首页 > 最新文献

2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)最新文献

英文 中文
Abnormality classification on the shape of red blood cells using radial basis function network 基于径向基函数网络的红细胞形态异常分类
M. F. Syahputra, Anita Ratna Sari, R. Rahmat
When diagnosing a disease, besides the physical examination, blood analysis is a reliable method. This because blood has components that contains a lot of key informations. Morphogical examination of peripheral blood smears is one of important lab examinations and has to be evaluated properly. But abnormal red blood cell shapes that found by a health analyst is not always the same as other analyst because of precision factor, concentration, and lack of knowledge. Besides that, morphogical examination of peripheral blood smears still done manually by health anaylists and they considered less efficient because they took a lot of time. To solve that problem, a method to classify red blood cell types that detects abnormal shapes of cells from certain disease. In this paper, radial basis function network is used as method to classify abnormal red blood cell types. Several stage before executing classification process is input image, pre-processing, feature extract with canny edge detection. Research result shows that by using this method, the accuracy to classify abnormal red blood cell types is 83.3%.
诊断疾病时,除体检外,血液分析是一种可靠的方法。这是因为血液中含有很多关键信息。外周血涂片形态学检查是重要的实验室检查之一,必须正确评价。但是,健康分析师发现的异常红细胞形状并不总是与其他分析师相同,因为精确因素,集中和缺乏知识。除此之外,外周血涂片的形态学检查仍然是由健康分析人员手工完成的,他们认为效率较低,因为他们花费了很多时间。为了解决这个问题,需要一种方法来对红细胞类型进行分类,这种方法可以检测出来自某些疾病的异常形状的细胞。本文采用径向基函数网络作为异常红细胞类型分类的方法。在执行分类过程之前的几个阶段是输入图像、预处理、特征提取和精确的边缘检测。研究结果表明,该方法对异常红细胞类型的分类准确率为83.3%。
{"title":"Abnormality classification on the shape of red blood cells using radial basis function network","authors":"M. F. Syahputra, Anita Ratna Sari, R. Rahmat","doi":"10.1109/CAIPT.2017.8320739","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320739","url":null,"abstract":"When diagnosing a disease, besides the physical examination, blood analysis is a reliable method. This because blood has components that contains a lot of key informations. Morphogical examination of peripheral blood smears is one of important lab examinations and has to be evaluated properly. But abnormal red blood cell shapes that found by a health analyst is not always the same as other analyst because of precision factor, concentration, and lack of knowledge. Besides that, morphogical examination of peripheral blood smears still done manually by health anaylists and they considered less efficient because they took a lot of time. To solve that problem, a method to classify red blood cell types that detects abnormal shapes of cells from certain disease. In this paper, radial basis function network is used as method to classify abnormal red blood cell types. Several stage before executing classification process is input image, pre-processing, feature extract with canny edge detection. Research result shows that by using this method, the accuracy to classify abnormal red blood cell types is 83.3%.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115649684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Vision based distance measurement system using two-dimensional barcode for mobile robot 基于视觉的移动机器人二维条码距离测量系统
Jong-Hwan Beck, Sang Hoon Kim
In future world, mobile robots for home services are expected to solve productivity problem. Especially, vision based mobile robots will be able to perform many tasks due to their characteristics of using camera. In this regard, landmark detection methods using a camera have been used in many robots because it is easy to measure the position. In this paper, we propose a distance measurement system by detecting two-dimensional barcode which can be used landmark for unmanned ground robot. In experiments, the position of the camera is expressed as (x, y) through the 2D barcode recognition in the 4∗4 grid map.
在未来的世界里,用于家庭服务的移动机器人有望解决生产力问题。特别是基于视觉的移动机器人,由于其使用摄像头的特点,将能够执行许多任务。在这方面,使用相机的地标检测方法已经在许多机器人中使用,因为它易于测量位置。本文提出了一种基于二维条码的距离测量系统,该系统可作为无人地面机器人的地标。在实验中,通过二维条码识别在4 * 4网格图中表示相机的位置为(x, y)。
{"title":"Vision based distance measurement system using two-dimensional barcode for mobile robot","authors":"Jong-Hwan Beck, Sang Hoon Kim","doi":"10.1109/CAIPT.2017.8320742","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320742","url":null,"abstract":"In future world, mobile robots for home services are expected to solve productivity problem. Especially, vision based mobile robots will be able to perform many tasks due to their characteristics of using camera. In this regard, landmark detection methods using a camera have been used in many robots because it is easy to measure the position. In this paper, we propose a distance measurement system by detecting two-dimensional barcode which can be used landmark for unmanned ground robot. In experiments, the position of the camera is expressed as (x, y) through the 2D barcode recognition in the 4∗4 grid map.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127928898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
AiTES: The self-adaptive framework for environment change of IoT 物联网环境变化的自适应框架
JungHyen Ahn, Young B. Park
As the network and hardware technology development, IoT devices that have sensors and communication functions on various objects are increasing rapidly. As result IoT management software that manages various IoT devices in system is becoming important. However, most management systems are designed to perform only limited functions for the registered devices. In this paper, we propose a framework of Adaptive Internet Things EcoSystem that control behavior by changing software module adaptively to environment change of IoT devices. This system is composed two parts. One is the software adaption part defined to adapt IoT environmental change for each Internet things. And the conducting part is defined to construct IT Ecosystem, so that each software adaption part interact others. We show the functions and execution behavior of the Framework to achieve controlling device behavior adaptively upon environmental changes of IoT.
随着网络和硬件技术的发展,在各种物体上具有传感器和通信功能的物联网设备正在迅速增加。因此,管理系统中各种物联网设备的物联网管理软件变得越来越重要。然而,大多数管理系统被设计为只执行注册设备的有限功能。在本文中,我们提出了一个自适应物联网生态系统框架,通过改变软件模块来适应物联网设备的环境变化来控制行为。本系统由两部分组成。一是软件适应部分,定义为适应物联网环境的变化。并定义实施部分构建IT生态系统,使各软件适应部分相互作用。我们展示了框架的功能和执行行为,以实现对物联网环境变化的自适应控制设备行为。
{"title":"AiTES: The self-adaptive framework for environment change of IoT","authors":"JungHyen Ahn, Young B. Park","doi":"10.1109/CAIPT.2017.8320726","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320726","url":null,"abstract":"As the network and hardware technology development, IoT devices that have sensors and communication functions on various objects are increasing rapidly. As result IoT management software that manages various IoT devices in system is becoming important. However, most management systems are designed to perform only limited functions for the registered devices. In this paper, we propose a framework of Adaptive Internet Things EcoSystem that control behavior by changing software module adaptively to environment change of IoT devices. This system is composed two parts. One is the software adaption part defined to adapt IoT environmental change for each Internet things. And the conducting part is defined to construct IT Ecosystem, so that each software adaption part interact others. We show the functions and execution behavior of the Framework to achieve controlling device behavior adaptively upon environmental changes of IoT.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design monitoring of distribution transformer load by messenger based on microcontroller atmega 128 设计了一种基于atmega128单片机的配电变压器负荷监测系统
F. Yudianto, Sistem Informasi, Fak. Teknik
In order the distribution process of electricity to customers run properly, the distribution transformer should be noticed. But there are some obstacles such as the amount of the transformer is not proportional to the number of officers and the location of transformers are scattered in various places. These problem make officer hard to measure development of peak loads on old customers and new customers. Currently the growth of the transformer load is still not monitored properly. Therefore electric company need technology that is able to monitor transformer load. This research produces a tool that enables officers easier to monitor distribution transformers load in real time and throughout 24 hours. The output is visual data in the form of indicator lights that facilitate monitoring transformer load and data will sent periodically to the office server. If transformer is overload, tool will send warning message to officer so officer can take safety action in short time and can decreasing the risk of fire due to damage of transformer.
为了使用户的配电过程正常运行,应注意配电变压器。但也存在一些障碍,如变压器的数量与人员数量不成比例,变压器的位置分散在各地。这些问题使得工作人员难以衡量新老客户高峰负荷的发展情况。目前,变压器负荷的增长仍未得到很好的监测。因此,电力公司需要能够监测变压器负荷的技术。这项研究产生了一种工具,使工作人员更容易在24小时内实时监测配电变压器的负载。输出以指示灯形式显示的可视化数据,方便监控变压器负载,并定期将数据发送到办公服务器。如果变压器过载,工具将向管理人员发送警告信息,以便管理人员在短时间内采取安全措施,从而降低因变压器损坏而发生火灾的风险。
{"title":"Design monitoring of distribution transformer load by messenger based on microcontroller atmega 128","authors":"F. Yudianto, Sistem Informasi, Fak. Teknik","doi":"10.1109/CAIPT.2017.8320696","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320696","url":null,"abstract":"In order the distribution process of electricity to customers run properly, the distribution transformer should be noticed. But there are some obstacles such as the amount of the transformer is not proportional to the number of officers and the location of transformers are scattered in various places. These problem make officer hard to measure development of peak loads on old customers and new customers. Currently the growth of the transformer load is still not monitored properly. Therefore electric company need technology that is able to monitor transformer load. This research produces a tool that enables officers easier to monitor distribution transformers load in real time and throughout 24 hours. The output is visual data in the form of indicator lights that facilitate monitoring transformer load and data will sent periodically to the office server. If transformer is overload, tool will send warning message to officer so officer can take safety action in short time and can decreasing the risk of fire due to damage of transformer.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of random parameter filtering using OpenMP 使用OpenMP实现随机参数滤波
Seong-Hyeon Han, Kwang-Yeob Lee
This paper proposes the use of OpenMP for random parameter filtering. The use of large numbers of samples during ray tracing rendering results in high quality images yet requires long processing times. On the other hand, the use of a small number of samples results in noise. For the purposes of reducing processing time and removing noise, this study undertook rendering using a small number of samples and subsequently undertook random parameter filtering. In order to speed up the process of random parameter filtering, this study applied OpenMP. The use of OpenMP resulted in a 5.8 times greater improvement in performance.
本文提出使用OpenMP进行随机参数滤波。在光线追踪渲染过程中使用大量的样本可以产生高质量的图像,但需要很长的处理时间。另一方面,使用少量样本会导致噪声。为了减少处理时间和去除噪声,本研究使用少量样本进行渲染,然后进行随机参数滤波。为了加快随机参数滤波的过程,本研究采用了OpenMP。使用OpenMP后,性能提高了5.8倍。
{"title":"Implementation of random parameter filtering using OpenMP","authors":"Seong-Hyeon Han, Kwang-Yeob Lee","doi":"10.1109/CAIPT.2017.8320728","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320728","url":null,"abstract":"This paper proposes the use of OpenMP for random parameter filtering. The use of large numbers of samples during ray tracing rendering results in high quality images yet requires long processing times. On the other hand, the use of a small number of samples results in noise. For the purposes of reducing processing time and removing noise, this study undertook rendering using a small number of samples and subsequently undertook random parameter filtering. In order to speed up the process of random parameter filtering, this study applied OpenMP. The use of OpenMP resulted in a 5.8 times greater improvement in performance.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122329964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study of performance enhancement in big data anonymization 大数据匿名化的性能提升研究
S. Jang
This paper presents the schemes to solve problems when k-anonymity and l-diversity are applied to Big-Data anonymization. The first problem is that information loss and distortion are unavoidable by anonymization job. To reduce the distortion, this paper presents an efficient method that is based on deep anonymization detection. In the method, data publishers analyze the anonymization work, and determine if it is deep or light. If it is thought as deep anonymization, high information distortion is allowed when being distributed to a third party after anonymization. Otherwise, information distortion is kept as low as possible when anonymizing Big-Data to provide the receivers with more meaningful data. The decision for deep anonymization is done by considering a domain data characteristic, data receiver's purpose, and data criticality. The second problem is that it takes much time and requires large buffer space to process the anonymization. To solve the problem, this paper present enhanced read/write schemes.
本文提出了k-匿名和l-多样性应用于大数据匿名化问题的解决方案。第一个问题是匿名化工作不可避免地会造成信息丢失和失真。为了减少图像失真,本文提出了一种基于深度匿名化检测的有效方法。在该方法中,数据发布者分析匿名化工作,并确定它是深度还是轻度。如果被认为是深度匿名化,那么在匿名化后被分发给第三方时,就会出现高度的信息失真。否则,在对大数据进行匿名化处理时,尽可能降低信息失真,为接收方提供更有意义的数据。深度匿名化的决定是通过考虑域数据特征、数据接收者的目的和数据的临界性来完成的。第二个问题是,处理匿名化需要花费很多时间和很大的缓冲空间。为了解决这一问题,本文提出了增强型读写方案。
{"title":"A study of performance enhancement in big data anonymization","authors":"S. Jang","doi":"10.1109/CAIPT.2017.8320669","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320669","url":null,"abstract":"This paper presents the schemes to solve problems when k-anonymity and l-diversity are applied to Big-Data anonymization. The first problem is that information loss and distortion are unavoidable by anonymization job. To reduce the distortion, this paper presents an efficient method that is based on deep anonymization detection. In the method, data publishers analyze the anonymization work, and determine if it is deep or light. If it is thought as deep anonymization, high information distortion is allowed when being distributed to a third party after anonymization. Otherwise, information distortion is kept as low as possible when anonymizing Big-Data to provide the receivers with more meaningful data. The decision for deep anonymization is done by considering a domain data characteristic, data receiver's purpose, and data criticality. The second problem is that it takes much time and requires large buffer space to process the anonymization. To solve the problem, this paper present enhanced read/write schemes.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127448116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure multicast authentication scheme using DTLS 使用DTLS的安全组播认证方案
Si-Jae Woo, Jin Kwak
In the IoT environment, many protocols are used such as CoAP, MQTT, XMPP. Especially, CoAP supports lightweight for many IoT environment. CoAP is used with DTLS and the security of CoAP depends on the DTLS's. DTLS also supports multicast, but there is some problem with absence of authentication, such as not verifying mutual authentication at the registration phase. This leads to indiscreet group participation, which is a security problem and can cause performance decreasing. In this paper, therefore, we propose a secure multicast authentication scheme using DTLS and solve the existing security problem.
在物联网环境中,使用了许多协议,如CoAP、MQTT、XMPP。特别是,CoAP支持许多物联网环境的轻量级。CoAP与DTLS一起使用,CoAP的安全性取决于DTLS的安全性。DTLS也支持多播,但存在缺乏身份验证的问题,例如在注册阶段不验证相互身份验证。这将导致不谨慎的组参与,这是一个安全问题,并可能导致性能下降。因此,本文提出了一种基于DTLS的安全组播认证方案,解决了现有的安全问题。
{"title":"Secure multicast authentication scheme using DTLS","authors":"Si-Jae Woo, Jin Kwak","doi":"10.1109/CAIPT.2017.8320707","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320707","url":null,"abstract":"In the IoT environment, many protocols are used such as CoAP, MQTT, XMPP. Especially, CoAP supports lightweight for many IoT environment. CoAP is used with DTLS and the security of CoAP depends on the DTLS's. DTLS also supports multicast, but there is some problem with absence of authentication, such as not verifying mutual authentication at the registration phase. This leads to indiscreet group participation, which is a security problem and can cause performance decreasing. In this paper, therefore, we propose a secure multicast authentication scheme using DTLS and solve the existing security problem.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127991244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A key distribution system for user authentication using pairing-based in a WSN 一种基于配对的无线传感器网络用户认证密钥分发系统
Gun-Wook Choi, Imyeong Lee
Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. Thus, this study has been designed to enable the facility of anonymous user authentication and session key distribution in the transmission of sensitive data more securely by means of communication pairing with sensors. It also provides user anonymity on the network so that the identity of the sender or recipient cannot be verified, and proposes a secure protocol against denial-of-service attacks and spoofing attacks.
如今,由于物联网的出现,无线传感器网络得到了广泛的应用。这些网络在暴露的环境中通信,因此它们很容易被攻击者拦截。此外,由于其本身的性质,无线传感器网络环境在处理由于轻型安全系统而产生的潜在敏感信息的能力方面受到限制。因此,本研究旨在通过与传感器的通信配对,使敏感数据传输中的匿名用户认证和会话密钥分发设施更加安全。它还在网络上提供用户匿名性,使发送方或接收方的身份无法验证,并提出了一种针对拒绝服务攻击和欺骗攻击的安全协议。
{"title":"A key distribution system for user authentication using pairing-based in a WSN","authors":"Gun-Wook Choi, Imyeong Lee","doi":"10.1109/CAIPT.2017.8320722","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320722","url":null,"abstract":"Today, wireless sensor networks are widely used due to the emergence of the Internet of Things. These networks communicate in exposed environments and as such they are susceptible to easy interception by attackers. Additionally, by its very nature, the Wireless Sensor Network environment is limited in its capacity to handle potentially sensitive information due to light security system. Thus, this study has been designed to enable the facility of anonymous user authentication and session key distribution in the transmission of sensitive data more securely by means of communication pairing with sensors. It also provides user anonymity on the network so that the identity of the sender or recipient cannot be verified, and proposes a secure protocol against denial-of-service attacks and spoofing attacks.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133953596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Live colors: Visualizing celluar automata 活的颜色:可视化细胞自动机
Hyeri Rhee, Moon-Ryul Jung, Sook-Jin Kim
We present a computer generated artwork called Live Colors implemented by using two dimensional Cellular Automata. Each cell of the automata encodes a color. The main goal of this artwork is to generate color patterns starting from the initial images. This paper discusses the concepts, design, and implementation of the system. The basic idea of color pattern generation rules is growing regions around each cell. Three automata are presented. The rules of each automaton consist of two steps. Given each given cell, the first step chooses a neighbor cell for region growing, that is, a neighbor that would belong to the same region as the given cell. The second step determines the color of the given cell out of the color of the chosen neighbor. The first and second automata tend to generate soft regions and boundaries. The third automaton tends to generate sharp regions and boundaries. The images generated by the cell transition rules create various colors and patterns difficult to imagine when mixing colors and drawing patterns by hands. Our automata are examples of cellular automata cleverly designed for growing color regions in the style of colorfield painting and hard-edge painting.
我们提出了一个计算机生成的艺术作品,称为Live Colors,通过使用二维细胞自动机实现。自动机的每个单元都编码一种颜色。这个艺术作品的主要目标是从最初的图像开始生成颜色图案。本文讨论了该系统的概念、设计和实现。颜色模式生成规则的基本思想是在每个细胞周围生长区域。提出了三个自动机。每个自动机的规则由两个步骤组成。给定每个给定单元,第一步为区域生长选择一个相邻单元,即与给定单元属于同一区域的邻居。第二步从所选邻居的颜色中确定给定单元格的颜色。第一和第二自动机倾向于生成软区域和边界。第三种自动机倾向于产生尖锐的区域和边界。单元格过渡规则生成的图像产生了各种颜色和图案,在混合颜色和手工绘制图案时难以想象。我们的自动机是细胞自动机的例子,它被巧妙地设计为在色场绘画和硬边绘画的风格中生长颜色区域。
{"title":"Live colors: Visualizing celluar automata","authors":"Hyeri Rhee, Moon-Ryul Jung, Sook-Jin Kim","doi":"10.1109/CAIPT.2017.8320744","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320744","url":null,"abstract":"We present a computer generated artwork called Live Colors implemented by using two dimensional Cellular Automata. Each cell of the automata encodes a color. The main goal of this artwork is to generate color patterns starting from the initial images. This paper discusses the concepts, design, and implementation of the system. The basic idea of color pattern generation rules is growing regions around each cell. Three automata are presented. The rules of each automaton consist of two steps. Given each given cell, the first step chooses a neighbor cell for region growing, that is, a neighbor that would belong to the same region as the given cell. The second step determines the color of the given cell out of the color of the chosen neighbor. The first and second automata tend to generate soft regions and boundaries. The third automaton tends to generate sharp regions and boundaries. The images generated by the cell transition rules create various colors and patterns difficult to imagine when mixing colors and drawing patterns by hands. Our automata are examples of cellular automata cleverly designed for growing color regions in the style of colorfield painting and hard-edge painting.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination of interface design attributes on e-learning based on user personality characteristics 基于用户个性特征的电子学习界面设计属性确定
Supangat, Ery Sadewa Yudha
The process of developing e-learning is quite rapidly along with the development of information technology itself. The use of e-learning to enhance participants' learning abilities in previous periods focused on features with static and similar interfaces. The next thing to keep in mind is ensuring that learning through e-learning programs should be a priority in designing instruction for e-learning itself. In this connection, constructivism learning theory, which focuses on building knowledge based on past participants' experience, is highly applicable to e-learning because of the certainty of the learning process among the participants. In this study, researchers developed an interface design for e-learning applications tailored to the characteristics of user groups. The results of the study with case studies involving class participants basic programming concepts, shows there are two groups of user characteristics e-learning, namely introvert and extrovert. From the results of the training process and the homogeneous population testing of 338 (three hundred and thirty eight) data sets consisting of 233 training datasets and 105 test datasets, introverted groups, has a composition of values, namely: {Times New Roman, Blue, White} and {White, Black, Calibri}, while the extrovert group, there is no dominant combination favored by this type, and the results are identical to the result of the testing process, i.e Blue as the foreground color and White as the background color.
随着信息技术本身的发展,电子学习的发展进程也十分迅速。在之前的阶段,使用电子学习来提高参与者的学习能力主要集中在静态和类似界面的特征上。要记住的下一件事是确保通过电子学习程序学习应该是设计电子学习本身的指导的优先事项。在这方面,建构主义学习理论侧重于根据过去参与者的经验构建知识,由于参与者之间的学习过程具有确定性,因此它非常适用于电子学习。在这项研究中,研究人员开发了一种针对用户群体特征的电子学习应用程序界面设计。本研究以个案研究的方式,涉及课堂参与者的基本程式设计概念,结果显示电子学习有两组使用者特征,即内向型与外向型。由233个训练数据集和105个测试数据集组成的338(三百三十八)个数据集的训练过程和同质总体检验结果来看,内向群体具有一个组成值,即:{Times New Roman, Blue, White}和{White, Black, Calibri},而外向组,没有优势组合青睐该类型,结果与测试过程的结果相同,即蓝色为前景色,白色为背景色。
{"title":"Determination of interface design attributes on e-learning based on user personality characteristics","authors":"Supangat, Ery Sadewa Yudha","doi":"10.1109/CAIPT.2017.8320676","DOIUrl":"https://doi.org/10.1109/CAIPT.2017.8320676","url":null,"abstract":"The process of developing e-learning is quite rapidly along with the development of information technology itself. The use of e-learning to enhance participants' learning abilities in previous periods focused on features with static and similar interfaces. The next thing to keep in mind is ensuring that learning through e-learning programs should be a priority in designing instruction for e-learning itself. In this connection, constructivism learning theory, which focuses on building knowledge based on past participants' experience, is highly applicable to e-learning because of the certainty of the learning process among the participants. In this study, researchers developed an interface design for e-learning applications tailored to the characteristics of user groups. The results of the study with case studies involving class participants basic programming concepts, shows there are two groups of user characteristics e-learning, namely introvert and extrovert. From the results of the training process and the homogeneous population testing of 338 (three hundred and thirty eight) data sets consisting of 233 training datasets and 105 test datasets, introverted groups, has a composition of values, namely: {Times New Roman, Blue, White} and {White, Black, Calibri}, while the extrovert group, there is no dominant combination favored by this type, and the results are identical to the result of the testing process, i.e Blue as the foreground color and White as the background color.","PeriodicalId":351075,"journal":{"name":"2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131613593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1