首页 > 最新文献

2009 WRI World Congress on Software Engineering最新文献

英文 中文
A Self-Feedback Methodology of Domain Ontology Modeling 领域本体建模的自反馈方法
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.178
Ming Li, Fengkui Zang
Ontology has played more and more important roles in the computer science fields. However, there is no unified and effective method for ontology modeling until now. This paper presents a novel method for domain ontology modeling. Firstly, all kinds of ontology models are translated into ontology model described in Description Logics (DLs). Subsequently, erroneous information is fed back through reasoning on ontology in DLs. Finally, developers can amend ontology according to the feedback information. This process is repeated until the inconsistency of ontology is eliminated. Consequently, the above-mentioned methodology improves the accuracy and efficiency of domain ontology modeling. A concrete instance evidently demonstrates the effectiveness of research.
本体论在计算机科学领域发挥着越来越重要的作用。然而,目前还没有统一有效的本体建模方法。提出了一种新的领域本体建模方法。首先,将各种本体模型转换为描述逻辑(dl)中描述的本体模型。随后,在dl中通过本体推理反馈错误信息。最后,开发人员可以根据反馈信息对本体进行修改。重复这个过程,直到消除本体的不一致性。因此,该方法提高了领域本体建模的准确性和效率。具体实例表明了研究的有效性。
{"title":"A Self-Feedback Methodology of Domain Ontology Modeling","authors":"Ming Li, Fengkui Zang","doi":"10.1109/WCSE.2009.178","DOIUrl":"https://doi.org/10.1109/WCSE.2009.178","url":null,"abstract":"Ontology has played more and more important roles in the computer science fields. However, there is no unified and effective method for ontology modeling until now. This paper presents a novel method for domain ontology modeling. Firstly, all kinds of ontology models are translated into ontology model described in Description Logics (DLs). Subsequently, erroneous information is fed back through reasoning on ontology in DLs. Finally, developers can amend ontology according to the feedback information. This process is repeated until the inconsistency of ontology is eliminated. Consequently, the above-mentioned methodology improves the accuracy and efficiency of domain ontology modeling. A concrete instance evidently demonstrates the effectiveness of research.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123908624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research of Enterprise Competition Information Intelligent Collecting System Based on Rough Set 基于粗糙集的企业竞争信息智能采集系统研究
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.348
Yang Kefei, Pan Yu, Huliang Bin, Pan Fang
According to the characteristics of incompleteness, contradictory and extensiveness of the enterprise competition information, rough set theory is used to guide the crawling of web spider, the gathering efficiency of enterprise completion collection is improved by similarity class expansion and attributes reduction based on discrimination. The achievement of this research has already been applied to the practical construction of information management center of an enterprise so as to offer strategic basis for operation decision of the enterprise.
根据企业竞争信息的不完全性、矛盾性和广泛性特点,利用粗糙集理论指导网络蜘蛛爬行,通过相似类扩展和基于判别的属性约简,提高企业竞争信息的收集效率。本研究成果已应用于企业信息管理中心的实际建设中,为企业的经营决策提供战略依据。
{"title":"Research of Enterprise Competition Information Intelligent Collecting System Based on Rough Set","authors":"Yang Kefei, Pan Yu, Huliang Bin, Pan Fang","doi":"10.1109/WCSE.2009.348","DOIUrl":"https://doi.org/10.1109/WCSE.2009.348","url":null,"abstract":"According to the characteristics of incompleteness, contradictory and extensiveness of the enterprise competition information, rough set theory is used to guide the crawling of web spider, the gathering efficiency of enterprise completion collection is improved by similarity class expansion and attributes reduction based on discrimination. The achievement of this research has already been applied to the practical construction of information management center of an enterprise so as to offer strategic basis for operation decision of the enterprise.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123945647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NC-ERP Rapid Implementation in Sichuan Post-earthquake for Relief Material Management NC-ERP在四川地震后救灾物资管理中的快速实施
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.84
Wang Huifen, Cui. Lei
In earthquake relief, the broad effects of humanitarian relief include delivery medical material to victims. Scientific relief need quick response of logistics supply chain, which include tracking situational urgency at various locations such as lack of food and medical supplies. The paper introduced the rapid adoption of NC-ERP in Sichuan post-earthquake which was donated by UFIDA. With the rapid implementation methodology and emergency response management, Sichuan Ministry of Health had adopted the donated ERP suite named NC in 10 days. The key success factors of ERP in emergence response and under high risk are support of CEO, construction of project team and rapid involvement of technical consultants which are helpful to solve issues inherent in disaster response collaboration.
在地震救援中,人道主义救援的广泛影响包括向受害者运送医疗物资。科学救援需要物流供应链的快速反应,包括跟踪各个地点的紧急情况,如缺乏食品和医疗用品。本文介绍了用友公司捐赠的NC-ERP在四川地震后的快速应用情况。四川省卫生部通过快速实施方法和应急管理,在10天内采用了捐赠的ERP套件NC。ERP在应急响应和高风险环境下成功的关键因素是CEO的支持、项目团队的建设和技术顾问的快速参与,这有助于解决灾害响应协作中固有的问题。
{"title":"NC-ERP Rapid Implementation in Sichuan Post-earthquake for Relief Material Management","authors":"Wang Huifen, Cui. Lei","doi":"10.1109/WCSE.2009.84","DOIUrl":"https://doi.org/10.1109/WCSE.2009.84","url":null,"abstract":"In earthquake relief, the broad effects of humanitarian relief include delivery medical material to victims. Scientific relief need quick response of logistics supply chain, which include tracking situational urgency at various locations such as lack of food and medical supplies. The paper introduced the rapid adoption of NC-ERP in Sichuan post-earthquake which was donated by UFIDA. With the rapid implementation methodology and emergency response management, Sichuan Ministry of Health had adopted the donated ERP suite named NC in 10 days. The key success factors of ERP in emergence response and under high risk are support of CEO, construction of project team and rapid involvement of technical consultants which are helpful to solve issues inherent in disaster response collaboration.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123961945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloning and Bioinformatics Analysis of an Endoglucanase 2 from Trichoderma reesei 里氏木霉内切葡聚糖酶2的克隆及生物信息学分析
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.175
Yanling Yang, Lihua Liu, Miao Diao, Zhiwei Lin, Wunian Guo, Shihua Wang
Trichoderma reesei CBS368, a strong endoglucanase 2 (EG 2) producing strain, was isolated in our laboratory. The DNA fragment encoding the EG 2 was cloned in pMD18-T and sequenced. In order to achieve its expression, the vector pET28a (+) and pET32a (+) were used as expression vector, and the recombinant EG 2 was successfully expressed in E. coli BL21 (DE3). Bioinformatic analysis was conducted using some online or offline services.
本文分离了里氏木霉(Trichoderma reesei) CBS368菌株,该菌株是一株强内切葡聚糖酶2 (eg2)产生菌。在pMD18-T中克隆编码EG - 2的DNA片段并进行测序。为实现其表达,以pET28a(+)和pET32a(+)载体为表达载体,在大肠杆菌BL21 (DE3)中成功表达了重组EG 2。生物信息学分析通过一些在线或离线服务进行。
{"title":"Cloning and Bioinformatics Analysis of an Endoglucanase 2 from Trichoderma reesei","authors":"Yanling Yang, Lihua Liu, Miao Diao, Zhiwei Lin, Wunian Guo, Shihua Wang","doi":"10.1109/WCSE.2009.175","DOIUrl":"https://doi.org/10.1109/WCSE.2009.175","url":null,"abstract":"Trichoderma reesei CBS368, a strong endoglucanase 2 (EG 2) producing strain, was isolated in our laboratory. The DNA fragment encoding the EG 2 was cloned in pMD18-T and sequenced. In order to achieve its expression, the vector pET28a (+) and pET32a (+) were used as expression vector, and the recombinant EG 2 was successfully expressed in E. coli BL21 (DE3). Bioinformatic analysis was conducted using some online or offline services.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Optimization of Cooperative Bacterial Foraging 细菌协同觅食的优化研究
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.195
Y. Shao, Hanning Chen
Bacterial Foraging Optimization (BFO) is a novel optimization algorithm based on the social foraging behavior of E. coli bacteria. This paper presents a variation on the original BFO algorithm, namely the Cooperative Bacterial Foraging Optimization (CBFO), which significantly improve the original BFO in solving complex optimization problems. This significant improvement is achieved by applying two cooperative approaches to the original BFO, namely the serial heterogeneous cooperation on the implicit space decomposition level and the serial heterogeneous cooperation on the hybrid space decomposition level.
细菌觅食优化算法(BFO)是一种基于大肠杆菌群体觅食行为的优化算法。本文提出了一种对原BFO算法的改进,即合作细菌觅食优化算法(Cooperative Bacterial Foraging Optimization, CBFO),该算法在解决复杂优化问题时显著改进了原BFO算法。将隐式空间分解层次上的串行异构协作和混合空间分解层次上的串行异构协作两种协作方法应用于原BFO实现了显著的改进。
{"title":"The Optimization of Cooperative Bacterial Foraging","authors":"Y. Shao, Hanning Chen","doi":"10.1109/WCSE.2009.195","DOIUrl":"https://doi.org/10.1109/WCSE.2009.195","url":null,"abstract":"Bacterial Foraging Optimization (BFO) is a novel optimization algorithm based on the social foraging behavior of E. coli bacteria. This paper presents a variation on the original BFO algorithm, namely the Cooperative Bacterial Foraging Optimization (CBFO), which significantly improve the original BFO in solving complex optimization problems. This significant improvement is achieved by applying two cooperative approaches to the original BFO, namely the serial heterogeneous cooperation on the implicit space decomposition level and the serial heterogeneous cooperation on the hybrid space decomposition level.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124712935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Model of Service Behavior Based on Petri Nets with Weights 基于权值Petri网的服务行为模型
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.421
Yanbin Peng, Zhijun Zheng, Jian Xiang, Ji Gao, Jie-Qing Ai, Zhenyu Lu, Xueqin Jiang
Service composition technology promises a new solution to an age-old problem: how to implement complex, large scale, cross-enterprise business application. However, we must ensure the compatibility between component services in composite service. Current research works in this field only concern semantics compatibility of service interface, yet ignoring the compatibility of service behavior. Therefore, this paper proposes a model of service behavior based on Petri-nets with weight. Based on the novel model, a method is proposed to verify and compute service behavior compatibility.
服务组合技术有望为一个由来已久的问题提供新的解决方案:如何实现复杂的、大规模的、跨企业的业务应用程序。但是,我们必须确保组合服务中组件服务之间的兼容性。目前该领域的研究只关注服务接口的语义兼容性,而忽略了服务行为的兼容性。为此,本文提出了一种基于petri网的带权服务行为模型。在此基础上,提出了一种验证和计算服务行为兼容性的方法。
{"title":"A Model of Service Behavior Based on Petri Nets with Weights","authors":"Yanbin Peng, Zhijun Zheng, Jian Xiang, Ji Gao, Jie-Qing Ai, Zhenyu Lu, Xueqin Jiang","doi":"10.1109/WCSE.2009.421","DOIUrl":"https://doi.org/10.1109/WCSE.2009.421","url":null,"abstract":"Service composition technology promises a new solution to an age-old problem: how to implement complex, large scale, cross-enterprise business application. However, we must ensure the compatibility between component services in composite service. Current research works in this field only concern semantics compatibility of service interface, yet ignoring the compatibility of service behavior. Therefore, this paper proposes a model of service behavior based on Petri-nets with weight. Based on the novel model, a method is proposed to verify and compute service behavior compatibility.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124854820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Application of Fuzzy Comprehensive Evaluation to Quantify Design Space 模糊综合评价在设计空间量化中的应用
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.48
Yuping She
During the conceptual phase of a building design, major design space decisions that have the greatest influence on build ability of a project are taken. Quality function deployment (QFD) is an integrated decision-making methodology that can assure and improve the alignment of elements of design and construction processes with the requirements customers. Taking the existence of uncertainty in the early design into account, we present a fuzzy comprehensive evaluation-based approach to quantify design space, and using degree of similarity (or measure of similarity) and principle of choosing nearest (or principle of selecting near) to choose the best design from the alternatives at the early phase of design.
在建筑设计的概念阶段,主要的设计空间决策对项目的建造能力有最大的影响。质量功能部署(QFD)是一种集成的决策方法,可以确保并改进设计和构建过程的元素与客户需求的一致性。考虑到设计早期存在的不确定性,提出了一种基于模糊综合评价的设计空间量化方法,并利用相似度(或相似度量)和就近原则(或就近原则)从设计早期的备选方案中选择最佳设计。
{"title":"The Application of Fuzzy Comprehensive Evaluation to Quantify Design Space","authors":"Yuping She","doi":"10.1109/WCSE.2009.48","DOIUrl":"https://doi.org/10.1109/WCSE.2009.48","url":null,"abstract":"During the conceptual phase of a building design, major design space decisions that have the greatest influence on build ability of a project are taken. Quality function deployment (QFD) is an integrated decision-making methodology that can assure and improve the alignment of elements of design and construction processes with the requirements customers. Taking the existence of uncertainty in the early design into account, we present a fuzzy comprehensive evaluation-based approach to quantify design space, and using degree of similarity (or measure of similarity) and principle of choosing nearest (or principle of selecting near) to choose the best design from the alternatives at the early phase of design.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Determination of Branch Correlations in Software Testing 软件测试中分支相关性的自动确定
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.328
D. Gong, Xiangjuan Yao, Min Xia
Path-oriented testing is an important aspect of software testing. A challenging problem with path-oriented test data generation is the existence of infeasible paths. Timely detecting these infeasible paths can not only save test sources but also improve test efficiency. It is an effective method to detect infeasible paths by branch correlations. In this paper, we propose a method to automatically determine branch correlations in software testing. Firstly, we give a theorem to determine the true-true correlation, true-false correlation, false-true correlation, and false-false correlation based on the probabilities of the conditional distribution corresponding to different branches’ outcome (i.e. true or false). We then estimate these values of the probabilities by the maximum likelihood estimation. Finally, we apply the proposed method to determine the branch correlations of two typical programs, and the results show that the proposed method can accurately determine the branch correlations of different conditional statements. Our achievement provides an effective and automatic method to detect infeasible paths, which has great significance in improving the efficiency of software testing.
面向路径的测试是软件测试的一个重要方面。在面向路径的测试数据生成中,一个具有挑战性的问题是不可行路径的存在。及时发现这些不可行的路径不仅可以节省测试资源,还可以提高测试效率。利用分支相关性检测不可行路径是一种有效的方法。本文提出了一种在软件测试中自动确定分支相关性的方法。首先,根据不同分支结果对应的条件分布的概率(即真或假),给出了确定真-真相关、真-假相关、假-真相关和假-假相关的定理。然后我们用最大似然估计来估计这些概率值。最后,将该方法应用于两个典型程序的分支相关性的确定,结果表明该方法可以准确地确定不同条件语句的分支相关性。本文的研究成果为不可行路径的自动检测提供了一种有效的方法,对提高软件测试的效率具有重要意义。
{"title":"Automatic Determination of Branch Correlations in Software Testing","authors":"D. Gong, Xiangjuan Yao, Min Xia","doi":"10.1109/WCSE.2009.328","DOIUrl":"https://doi.org/10.1109/WCSE.2009.328","url":null,"abstract":"Path-oriented testing is an important aspect of software testing. A challenging problem with path-oriented test data generation is the existence of infeasible paths. Timely detecting these infeasible paths can not only save test sources but also improve test efficiency. It is an effective method to detect infeasible paths by branch correlations. In this paper, we propose a method to automatically determine branch correlations in software testing. Firstly, we give a theorem to determine the true-true correlation, true-false correlation, false-true correlation, and false-false correlation based on the probabilities of the conditional distribution corresponding to different branches’ outcome (i.e. true or false). We then estimate these values of the probabilities by the maximum likelihood estimation. Finally, we apply the proposed method to determine the branch correlations of two typical programs, and the results show that the proposed method can accurately determine the branch correlations of different conditional statements. Our achievement provides an effective and automatic method to detect infeasible paths, which has great significance in improving the efficiency of software testing.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Security Check in Visual Studio C/C++ Compiler 增强Visual Studio C/ c++编译器的安全检查
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.44
Yongdong Wu
Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.
缓冲区溢出利用是软件安全的主要威胁。为了减少这种威胁,Visual studio C/ c++编译器支持在初始化时对被编译程序的地址进行随机化,并在运行时由被编译程序嵌入安全堆栈保护。本文通过增加编译程序在以下方面的能力来升级编译器:(1)在不增加成本的情况下保护帧指针不被调用者篡改;(2)以极低的代价挫败篡改受保护区域1-2字节的攻击;(3)根据序段模式对间接函数调用进行检查,以减少软件被攻击时崩溃的概率。我们的实验证明了Microsoft Visual Studio在生成安全、健壮的软件方面的改进。
{"title":"Enhancing Security Check in Visual Studio C/C++ Compiler","authors":"Yongdong Wu","doi":"10.1109/WCSE.2009.44","DOIUrl":"https://doi.org/10.1109/WCSE.2009.44","url":null,"abstract":"Buffer overflow exploitation is a major threat to software security. To reduce the threat, Visual studio C/C++compiler enables to randomize the addresses of the compiled program in initialization time, and to embed security stack guards by the compiled program in run time. The present paper upgrades the compiler by increasing the compiled program's capabilities in the following aspects: (1) protects a frame pointer from callee's tampering with at no additional cost; (2) defeats the attack which tampers 1-2 bytes of a protected region at a very low cost; (3) checks the indirect function call against the prologue pattern so as to reduce the probability of software crash in case of being attacked. Our experiments demonstrate the improvement on Microsoft Visual Studio in generating secure and robust software.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"24 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133002856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Recognition of Human Actions Using Motion Capture Data and Support Vector Machine 基于动作捕捉数据和支持向量机的人体动作识别
Pub Date : 2009-05-19 DOI: 10.1109/WCSE.2009.354
Jung-Ying Wang, Hahn-Ming Lee
This paper presents a human action recognition system based on motion capture features and support vector machine (SVM). We use 43 optical markers distributing on body and extremities to track the movement of human actions. In our system 21 different types of action are recognized. Applying SVM for the recognition of human action the overall prediction accuracy achieves to 84.1% when using the three-fold cross validation on the training set. Another purpose of this study is to find out which skeleton points are important for human action recognition. The experimental results show that the skeleton points of head, hands and feet are the most important features for recognition of human actions.
提出了一种基于动作捕捉特征和支持向量机的人体动作识别系统。我们使用分布在身体和四肢上的43个光学标记来跟踪人类动作的运动。在我们的系统中,21种不同类型的动作被识别。将支持向量机用于人体动作识别,在训练集上使用三重交叉验证时,整体预测准确率达到84.1%。本研究的另一个目的是找出哪些骨骼点对人体动作识别是重要的。实验结果表明,头、手、脚的骨骼点是人体动作识别的重要特征。
{"title":"Recognition of Human Actions Using Motion Capture Data and Support Vector Machine","authors":"Jung-Ying Wang, Hahn-Ming Lee","doi":"10.1109/WCSE.2009.354","DOIUrl":"https://doi.org/10.1109/WCSE.2009.354","url":null,"abstract":"This paper presents a human action recognition system based on motion capture features and support vector machine (SVM). We use 43 optical markers distributing on body and extremities to track the movement of human actions. In our system 21 different types of action are recognized. Applying SVM for the recognition of human action the overall prediction accuracy achieves to 84.1% when using the three-fold cross validation on the training set. Another purpose of this study is to find out which skeleton points are important for human action recognition. The experimental results show that the skeleton points of head, hands and feet are the most important features for recognition of human actions.","PeriodicalId":331155,"journal":{"name":"2009 WRI World Congress on Software Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127871005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2009 WRI World Congress on Software Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1