) Impact Ionization MOSFET with Dielectric Pocket (VESIMOS-DP) has been successfully developed and analyzed in this paper. The comparison between VESIMOS and VESIMOS-DP was done to show the advantages of incorporating dielectric pocket (DP) to the performance of the device. An improved stability of threshold voltage, VTH was found for VESIMOS-DP device of various DP size ranging from 20nm to 80nm. The stability is due to the reducing charge sharing effects between source and drain region. However, the presence of DP layer has introduced another potential barrier in addition to the delta p+ (dp+) triangular potential barrier. Thus, increased amount of gate voltage needed to overcome those barriers and allows the electrons to flow from source to drain. Moreover, the DP layer has suppressed the parasitic bipolar transistor effect (PBT) with higher breakdown voltage as compared to without DP layer. Hence, the incorporation of DP into VESIMOS has enhanced its performance and presents elevated characteristics for nano-electronics device.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sitaram, Haripriya Srinivasaraghavan, Kapish Agarwal, Amritanshu Agrawal, N. Joshi, Debraj Ray
Speech recognition has been increasingly used on mobile devices, which has in turn increased the need for creation of new acoustic models for various languages, dialects, accents, speakers and environmental conditions. This involves training and adapting a huge number of acoustic models, some of them in real-time. Training acoustic models is thus essential for speech recognition because these models determine the accuracy and quality of the recognition process. This paper, discusses the use of Storm, a distributed real time computational system, to pipeline the creation of acoustic models by CMU Sphinx, an open-source software project for speech recognition and training. Software pipelining reduces the time required for training and optimizes system resource utilization, thus enabling huge amounts of data to be trained in considerably less amount of time than taken by the conventional sequential process. Pipelining is achieved by grouping the stages of the training process into a set of five stages, and running each stage on individual nodes in a Storm cluster. Thus acoustic models are created by training multiple streams of speech samples using the same SphinxTrain setup, also resulting in improvement of training time and throughput.
{"title":"Pipelining Acoustic Model Training for Speech Recognition Using Storm","authors":"D. Sitaram, Haripriya Srinivasaraghavan, Kapish Agarwal, Amritanshu Agrawal, N. Joshi, Debraj Ray","doi":"10.1109/CIMSIM.2013.42","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.42","url":null,"abstract":"Speech recognition has been increasingly used on mobile devices, which has in turn increased the need for creation of new acoustic models for various languages, dialects, accents, speakers and environmental conditions. This involves training and adapting a huge number of acoustic models, some of them in real-time. Training acoustic models is thus essential for speech recognition because these models determine the accuracy and quality of the recognition process. This paper, discusses the use of Storm, a distributed real time computational system, to pipeline the creation of acoustic models by CMU Sphinx, an open-source software project for speech recognition and training. Software pipelining reduces the time required for training and optimizes system resource utilization, thus enabling huge amounts of data to be trained in considerably less amount of time than taken by the conventional sequential process. Pipelining is achieved by grouping the stages of the training process into a set of five stages, and running each stage on individual nodes in a Storm cluster. Thus acoustic models are created by training multiple streams of speech samples using the same SphinxTrain setup, also resulting in improvement of training time and throughput.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132083908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a method for assessing the subjective classifications of traditional Chinese medicine (TCM) and investigating the influence of attributes on them, while these attributes are extracted from multi-sensors and represented by different modes. In TCM, a person's health states can be represented by 13 Zhengs that are not entirely independent, while the diagnosis data given by TCM doctors are subjective. Accordingly, the influence of the modes and the attributes extracted from the multimodal sensor data on the Zheng's classification is validated by a defined aggregation function called aas. Moreover, the conditions of removing the weak modes are proposed based on the correlation between the attributes of modes and the number of the attributes close to the Zhengs. The simulation results verify the adequacy of the above aas and conditions in evaluating the effect of attributes on the classification performance.
{"title":"Evaluating the Effect of Different Mode's Attributes on the Subjective Classification in the Case of TCM","authors":"Ying Dai","doi":"10.1109/CIMSIM.2013.35","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.35","url":null,"abstract":"This paper proposes a method for assessing the subjective classifications of traditional Chinese medicine (TCM) and investigating the influence of attributes on them, while these attributes are extracted from multi-sensors and represented by different modes. In TCM, a person's health states can be represented by 13 Zhengs that are not entirely independent, while the diagnosis data given by TCM doctors are subjective. Accordingly, the influence of the modes and the attributes extracted from the multimodal sensor data on the Zheng's classification is validated by a defined aggregation function called aas. Moreover, the conditions of removing the weak modes are proposed based on the correlation between the attributes of modes and the number of the attributes close to the Zhengs. The simulation results verify the adequacy of the above aas and conditions in evaluating the effect of attributes on the classification performance.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126150040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We define a human motion data format for providing a character model with motion so that any motion capture data can be used to generate exchangeable human animation sequences through networks of heterogeneous computer systems. We have extended the ISO/IEC 19774 H-Anim specification to include motion definition in order to meet this objective. A character model can be prepared with any general graphics tool according to the hierarchical structure defined in the extended H-Anim specification. We can provide the character model with any captured motion data using the interfaces for motion parameters defined in the extended H-Anim specification, even when the data is not relevant to the character model initially. Several kinds of motion capture data can be applied to generate animation sequences for a character model; conversely, one kind of motion capture data can be applied to several different character models. New Joint and Motion nodes are defined for animation exchange in the H-Anim specification. Schema expansion and validation are also included.
{"title":"Human Motion Data Definition for 3D Characters","authors":"Myeong-Won Lee, Chul-Hee Jung, C. Park","doi":"10.1109/CIMSIM.2013.23","DOIUrl":"https://doi.org/10.1109/CIMSIM.2013.23","url":null,"abstract":"We define a human motion data format for providing a character model with motion so that any motion capture data can be used to generate exchangeable human animation sequences through networks of heterogeneous computer systems. We have extended the ISO/IEC 19774 H-Anim specification to include motion definition in order to meet this objective. A character model can be prepared with any general graphics tool according to the hierarchical structure defined in the extended H-Anim specification. We can provide the character model with any captured motion data using the interfaces for motion parameters defined in the extended H-Anim specification, even when the data is not relevant to the character model initially. Several kinds of motion capture data can be applied to generate animation sequences for a character model; conversely, one kind of motion capture data can be applied to several different character models. New Joint and Motion nodes are defined for animation exchange in the H-Anim specification. Schema expansion and validation are also included.","PeriodicalId":249355,"journal":{"name":"2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126920528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}