首页 > 最新文献

International Journal of Computer Theory and Engineering最新文献

英文 中文
Character Analysis Scheme for Compressing Text Files 压缩文本文件的字符分析方案
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.986
S. Adewumi
achieved by taking each of these characters that makes up the text one at a time and then search first, for the position of the last occurrence of a particular character being considered for compression together with the length of its digits, and then, starting from the beginning of the text file, note all the positions where this character has occurred. The positions of occurrence of this character while the search is on, is made equal to the length of the digit of the last occurrence of the character by padding it with zeroes to the left of the most significant bit, if need be. Concatenate the values representing the positions of the occurrence of a character and covert the concatenated string into a decimal value. Divide this value successively by 2 until the result lies between one and less than two. Store the quotient obtained from these divisions and the sum of the number of times the division was carried out as an index k. Decompression is the reverse of the steps just described, and this is achieved by taking each character; obtained their corresponding quotient (q), index k and length li. To recover the decimal positions of the concatenated values, we multiply the quotient (q) by 2 k . We then use the length of this
通过每次取一个组成文本的每个字符,然后首先搜索要考虑压缩的特定字符最后出现的位置及其数字长度,然后从文本文件的开头开始,注意该字符出现的所有位置。在进行搜索时,该字符出现的位置等于该字符最后出现的数字的长度,如果需要的话,在最高有效位的左侧填充0。连接表示字符出现位置的值,并将连接的字符串转换为十进制值。将该值连续除以2,直到结果介于1和小于2之间。将除法得到的商和除法执行次数的总和存储为索引k。解压缩与刚才描述的步骤相反,这是通过取每个字符来实现的;得到了它们对应的商q、索引k和长度li。为了恢复连接值的十进制位置,我们将商(q)乘以2k。然后我们用它的长度
{"title":"Character Analysis Scheme for Compressing Text Files","authors":"S. Adewumi","doi":"10.7763/IJCTE.2015.V7.986","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.986","url":null,"abstract":"achieved by taking each of these characters that makes up the text one at a time and then search first, for the position of the last occurrence of a particular character being considered for compression together with the length of its digits, and then, starting from the beginning of the text file, note all the positions where this character has occurred. The positions of occurrence of this character while the search is on, is made equal to the length of the digit of the last occurrence of the character by padding it with zeroes to the left of the most significant bit, if need be. Concatenate the values representing the positions of the occurrence of a character and covert the concatenated string into a decimal value. Divide this value successively by 2 until the result lies between one and less than two. Store the quotient obtained from these divisions and the sum of the number of times the division was carried out as an index k. Decompression is the reverse of the steps just described, and this is achieved by taking each character; obtained their corresponding quotient (q), index k and length li. To recover the decimal positions of the concatenated values, we multiply the quotient (q) by 2 k . We then use the length of this","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mammographic Image Enhancement Based on SWT and High Boost Filtering 基于SWT和高升压滤波的乳房x线图像增强
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.988
P. S. A. Devi, M. G. Mini
—A Mammogram is a competent tool in early detection of breast cancer. Image enhancement in mammographic images increases the diagnosability of abnormalities in the images. The classical image enhancement techniques are not adept to improve the diagnostic features in mammograms. The enhancement technique proposed in this paper utilizes Stationary Wavelet Transform (SWT), modulus maxima and high boost filtering. The image is decomposed using SWT and its modulus maximum is determined. A fraction of the high pass filtered image obtained as the result of SWT decomposition and modulus maxima is added to original image. The scheme is evaluated visually and objectively using measures like contrast, PSNR etc. The performance measures are evaluated for different category of images and found to be suitable to all categories of mammographic images.
乳房x光检查是早期发现乳腺癌的有效工具。乳房x线摄影图像的图像增强增加了图像中异常的可诊断性。传统的图像增强技术不能很好地改善乳房x光检查的诊断特征。本文提出的增强技术利用平稳小波变换、模极大值和高升压滤波。利用SWT对图像进行分解,确定其模极大值。将经SWT分解和模极大值处理得到的高通滤波图像的一部分加到原始图像中。使用对比度、PSNR等指标对方案进行直观、客观的评价。性能措施进行了评估不同类别的图像,发现是适合所有类别的乳房x线摄影图像。
{"title":"Mammographic Image Enhancement Based on SWT and High Boost Filtering","authors":"P. S. A. Devi, M. G. Mini","doi":"10.7763/IJCTE.2015.V7.988","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.988","url":null,"abstract":"—A Mammogram is a competent tool in early detection of breast cancer. Image enhancement in mammographic images increases the diagnosability of abnormalities in the images. The classical image enhancement techniques are not adept to improve the diagnostic features in mammograms. The enhancement technique proposed in this paper utilizes Stationary Wavelet Transform (SWT), modulus maxima and high boost filtering. The image is decomposed using SWT and its modulus maximum is determined. A fraction of the high pass filtered image obtained as the result of SWT decomposition and modulus maxima is added to original image. The scheme is evaluated visually and objectively using measures like contrast, PSNR etc. The performance measures are evaluated for different category of images and found to be suitable to all categories of mammographic images.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122576003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Application of Adaptive LMF Quadratic and Cubic Volterra Filters to ECG Signals 自适应LMF二次和三次Volterra滤波器在心电信号中的应用
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.982
W. Zgallai
{"title":"The Application of Adaptive LMF Quadratic and Cubic Volterra Filters to ECG Signals","authors":"W. Zgallai","doi":"10.7763/IJCTE.2015.V7.982","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.982","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130527654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Novel Prediction Error Based Reversible Data Hiding Method Using Histogram Shifting 基于直方图移位的预测误差可逆数据隐藏新方法
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.981
Ting Luo, G. Jiang, Mei Yu, W. Gao
—Reversible data hiding can recover the original image from the marked image without any distortion. This paper presents a novel prediction error based reversible data hiding method using histogram shifting in spatial domain. Three predictors including Mean, JPEG lossless and median edge detector (MED) are employed to compute prediction values for current pixels, respectively. Prediction errors are calculated as well to build histogram bins. Histogram shifting mechanism is designed that bins with large prediction errors are shifted based on hiding level, and thus, it will not hurt marked image if hiding level is not high. Histogram bins with small error predictions are used to hide secret data. Experimental results demonstrate that average of prediction error is less than that of interpolation error used in existing data hiding methods, and the proposed method is good at high capacity hiding. MED is the best predictor among three predictors in the proposed method, and it outperforms existing data hiding methods in terms of capacity and marked image quality.
-可逆数据隐藏可以从标记的图像中恢复原始图像,没有任何失真。提出了一种利用空间直方图移位的基于预测误差的可逆数据隐藏方法。采用Mean、JPEG无损和中值边缘检测器(MED)三种预测方法分别计算当前像素的预测值。同时计算预测误差以构建直方图箱。设计了直方图移位机制,根据隐藏水平对预测误差较大的bin进行移位,从而在隐藏水平不高的情况下不会对标记图像造成伤害。具有小误差预测的直方图箱用于隐藏秘密数据。实验结果表明,该方法预测误差的平均值小于现有数据隐藏方法的插值误差平均值,具有良好的大容量隐藏性能。在本文提出的三种预测方法中,MED是最好的预测器,在容量和标记图像质量方面优于现有的数据隐藏方法。
{"title":"Novel Prediction Error Based Reversible Data Hiding Method Using Histogram Shifting","authors":"Ting Luo, G. Jiang, Mei Yu, W. Gao","doi":"10.7763/IJCTE.2015.V7.981","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.981","url":null,"abstract":"—Reversible data hiding can recover the original image from the marked image without any distortion. This paper presents a novel prediction error based reversible data hiding method using histogram shifting in spatial domain. Three predictors including Mean, JPEG lossless and median edge detector (MED) are employed to compute prediction values for current pixels, respectively. Prediction errors are calculated as well to build histogram bins. Histogram shifting mechanism is designed that bins with large prediction errors are shifted based on hiding level, and thus, it will not hurt marked image if hiding level is not high. Histogram bins with small error predictions are used to hide secret data. Experimental results demonstrate that average of prediction error is less than that of interpolation error used in existing data hiding methods, and the proposed method is good at high capacity hiding. MED is the best predictor among three predictors in the proposed method, and it outperforms existing data hiding methods in terms of capacity and marked image quality.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131752289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance Investigations of Routing Protocols in Vanet under IPv4 and IPv6 基于IPv4和IPv6的Vanet路由协议性能研究
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.990
M. Otmani, Fihri Mohammed, Ezzati Abdellah
{"title":"Performance Investigations of Routing Protocols in Vanet under IPv4 and IPv6","authors":"M. Otmani, Fihri Mohammed, Ezzati Abdellah","doi":"10.7763/IJCTE.2015.V7.990","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.990","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134172343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assistive Tools towards Personal Learning Environment in Higher Education 高等教育中个人学习环境的辅助工具
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.993
N. M. Tuah, Dg. Senandong Ajor, N. Jamil
This study explores the tools and materials used in personal learning environment (PLE) by investigating the impact of embedding a mashup technology into learning environment. With Web 2.0 technologies, mashing up several materials into learning repository helps learners to form their own scope of learning. A PLE mashup model is suggested in determining suitable tools and materials. Based on the current trends in Web 2.0, another aspect of PLE that could be further investigated is the adoption of social media application for formal higher education level. A study on student perception shows a positive acceptance towards PLE in their learning activities. In order to serve as learning tool, how the technology could be implemented, and its limitation towards efficiency was highlighted.
本研究通过调查将mashup技术嵌入学习环境的影响,探讨了个人学习环境(PLE)中使用的工具和材料。借助Web 2.0技术,将多个材料混合到学习库中可以帮助学习者形成自己的学习范围。在确定合适的工具和材料时,建议使用PLE混搭模型。基于当前Web 2.0的趋势,可以进一步研究的另一个方面是在正规高等教育中采用社交媒体应用。一项关于学生感知的研究表明,他们在学习活动中积极接受PLE。为了作为学习工具,强调了该技术的实施方式及其在效率方面的局限性。
{"title":"Assistive Tools towards Personal Learning Environment in Higher Education","authors":"N. M. Tuah, Dg. Senandong Ajor, N. Jamil","doi":"10.7763/IJCTE.2015.V7.993","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.993","url":null,"abstract":"This study explores the tools and materials used in personal learning environment (PLE) by investigating the impact of embedding a mashup technology into learning environment. With Web 2.0 technologies, mashing up several materials into learning repository helps learners to form their own scope of learning. A PLE mashup model is suggested in determining suitable tools and materials. Based on the current trends in Web 2.0, another aspect of PLE that could be further investigated is the adoption of social media application for formal higher education level. A study on student perception shows a positive acceptance towards PLE in their learning activities. In order to serve as learning tool, how the technology could be implemented, and its limitation towards efficiency was highlighted.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134237594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development Method for Shariah Compliant e-Commerce Payment Processing 符合伊斯兰教法的电子商务支付处理的开发方法
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.995
T. Amboala, Ainnur Hafizah Anuar Mokhtar, M. Muhammad, M. Noordin, R. Othman
The article is a response to rapid uptake of online transactions that encompasses the secure transactions that comply with the Shariah principles. The algorithm in the articles proposed the inclusion of Intermediate Shariah Transaction Party (ISTP) as an intermediary for communications between merchant and customers before the transactions can be concluded. The design facilitates the efficient and effective e-commerce transaction process to alleviate three common shortcomings in e-commerce transactions namely riba’, gharar and the validity and the legality of e-commerce transactions from Shariah point of view without compromising the security aspects of the transactions. The designs were refined and presented before by the Islamic scholars before the final design was agreed on. This invention will become a major breakthrough in Shariah compliance ecommerce transactions in order to serve 2.1 billion Muslims Ummah worldwide.
这篇文章是对在线交易快速发展的回应,它包含了符合伊斯兰教法原则的安全交易。文章中的算法提议将中间伊斯兰交易方(Intermediate Shariah Transaction Party, ISTP)作为商家和客户之间的中介,在交易完成之前进行沟通。该设计促进了电子商务交易过程的高效和有效,以减轻电子商务交易的三个常见缺点,即riba ', gharar,以及从伊斯兰教法的角度来看,电子商务交易的有效性和合法性,而不会损害交易的安全方面。在最终的设计得到认可之前,伊斯兰学者们对这些设计进行了改进和展示。这项发明将成为伊斯兰教法合规电子商务交易的重大突破,以服务全球21亿穆斯林。
{"title":"Development Method for Shariah Compliant e-Commerce Payment Processing","authors":"T. Amboala, Ainnur Hafizah Anuar Mokhtar, M. Muhammad, M. Noordin, R. Othman","doi":"10.7763/IJCTE.2015.V7.995","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.995","url":null,"abstract":"The article is a response to rapid uptake of online transactions that encompasses the secure transactions that comply with the Shariah principles. The algorithm in the articles proposed the inclusion of Intermediate Shariah Transaction Party (ISTP) as an intermediary for communications between merchant and customers before the transactions can be concluded. The design facilitates the efficient and effective e-commerce transaction process to alleviate three common shortcomings in e-commerce transactions namely riba’, gharar and the validity and the legality of e-commerce transactions from Shariah point of view without compromising the security aspects of the transactions. The designs were refined and presented before by the Islamic scholars before the final design was agreed on. This invention will become a major breakthrough in Shariah compliance ecommerce transactions in order to serve 2.1 billion Muslims Ummah worldwide.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"45 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114906441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance Comparison of the Kalman Filter Variants for Dynamic Mobile Localization in Urban Area Using Cellular Network 基于蜂窝网络的城市动态移动定位卡尔曼滤波器的性能比较
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.985
N. Bouzera, N. Mezhoud, A. Khireddine, M. Oussalah
{"title":"Performance Comparison of the Kalman Filter Variants for Dynamic Mobile Localization in Urban Area Using Cellular Network","authors":"N. Bouzera, N. Mezhoud, A. Khireddine, M. Oussalah","doi":"10.7763/IJCTE.2015.V7.985","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.985","url":null,"abstract":"","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extended Object Tracking and Stream Control Model Based on Predictive Evaluation Metric of Multiple-Angled Streams 基于多角度流预测评价度量的扩展目标跟踪与流控制模型
Pub Date : 2015-10-01 DOI: 10.7763/IJCTE.2015.V7.983
D. Cymbalák, O. Kainz, F. Jakab
Paper describes the design of extended model for tracking and locating object in multi-cameras environment with controlling the streams from multiple angles in real time. Proposed and experimentally implemented solution is attempting to deliver via streaming technology of the only specific shot from scene that has the best view on tracked object in real time. Measurement of the best shot for the tracking object is based on proposed evaluation metric, consisting of dimensional, locational and reliability parameters gathered from object tracking methods. For latency optimization and accuracy of evaluation the prediction of evaluation metric was outlined. Solution is experimentally tested in standard and mobile environment as well. Approach described in this paper is innovative regarding the content related video stream delivery.
本文介绍了多摄像机环境下目标跟踪定位扩展模型的设计,实现了多角度流的实时控制。提出和实验实施的解决方案是试图通过流媒体技术提供场景中唯一的特定镜头,以实时显示跟踪对象的最佳视图。跟踪目标的最佳射击测量基于所提出的评价指标,该指标由从目标跟踪方法中收集的尺寸、位置和可靠性参数组成。为了优化评估的延迟和准确性,概述了评估指标的预测。并在标准环境和移动环境下对该方案进行了实验测试。本文所描述的方法在与内容相关的视频流传输方面具有创新性。
{"title":"Extended Object Tracking and Stream Control Model Based on Predictive Evaluation Metric of Multiple-Angled Streams","authors":"D. Cymbalák, O. Kainz, F. Jakab","doi":"10.7763/IJCTE.2015.V7.983","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.983","url":null,"abstract":"Paper describes the design of extended model for tracking and locating object in multi-cameras environment with controlling the streams from multiple angles in real time. Proposed and experimentally implemented solution is attempting to deliver via streaming technology of the only specific shot from scene that has the best view on tracked object in real time. Measurement of the best shot for the tracking object is based on proposed evaluation metric, consisting of dimensional, locational and reliability parameters gathered from object tracking methods. For latency optimization and accuracy of evaluation the prediction of evaluation metric was outlined. Solution is experimentally tested in standard and mobile environment as well. Approach described in this paper is innovative regarding the content related video stream delivery.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intuitive Projection Display System Supporting the Manipulation of Dual Laser Pens 支持双激光笔操作的直观投影显示系统
Pub Date : 2015-08-01 DOI: 10.7763/IJCTE.2015.V7.979
Ching-Sheng Wang, Ding-Jung Chiang, Chien-Liang Chen, Hsin-Chueh Chen
The combined use of computers and projectors in delivering multimedia presentations and in teaching is very common. However, the common operating tools used to deliver presentations such as presentation pens or mice either have limited manipulation functionality or are less convenient, and it is difficult to perform functions such as zooming, rotating images, and writing. In addition to allowing users to move freely in space to remotely perform functions, the laser pen manipulation system proposed in this paper can also perform the writing functions of a laser pen. Moreover, the system can also support the simultaneous use of two laser pens to realize a touch mode similar to that of a tablet computer, thus achieving an intuitive projection display manipulation experience.
在多媒体演示和教学中结合使用电脑和投影仪是很常见的。然而,用于演示文稿的常用操作工具,如演示笔或鼠标,要么操作功能有限,要么不太方便,而且难以执行缩放、旋转图像和书写等功能。本文提出的激光笔操作系统除了允许用户在空间上自由移动远程执行功能外,还可以执行激光笔的书写功能。此外,系统还可以支持两支激光笔同时使用,实现类似平板电脑的触摸模式,从而实现直观的投影显示操作体验。
{"title":"Intuitive Projection Display System Supporting the Manipulation of Dual Laser Pens","authors":"Ching-Sheng Wang, Ding-Jung Chiang, Chien-Liang Chen, Hsin-Chueh Chen","doi":"10.7763/IJCTE.2015.V7.979","DOIUrl":"https://doi.org/10.7763/IJCTE.2015.V7.979","url":null,"abstract":"The combined use of computers and projectors in delivering multimedia presentations and in teaching is very common. However, the common operating tools used to deliver presentations such as presentation pens or mice either have limited manipulation functionality or are less convenient, and it is difficult to perform functions such as zooming, rotating images, and writing. In addition to allowing users to move freely in space to remotely perform functions, the laser pen manipulation system proposed in this paper can also perform the writing functions of a laser pen. Moreover, the system can also support the simultaneous use of two laser pens to realize a touch mode similar to that of a tablet computer, thus achieving an intuitive projection display manipulation experience.","PeriodicalId":306280,"journal":{"name":"International Journal of Computer Theory and Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Theory and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1