Pub Date : 2021-04-01DOI: 10.1109/CTMCD53128.2021.00058
Haoran Wang, Jing Shen, Ran Zhang, Haoen He, Yuanqiang Song, Zhuo Shi
In the fast-paced social environment, the public work stress, fast pace of life, increased mental and physical burden. Most people often neglect their mental and physical health while focusing on their physical condition. The purpose of this project is to promote and cultivate public awareness of health management. This project is mainly divided into three parts. Health data synchronization application is used to obtain the physical conditions that cannot be perceived by sensors and provide psychological test questionnaires. The data measurement application is mainly used to receive the user’s health data, step number, and location information sent by the hardware, and then carry out step number screening and send the information to the health data synchronization application. The hardware part takes STM32 MCU as the core and drives various sensors(like heart rate and blood oxygen module) to realize the collection of various physiological information. By increasing the frequency of data collection, this project improves the accuracy of information collection and achieves the purpose of rapid detection of user status changes. This project records the user’s physical condition and monitors the user’s mental health condition, thus realizing the user’s health’s multi-directional monitoring.
{"title":"A smart health data acquisition mobile application based on heart rate and blood oxygen module","authors":"Haoran Wang, Jing Shen, Ran Zhang, Haoen He, Yuanqiang Song, Zhuo Shi","doi":"10.1109/CTMCD53128.2021.00058","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00058","url":null,"abstract":"In the fast-paced social environment, the public work stress, fast pace of life, increased mental and physical burden. Most people often neglect their mental and physical health while focusing on their physical condition. The purpose of this project is to promote and cultivate public awareness of health management. This project is mainly divided into three parts. Health data synchronization application is used to obtain the physical conditions that cannot be perceived by sensors and provide psychological test questionnaires. The data measurement application is mainly used to receive the user’s health data, step number, and location information sent by the hardware, and then carry out step number screening and send the information to the health data synchronization application. The hardware part takes STM32 MCU as the core and drives various sensors(like heart rate and blood oxygen module) to realize the collection of various physiological information. By increasing the frequency of data collection, this project improves the accuracy of information collection and achieves the purpose of rapid detection of user status changes. This project records the user’s physical condition and monitors the user’s mental health condition, thus realizing the user’s health’s multi-directional monitoring.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CTMCD53128.2021.00042
Tang Zecheng, Wen Xinyuan, Yang Hongli, Zuo Yansong
Until now, image forgery has caused great harm in many aspects, such as certificate falsification, fake news, Internet rumors. As a result, the algorithm for image forensics is of great importance. Existing image forensics algorithms are mature in image forgery detection. Nevertheless, there is still room for improvement when it comes to image forgery localization. This paper modified and migrated U2-Net to image forensics, and conducted several experiments to demonstrate the effectiveness of U2-Net in contrast to ManTra-Net. The experimental results demonstrate that U2-Net is not only capable of image forgery detection but also image forgery localization and that in some cases U2-Net is even more powerful than ManTra-Net in image forgery localization.
{"title":"U2-Net for Image Forgery Detection and Localization","authors":"Tang Zecheng, Wen Xinyuan, Yang Hongli, Zuo Yansong","doi":"10.1109/CTMCD53128.2021.00042","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00042","url":null,"abstract":"Until now, image forgery has caused great harm in many aspects, such as certificate falsification, fake news, Internet rumors. As a result, the algorithm for image forensics is of great importance. Existing image forensics algorithms are mature in image forgery detection. Nevertheless, there is still room for improvement when it comes to image forgery localization. This paper modified and migrated U2-Net to image forensics, and conducted several experiments to demonstrate the effectiveness of U2-Net in contrast to ManTra-Net. The experimental results demonstrate that U2-Net is not only capable of image forgery detection but also image forgery localization and that in some cases U2-Net is even more powerful than ManTra-Net in image forgery localization.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CTMCD53128.2021.00055
Zhang Mingzhu
To systematically understand the global characteristics of "User-Centered Design" (UCD) research in the international scope, and explore the research hotspots and future frontier trends of user-centered design. Taking the data of the core collection of Web of Science as the analysis sample, VOSviewer is used to generate a visual knowledge map of the content of the research topic, such as the amount of literature published, cooperation between countries and organizations, keywords, core authors, which is combined with relevant parameters for comprehensive analysis and interpretation. The results showed that the yield of literature in the search area increased year by year. The literature output of developed countries such as North America and Northern Europe is at the forefront in this field. The current situation of institutional cooperation shows that the research cooperation within the region is close and the cross-region is relatively scattered. Keyword clustering presents four research hotspots, which are digital health, user experience, and usability, human-computer interaction, and user involvement. Clustering presents a transition from the traditional focus on the product itself to the focus on people and constitutes a closed-loop flow of the UCD design method.
系统了解国际范围内“以用户为中心的设计”(User-Centered Design, UCD)研究的全球特征,探索以用户为中心设计的研究热点和未来前沿趋势。以Web of Science核心馆藏数据为分析样本,利用VOSviewer生成研究课题内容的可视化知识图谱,如文献发表量、国家与组织合作、关键词、核心作者等,并结合相关参数进行综合分析和解读。结果表明,检索区文献产量呈逐年上升趋势。北美、北欧等发达国家的文献输出在这一领域走在前列。从机构合作的现状来看,区域内的研究合作较为紧密,跨区域的研究合作相对分散。关键词聚类呈现出数字健康、用户体验与可用性、人机交互和用户参与四个研究热点。聚类实现了从传统的以产品本身为中心到以人为中心的转变,构成了UCD设计方法的闭环流程。
{"title":"Visual analysis of \"UCD\" based on bibliometrics","authors":"Zhang Mingzhu","doi":"10.1109/CTMCD53128.2021.00055","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00055","url":null,"abstract":"To systematically understand the global characteristics of \"User-Centered Design\" (UCD) research in the international scope, and explore the research hotspots and future frontier trends of user-centered design. Taking the data of the core collection of Web of Science as the analysis sample, VOSviewer is used to generate a visual knowledge map of the content of the research topic, such as the amount of literature published, cooperation between countries and organizations, keywords, core authors, which is combined with relevant parameters for comprehensive analysis and interpretation. The results showed that the yield of literature in the search area increased year by year. The literature output of developed countries such as North America and Northern Europe is at the forefront in this field. The current situation of institutional cooperation shows that the research cooperation within the region is close and the cross-region is relatively scattered. Keyword clustering presents four research hotspots, which are digital health, user experience, and usability, human-computer interaction, and user involvement. Clustering presents a transition from the traditional focus on the product itself to the focus on people and constitutes a closed-loop flow of the UCD design method.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"189 s654","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132226790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CTMCD53128.2021.00068
Lin Zhu
Thangka is a unique Chinese art form and a pictorial representation of Tibetan culture and spirit. The development of digitalization is driving a wave of technology-oriented cultural redesign. This paper analyzes the current situation of thangka design and explores the path of redesigning thangka by digital means through rethinking and understanding the concept of redesign, giving full play to the advantages of digital acquisition, design and dissemination, breaking through the limitations of space and time, and providing a new way of thinking for the research and redesign of thangka cultural conservation in the context of digitalization.
{"title":"A Study on the Path of Thangka Redesign in the Context of Digitalization","authors":"Lin Zhu","doi":"10.1109/CTMCD53128.2021.00068","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00068","url":null,"abstract":"Thangka is a unique Chinese art form and a pictorial representation of Tibetan culture and spirit. The development of digitalization is driving a wave of technology-oriented cultural redesign. This paper analyzes the current situation of thangka design and explores the path of redesigning thangka by digital means through rethinking and understanding the concept of redesign, giving full play to the advantages of digital acquisition, design and dissemination, breaking through the limitations of space and time, and providing a new way of thinking for the research and redesign of thangka cultural conservation in the context of digitalization.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CTMCD53128.2021.00073
Jing Liu
The application of digital hand-drawn illustrations in the commercial poster industry has become more and more extensive. Strengthening the digital hand-drawn illustrations and digital aesthetic effects of Chinese commercial posters is a necessary move to optimize the quality of hand-drawn illustrations. In the development of China’s commercial posters, we must pay full attention to the important guiding role of digital technology hand-painted illustration effects in the creation and processing of hand-painted illustrations, and promote the development of commercial poster digital aesthetics in the direction of standardization, diversification and effectiveness. In order to maximize the effects and results of hand-drawn illustrations of commercial poster digital technology, we should base ourselves on the goal of commercial poster creation process control and digital aesthetics. We should pay more attention to the scientific control of the digital development trend of commercial posters, promote the maturity of the commercial poster industry, and realize the soundness and perfection of hand-painted illustrations and software in the new era of digital technology. This article first discusses the current development status of digital hand-drawn illustrations for commercial posters. Secondly, the author pointed out some of the problems of single content, efficiency of drawing, and boring style of painting. Finally, the author puts forward a strategy to improve the effect of digital hand-drawn illustrations of commercial posters, and continuously optimizes the quality of economic works of creative units in practice.
{"title":"Application of Digital Technology Hand-drawn Illustrations in Commercial Posters","authors":"Jing Liu","doi":"10.1109/CTMCD53128.2021.00073","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00073","url":null,"abstract":"The application of digital hand-drawn illustrations in the commercial poster industry has become more and more extensive. Strengthening the digital hand-drawn illustrations and digital aesthetic effects of Chinese commercial posters is a necessary move to optimize the quality of hand-drawn illustrations. In the development of China’s commercial posters, we must pay full attention to the important guiding role of digital technology hand-painted illustration effects in the creation and processing of hand-painted illustrations, and promote the development of commercial poster digital aesthetics in the direction of standardization, diversification and effectiveness. In order to maximize the effects and results of hand-drawn illustrations of commercial poster digital technology, we should base ourselves on the goal of commercial poster creation process control and digital aesthetics. We should pay more attention to the scientific control of the digital development trend of commercial posters, promote the maturity of the commercial poster industry, and realize the soundness and perfection of hand-painted illustrations and software in the new era of digital technology. This article first discusses the current development status of digital hand-drawn illustrations for commercial posters. Secondly, the author pointed out some of the problems of single content, efficiency of drawing, and boring style of painting. Finally, the author puts forward a strategy to improve the effect of digital hand-drawn illustrations of commercial posters, and continuously optimizes the quality of economic works of creative units in practice.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123206127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CTMCD53128.2021.00011
Yu Yang, Lei Sun, Xiuqing Mao, Leyu Dai, Song Guo, Peiyuan Liu
Traditional Generative Adversarial Networks (GAN) simulates the correlation between different regions through multiple convolution, but correlation between long-distance is relatively small, resulting in unclear details of generated images. To solve this problem, we propose a model based on dual attention mechanism which called DA-GAN. The self-attention mechanism can extract the dependency effectively between the local and global features of images, allowing the network to learn the connections purposefully between the features, thereby generating higher quality images. The channel-attention mechanism obtains the importance degree of each feature’s channel automatically, and improves useful features and suppresses the features that are not useful for the current task according to the importance degree, so as to calculate resources more efficiently. Experiments demonstrate that our method achieves better performance than other method on the CelebA dataset and can produce higher-quality images.
{"title":"Using Generative Adversarial Networks Based on Dual Attention Mechanism to Generate Face Images","authors":"Yu Yang, Lei Sun, Xiuqing Mao, Leyu Dai, Song Guo, Peiyuan Liu","doi":"10.1109/CTMCD53128.2021.00011","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00011","url":null,"abstract":"Traditional Generative Adversarial Networks (GAN) simulates the correlation between different regions through multiple convolution, but correlation between long-distance is relatively small, resulting in unclear details of generated images. To solve this problem, we propose a model based on dual attention mechanism which called DA-GAN. The self-attention mechanism can extract the dependency effectively between the local and global features of images, allowing the network to learn the connections purposefully between the features, thereby generating higher quality images. The channel-attention mechanism obtains the importance degree of each feature’s channel automatically, and improves useful features and suppresses the features that are not useful for the current task according to the importance degree, so as to calculate resources more efficiently. Experiments demonstrate that our method achieves better performance than other method on the CelebA dataset and can produce higher-quality images.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123318464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of mobile communication technology, we have now entered the 5G era. At the same time, vertical industries have also made new developments in 5G. Compared with ordinary users, users in vertical industries have more security requirements for their services. While vertical industries are developing in a more digital and networked direction, traditional authentication methods such as VPDN cannot satisfy the new security requirements, which brings greater challenges to the security of vertical industries. In order to satisfy the more security requirements of vertical industries, endogenous secondary authentication is introduced in the 5G network architecture, and the Extensible Authentication Protocol (EAP) is used to satisfy the different security requirements of vertical industries. This paper analyzes three kinds of secondary authentication methods based on the status quo and technological development trends of vertical industries, and proposes a 5G secondary authentication scheme based on 3GPP protocol standards. We use OpenAirInterface (OAI) to build a mobile communication network experimental platform, and realize the secondary authentication between users and authentication servers based on the EAP-TLS protocol by modifying the function of the network element. Experiment results demonstrate that our scheme has high security and reliability. It can provide a reference for the vertical industry to deploy secondary authentication in 5G.
{"title":"5G Secondary Authentication based on EAP-TLS Protocol","authors":"Qianfang Hao, Lei Sun, Songhui Guo, Ruiyu Dou, Haidong Liu, Dazan Qian","doi":"10.1109/CTMCD53128.2021.00070","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00070","url":null,"abstract":"With the development of mobile communication technology, we have now entered the 5G era. At the same time, vertical industries have also made new developments in 5G. Compared with ordinary users, users in vertical industries have more security requirements for their services. While vertical industries are developing in a more digital and networked direction, traditional authentication methods such as VPDN cannot satisfy the new security requirements, which brings greater challenges to the security of vertical industries. In order to satisfy the more security requirements of vertical industries, endogenous secondary authentication is introduced in the 5G network architecture, and the Extensible Authentication Protocol (EAP) is used to satisfy the different security requirements of vertical industries. This paper analyzes three kinds of secondary authentication methods based on the status quo and technological development trends of vertical industries, and proposes a 5G secondary authentication scheme based on 3GPP protocol standards. We use OpenAirInterface (OAI) to build a mobile communication network experimental platform, and realize the secondary authentication between users and authentication servers based on the EAP-TLS protocol by modifying the function of the network element. Experiment results demonstrate that our scheme has high security and reliability. It can provide a reference for the vertical industry to deploy secondary authentication in 5G.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129216125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-01DOI: 10.1109/CTMCD53128.2021.00064
Minglan Su, Chaoying Zhang, Yingbei Tong, Baolin Liang, Sicong Ma, Jianxiu Wang
In recent years, in order to continuously promote the construction of a safe city, intelligent monitoring equipment has been widely used throughout the country. In the field of intelligent image analysis, behavioral intelligence analysis has received more and more attention. At present, behavior analysis methods focus on detecting simple actions, such as walking, jogging, or jumping; while there is less research on fighting or violent behaviors with complex actions. However, the effective intelligent analysis of violence in video surveillance is essential to maintaining social stability and protecting people's lives and property. Therefore, we summarize the latest methods of violence detection in existing video sequences.
{"title":"Deep Learning in Video Violence Detection","authors":"Minglan Su, Chaoying Zhang, Yingbei Tong, Baolin Liang, Sicong Ma, Jianxiu Wang","doi":"10.1109/CTMCD53128.2021.00064","DOIUrl":"https://doi.org/10.1109/CTMCD53128.2021.00064","url":null,"abstract":"In recent years, in order to continuously promote the construction of a safe city, intelligent monitoring equipment has been widely used throughout the country. In the field of intelligent image analysis, behavioral intelligence analysis has received more and more attention. At present, behavior analysis methods focus on detecting simple actions, such as walking, jogging, or jumping; while there is less research on fighting or violent behaviors with complex actions. However, the effective intelligent analysis of violence in video surveillance is essential to maintaining social stability and protecting people's lives and property. Therefore, we summarize the latest methods of violence detection in existing video sequences.","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ctmcd53128.2021.00005
{"title":"CTMCD 2021 Preface","authors":"","doi":"10.1109/ctmcd53128.2021.00005","DOIUrl":"https://doi.org/10.1109/ctmcd53128.2021.00005","url":null,"abstract":"","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ctmcd53128.2021.00006
{"title":"CTMCD 2021 Organizing Committees","authors":"","doi":"10.1109/ctmcd53128.2021.00006","DOIUrl":"https://doi.org/10.1109/ctmcd53128.2021.00006","url":null,"abstract":"","PeriodicalId":298084,"journal":{"name":"2021 International Conference on Computer Technology and Media Convergence Design (CTMCD)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129974487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}