In this paper an algorithm of median filtering based on selected point is introduced, and it improved the obscured phenomenon of the median filtering image. The algorithm based on the notion of pixel tags, find the contaminated pixels in the sub-image area. And median filter the pixels only. Experimental results show that the effect of the filtered image is ideal, and it has the advantages of faster processing and little damage on the image.
{"title":"A Median Filtering Algorithm Based on Selected Point in Digital Image","authors":"Yan Liang, Yan Gao","doi":"10.1109/ISCC-C.2013.18","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.18","url":null,"abstract":"In this paper an algorithm of median filtering based on selected point is introduced, and it improved the obscured phenomenon of the median filtering image. The algorithm based on the notion of pixel tags, find the contaminated pixels in the sub-image area. And median filter the pixels only. Experimental results show that the effect of the filtered image is ideal, and it has the advantages of faster processing and little damage on the image.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128724726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pan, Bobo Pang, C. Li, Deqiang Wang, Donglong Min, De-peng Zhao
According to the issues encountered by traditional web chart technologies, the paper, following the boom of HTML5, did a research into web mapping of vector nautical charts based on HTML5. The research mainly includes: 1) System architecture for the HTML5 based web chart application, in which HTML5, CSS and Javascript are used to build and style the client Web chart pages, and Node. Js is used to construct the server-side to provide both HTTP and Web Socket services, 2) Organization of vector chart data to obtain more efficiency of data network transmission and data procession, for which original S-57 charts are converted into Shape files and a Javascript framework is designed to read and parse the Shape files for the client, 3) Vector nautical charts display on Web page, for which a Javascript display framework and rendering functions for chart points, lines and areas symbols are designed based on HTML5 Canvas. An application of web chart based vessel tracking is tested further to verify the proposed methods. The results showed that HTML5 is suitable to develop web vector chart applications, although there are several problems waiting to be solved such as it can't comply with S-52 display standard completely.
{"title":"Research on Web Mapping of Vector Nautical Charts Based on HTML5","authors":"M. Pan, Bobo Pang, C. Li, Deqiang Wang, Donglong Min, De-peng Zhao","doi":"10.1109/ISCC-C.2013.119","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.119","url":null,"abstract":"According to the issues encountered by traditional web chart technologies, the paper, following the boom of HTML5, did a research into web mapping of vector nautical charts based on HTML5. The research mainly includes: 1) System architecture for the HTML5 based web chart application, in which HTML5, CSS and Javascript are used to build and style the client Web chart pages, and Node. Js is used to construct the server-side to provide both HTTP and Web Socket services, 2) Organization of vector chart data to obtain more efficiency of data network transmission and data procession, for which original S-57 charts are converted into Shape files and a Javascript framework is designed to read and parse the Shape files for the client, 3) Vector nautical charts display on Web page, for which a Javascript display framework and rendering functions for chart points, lines and areas symbols are designed based on HTML5 Canvas. An application of web chart based vessel tracking is tested further to verify the proposed methods. The results showed that HTML5 is suitable to develop web vector chart applications, although there are several problems waiting to be solved such as it can't comply with S-52 display standard completely.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud messaging push notification services are key features of pervasive mobile applications where invocations occur asynchronously and it is important that the mobile users are notified in a timely fashion of the available services. This article summarizes Push technology evolution including key techniques, features and architectures. It presents four kinds of push notifications such as Microsoft Push Notification service, Google Cloud Messaging, Blackberry Push service, Apple Push Notification service. It also analyses these four push notification approaches. In addition, it proposes a CPTEM to evaluate and select the most appropriate push mechanisms.
{"title":"Survey of Cloud Messaging Push Notification Service","authors":"Na Li, Yanhui Du, Guangxuan Chen","doi":"10.1109/ISCC-C.2013.132","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.132","url":null,"abstract":"Cloud messaging push notification services are key features of pervasive mobile applications where invocations occur asynchronously and it is important that the mobile users are notified in a timely fashion of the available services. This article summarizes Push technology evolution including key techniques, features and architectures. It presents four kinds of push notifications such as Microsoft Push Notification service, Google Cloud Messaging, Blackberry Push service, Apple Push Notification service. It also analyses these four push notification approaches. In addition, it proposes a CPTEM to evaluate and select the most appropriate push mechanisms.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The spatial panel data model is commonly used in practice. In order to explore the property of the parameter estimator for the spatial error panel data model with fixed effects, the quasi-maximum likelihood estimator for the model is provided in this paper. And two theorems on the asymptotic properties of the estimator are proposed and proved. For illustration, the associated simulation is employed to verify the effectiveness of the proposed strategies. Empirical results show that when the number of the spatial units is large and the number of the time series is finite, the estimator is consistent and asymptotically normal. In conclusion, it is an estimator with good performance.
{"title":"The Asymptotic Properties of Quasi-maximum Likelihood Estimator for Spatial Error Panel Data Model","authors":"Chunhong Li, Li-Min Wen","doi":"10.1109/ISCC-C.2013.134","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.134","url":null,"abstract":"The spatial panel data model is commonly used in practice. In order to explore the property of the parameter estimator for the spatial error panel data model with fixed effects, the quasi-maximum likelihood estimator for the model is provided in this paper. And two theorems on the asymptotic properties of the estimator are proposed and proved. For illustration, the associated simulation is employed to verify the effectiveness of the proposed strategies. Empirical results show that when the number of the spatial units is large and the number of the time series is finite, the estimator is consistent and asymptotically normal. In conclusion, it is an estimator with good performance.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114393105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
High voltage electrical online monitoring such that we can easy to get the operation of data related to the high-voltage electrical equipment in real time. In order to learn the healthy status of employed devices, the obtained monitoring data is analyzed. In this paper, the characteristics of the monitoring data are analyzed f such that the cloud storage platform is useful for the massive distributed line monitoring data management. Three tier architectures include the bottom is the substation level which is used to storage the substation data, and the middle is the regional level which is used to storage all region data, the top is the grid level, which is used to manage all monitoring data consist of the cloud store platform.
{"title":"A Research of Massive Distributed High Voltage Electrical Online Monitoring Data Management Platform Based on Cloud Storage","authors":"Wen Du, Lina Zhao","doi":"10.1109/ISCC-C.2013.30","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.30","url":null,"abstract":"High voltage electrical online monitoring such that we can easy to get the operation of data related to the high-voltage electrical equipment in real time. In order to learn the healthy status of employed devices, the obtained monitoring data is analyzed. In this paper, the characteristics of the monitoring data are analyzed f such that the cloud storage platform is useful for the massive distributed line monitoring data management. Three tier architectures include the bottom is the substation level which is used to storage the substation data, and the middle is the regional level which is used to storage all region data, the top is the grid level, which is used to manage all monitoring data consist of the cloud store platform.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122337050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present a bionic auditory system for musical instrument recognition. This system is designed based on the physiological structures of the human auditory system that are essential to sound source recognition, such as the basilar membrane and inner hair cells in the cochlea of the inner ear, cochlear nucleus, and the auditory cortex. A large solo database consisting of 243 acoustic and synthetic solo tones over the full pitch ranges of seven different instruments (guitar, harp, horn, piano, saxophone, trumpet, and violin) is used to encompass different sound possibilities of each instrument. The gamma tone model, the Meddis model, and poster ventral cochlear nucleus (PVCN) model are constructed to imitate the basilar membrane, the inner hair cells, and the cochlear nucleus, respectively. By using 33%/67% splits between training and test data, a self-organizing mapping neural network (SOMNN) based on the function of auditory cortex is established to classify the instruments. The instruments are recognized with an overall success rate of over 75%. This bionic auditory system indicates high efficiency and high accuracy in musical instrument recognition.
{"title":"Musical Instrument Recognition Based on the Bionic Auditory Model","authors":"Lin Zhang, Shan Wang, Lianming Wang, Yiyuan Zhang","doi":"10.1109/ISCC-C.2013.91","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.91","url":null,"abstract":"We present a bionic auditory system for musical instrument recognition. This system is designed based on the physiological structures of the human auditory system that are essential to sound source recognition, such as the basilar membrane and inner hair cells in the cochlea of the inner ear, cochlear nucleus, and the auditory cortex. A large solo database consisting of 243 acoustic and synthetic solo tones over the full pitch ranges of seven different instruments (guitar, harp, horn, piano, saxophone, trumpet, and violin) is used to encompass different sound possibilities of each instrument. The gamma tone model, the Meddis model, and poster ventral cochlear nucleus (PVCN) model are constructed to imitate the basilar membrane, the inner hair cells, and the cochlear nucleus, respectively. By using 33%/67% splits between training and test data, a self-organizing mapping neural network (SOMNN) based on the function of auditory cortex is established to classify the instruments. The instruments are recognized with an overall success rate of over 75%. This bionic auditory system indicates high efficiency and high accuracy in musical instrument recognition.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122349054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to improve the overall throughput of processors, to increase thread-level parallelism (TLP) and instruction-level parallelism (ILP) intra and inter cores, and ensure the scalability of multi-core systems, can a novel mechanism chip multithreading with resource unit manager (RUM-CMT) be used, which is presented in this paper. By introducing the efficiency difference of resource utilization among threads, such as, the condition of dynamically resource allocation to CMT architecture and add an absorption barrier for all threads to make their reserved resources far away from hidden hunger. For verify the applicability of RUM-CMT, a 4 cores with 2 threads processor and a 4 cores with 4 threads processor are simulated based on GEMS & Simics simulator. And this limited study shows RUM-CMT can increase performance by 29.79%, and an improve success committed instructions per squash instructions by 31.15% and fairness attains 6.25% improvements over static partition on 4 cores with 4 threads processor. The 4 cores with 2 threads also attains passable enhance. So RUM-CMT can accurately and concise reallocate resource according to phase turning in the running of applications, improve resource utilization, mining the ILP and TLP in applications. In other words, RUM-CMT improves the controllability of threads, reduces invalid losses and improves system efficiency, and it is a suitable solution for multicore, multithreaded architecture.
{"title":"A Case of Chip Multithreading Architecture with Resource Unit Manager","authors":"Juan Fang, Zhenxi Pan, Lu Yu, Sitong Liu","doi":"10.1109/ISCC-C.2013.8","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.8","url":null,"abstract":"In order to improve the overall throughput of processors, to increase thread-level parallelism (TLP) and instruction-level parallelism (ILP) intra and inter cores, and ensure the scalability of multi-core systems, can a novel mechanism chip multithreading with resource unit manager (RUM-CMT) be used, which is presented in this paper. By introducing the efficiency difference of resource utilization among threads, such as, the condition of dynamically resource allocation to CMT architecture and add an absorption barrier for all threads to make their reserved resources far away from hidden hunger. For verify the applicability of RUM-CMT, a 4 cores with 2 threads processor and a 4 cores with 4 threads processor are simulated based on GEMS & Simics simulator. And this limited study shows RUM-CMT can increase performance by 29.79%, and an improve success committed instructions per squash instructions by 31.15% and fairness attains 6.25% improvements over static partition on 4 cores with 4 threads processor. The 4 cores with 2 threads also attains passable enhance. So RUM-CMT can accurately and concise reallocate resource according to phase turning in the running of applications, improve resource utilization, mining the ILP and TLP in applications. In other words, RUM-CMT improves the controllability of threads, reduces invalid losses and improves system efficiency, and it is a suitable solution for multicore, multithreaded architecture.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126086195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianmin Wang, Yanqin Zhang, Jinhu Zhou, Peng Jia, Xunjun He
Currently, the LXI data acquisition system often requires high speed, large capacity memory, but the internal storage resource of FPGA is not sufficient to meet the requirements. In order to solve above problems, a SDRAM controller is proposed in this paper, where the Multiple FIFO based on the on-chip resources of FPGA serves as the read and write cache to realize the multiple functional modules performing the read/write operation in LXI acquisition system by the design of priority algorithm and reasonable controlling the access of SDRAM from external device. At the same time, the SDRAM can still communicate at high frequency by the suitable time limitation. The simulation results show that the proposed SDRAM controller can not only realize reading and writing data, but also its operating frequency is able to meet the requirements of functional modules.
{"title":"Realization of Multi-port SDRAM Controller in LXI Data Acquisition System","authors":"Jianmin Wang, Yanqin Zhang, Jinhu Zhou, Peng Jia, Xunjun He","doi":"10.1109/ISCC-C.2013.105","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.105","url":null,"abstract":"Currently, the LXI data acquisition system often requires high speed, large capacity memory, but the internal storage resource of FPGA is not sufficient to meet the requirements. In order to solve above problems, a SDRAM controller is proposed in this paper, where the Multiple FIFO based on the on-chip resources of FPGA serves as the read and write cache to realize the multiple functional modules performing the read/write operation in LXI acquisition system by the design of priority algorithm and reasonable controlling the access of SDRAM from external device. At the same time, the SDRAM can still communicate at high frequency by the suitable time limitation. The simulation results show that the proposed SDRAM controller can not only realize reading and writing data, but also its operating frequency is able to meet the requirements of functional modules.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120954363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an anti-phishing technique based on e-mail extraction and analysis is proposed. The technique approached with phishing email, the channel phishing attack transmits, distinguish phishing emails and extract the suspicious URL from the e-mail for further analysis. Upon arrival, a protected list is built according to those third parties which are the most vulnerable to phishers in order to filter those confusing advertising spams in China and a neural network based model is proposed in order to detecting phishing messages from an e-mail stream. In this anti-phishing technique, email stream captured by our honey pot subsystem from the Internet is parsed into a MIME email firstly, various feathers are extracted from the email and outputted into feather vectors. The feature vectors will be self-organized by ART2 neural network one by one and classified into corresponding categories. Link URLs in the suspected emails' messages will be extracted for further detection in phishing site subsystem. Experiment using collected emails shows a good performance aiming at detecting phishing emails in China while foreign method performs badly in distinguishing phishing emails from spam.
{"title":"Research of the Anti-phishing Technology Based on E-mail Extraction and Analysis","authors":"Yanhui Du, Fu Xue","doi":"10.1109/ISCC-C.2013.110","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.110","url":null,"abstract":"In this paper, an anti-phishing technique based on e-mail extraction and analysis is proposed. The technique approached with phishing email, the channel phishing attack transmits, distinguish phishing emails and extract the suspicious URL from the e-mail for further analysis. Upon arrival, a protected list is built according to those third parties which are the most vulnerable to phishers in order to filter those confusing advertising spams in China and a neural network based model is proposed in order to detecting phishing messages from an e-mail stream. In this anti-phishing technique, email stream captured by our honey pot subsystem from the Internet is parsed into a MIME email firstly, various feathers are extracted from the email and outputted into feather vectors. The feature vectors will be self-organized by ART2 neural network one by one and classified into corresponding categories. Link URLs in the suspected emails' messages will be extracted for further detection in phishing site subsystem. Experiment using collected emails shows a good performance aiming at detecting phishing emails in China while foreign method performs badly in distinguishing phishing emails from spam.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There have been considerable research efforts to use the hand as an input device for HCI in recent years. Hand tracking is the most important procedure for HCI, it is essential of tracking stability and efficiency for hand manipulation. This paper proposed a novel hand tracking algorithm which can track a hand stable and is real time, and the proposed algorithm can work on normal CCD cameral. Our algorithm is based on mean-shift and we improved it to fit for robust hand tracking by using super pixel cluster, integrated GIH and skin color mask, the skin color mask was extracted using online learning. The proposed improved algorithm can track hand reliably even in clutter environments comparing to the existing traditional algorithms.
{"title":"Hand Tracking Algorithm Based on SuperPixels Feature","authors":"Zhiqin Zhang, Fei Huang","doi":"10.1109/ISCC-C.2013.77","DOIUrl":"https://doi.org/10.1109/ISCC-C.2013.77","url":null,"abstract":"There have been considerable research efforts to use the hand as an input device for HCI in recent years. Hand tracking is the most important procedure for HCI, it is essential of tracking stability and efficiency for hand manipulation. This paper proposed a novel hand tracking algorithm which can track a hand stable and is real time, and the proposed algorithm can work on normal CCD cameral. Our algorithm is based on mean-shift and we improved it to fit for robust hand tracking by using super pixel cluster, integrated GIH and skin color mask, the skin color mask was extracted using online learning. The proposed improved algorithm can track hand reliably even in clutter environments comparing to the existing traditional algorithms.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121055812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}