首页 > 最新文献

2011 Sixth International Conference on Digital Information Management最新文献

英文 中文
Index-based n-gram extraction from large document collections 从大型文档集合中基于索引的n-gram提取
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093324
M. Krátký, Radim Bača, D. Bednář, J. Walder, J. Dvorský, P. Chovanec
N-grams are applied in some applications searching in text documents, especially in cases when one must work with phrases, e.g. in plagiarism detection. N-gram is a sequence of n terms (or generally tokens) from a document. We get a set of n-grams by moving a floating window from the begin to the end of the document. During the extraction we must remove duplicate n-grams and we must store additional values to each n-gram type, e.g. n-gram type frequency for each document and so on, it depends on a query model used. Previous works utilize a sorting algorithm to compute the n-gram frequency. These approaches must handle a high number of the same n-grams resulting in high time and space overhead. Moreover, these techniques are often main-memory only, it means they must be executed for small or middle size collections. In this paper, we show an index-based method to the n-gram extraction for large collections. This method utilizes common data structures like B+-tree and Hash table. We show the scalability of our method by presenting experiments with the gigabytes collection.
N-grams应用于文本文档的搜索,特别是在必须处理短语的情况下,例如在抄袭检测中。n -gram是来自文档的n个项(通常是令牌)的序列。通过将浮动窗口从文档的开头移动到末尾,我们得到一组n-gram。在提取过程中,我们必须删除重复的n-gram,并且我们必须为每个n-gram类型存储额外的值,例如每个文档的n-gram类型频率等等,这取决于所使用的查询模型。以前的工作利用排序算法来计算n-gram频率。这些方法必须处理大量相同的n-gram,从而导致高时间和空间开销。此外,这些技术通常只在主存中使用,这意味着它们必须用于小型或中型集合。在本文中,我们展示了一种基于索引的方法来提取大型集合的n-gram。这种方法利用了常用的数据结构,如B+树和哈希表。我们通过展示千兆字节集合的实验来展示我们方法的可伸缩性。
{"title":"Index-based n-gram extraction from large document collections","authors":"M. Krátký, Radim Bača, D. Bednář, J. Walder, J. Dvorský, P. Chovanec","doi":"10.1109/ICDIM.2011.6093324","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093324","url":null,"abstract":"N-grams are applied in some applications searching in text documents, especially in cases when one must work with phrases, e.g. in plagiarism detection. N-gram is a sequence of n terms (or generally tokens) from a document. We get a set of n-grams by moving a floating window from the begin to the end of the document. During the extraction we must remove duplicate n-grams and we must store additional values to each n-gram type, e.g. n-gram type frequency for each document and so on, it depends on a query model used. Previous works utilize a sorting algorithm to compute the n-gram frequency. These approaches must handle a high number of the same n-grams resulting in high time and space overhead. Moreover, these techniques are often main-memory only, it means they must be executed for small or middle size collections. In this paper, we show an index-based method to the n-gram extraction for large collections. This method utilizes common data structures like B+-tree and Hash table. We show the scalability of our method by presenting experiments with the gigabytes collection.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A PPDM model using Bayesian Network for hiding sensitive XML Association Rules 一个使用贝叶斯网络隐藏敏感XML关联规则的PPDM模型
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093345
Khalid Iqbal, S. Asghar, S. Fong
Association Rule Mining (ARM) was introduced for the market basket analysis where items that are frequently appeared together per transaction are identified as rules. In such mining process, sensitivity issue of rules has never been addressed for more than a decade. Thus, research on guarding sensitivity in ARM should be attended to in priority by researchers, so that the risk of sensitive information disclosure can be avoided especially when the data sources are being shared. In this paper, we presented a Mode-based PPDM model via Bayesian Network (BN) which can reliably hide away sensitive rules in ARM. Such reliability was never studied nor reported in the literature of XML domain of PPDM. One useful advantage of PPDM model is its ability to unfasten a variety of directions that could be effectively used to overcome disclosure risk in XML Association Rules (XARs). Moreover, PPDM model is known to benefit businesses even in absolute competitive environment.
关联规则挖掘(ARM)是为市场购物篮分析而引入的,在这种分析中,每笔交易中经常出现的项目被标识为规则。在这种采矿过程中,规则的敏感性问题十多年来从未得到解决。因此,研究人员应优先关注ARM中敏感保护的研究,以避免敏感信息泄露的风险,特别是在数据源共享的情况下。本文提出了一种基于贝叶斯网络(BN)的基于模型的PPDM模型,该模型可以可靠地隐藏ARM中的敏感规则。这种可靠性在PPDM的XML领域的文献中从未被研究或报道过。PPDM模型的一个有用的优点是它能够解开各种方向,这些方向可以有效地用于克服XML关联规则(XML Association Rules, xar)中的披露风险。此外,众所周知,即使在绝对竞争的环境中,PPDM模式也有利于企业。
{"title":"A PPDM model using Bayesian Network for hiding sensitive XML Association Rules","authors":"Khalid Iqbal, S. Asghar, S. Fong","doi":"10.1109/ICDIM.2011.6093345","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093345","url":null,"abstract":"Association Rule Mining (ARM) was introduced for the market basket analysis where items that are frequently appeared together per transaction are identified as rules. In such mining process, sensitivity issue of rules has never been addressed for more than a decade. Thus, research on guarding sensitivity in ARM should be attended to in priority by researchers, so that the risk of sensitive information disclosure can be avoided especially when the data sources are being shared. In this paper, we presented a Mode-based PPDM model via Bayesian Network (BN) which can reliably hide away sensitive rules in ARM. Such reliability was never studied nor reported in the literature of XML domain of PPDM. One useful advantage of PPDM model is its ability to unfasten a variety of directions that could be effectively used to overcome disclosure risk in XML Association Rules (XARs). Moreover, PPDM model is known to benefit businesses even in absolute competitive environment.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Online ngram-enhanced topic model for academic retrieval 用于学术检索的在线ngram增强主题模型
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093316
Han Wang, B. Lang
Applying topic model to text mining has achieved a great success. However, state-of-art topic modeling methods still have potential to improve in academic retrieval field. In this paper, we propose an online unified topic model, which is ngram-enhanced. Our model discovers topics with unigrams as well as topical bigrams and is updated by an online inference algorithm with the new incoming data streams. On this basis, we combine our model into the query likelihood model and develop an integrated academic searching system. Experiment results on ACM collection show that our proposed methods outperform the existing approaches on document modeling and searching accuracy. Especially, we prove the efficiency of our system on academic retrieval problem.
将主题模型应用于文本挖掘已经取得了巨大的成功。然而,目前的主题建模方法在学术检索领域仍有很大的发展空间。本文提出了一种基于语法增强的在线统一主题模型。我们的模型发现具有双元图和主题双元图的主题,并使用新的传入数据流通过在线推理算法进行更新。在此基础上,我们将模型与查询似然模型结合,开发了一个集成的学术搜索系统。在ACM集合上的实验结果表明,我们提出的方法在文档建模和搜索精度上都优于现有的方法。特别是在学术检索问题上,我们证明了系统的有效性。
{"title":"Online ngram-enhanced topic model for academic retrieval","authors":"Han Wang, B. Lang","doi":"10.1109/ICDIM.2011.6093316","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093316","url":null,"abstract":"Applying topic model to text mining has achieved a great success. However, state-of-art topic modeling methods still have potential to improve in academic retrieval field. In this paper, we propose an online unified topic model, which is ngram-enhanced. Our model discovers topics with unigrams as well as topical bigrams and is updated by an online inference algorithm with the new incoming data streams. On this basis, we combine our model into the query likelihood model and develop an integrated academic searching system. Experiment results on ACM collection show that our proposed methods outperform the existing approaches on document modeling and searching accuracy. Especially, we prove the efficiency of our system on academic retrieval problem.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114985882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Query optimization in information integration for queries involving aggregation and group by 信息集成中涉及聚合和分组查询的查询优化
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093349
Wejdan Alkaldi, F. Sadri
This paper addresses the efficient processing of queries involving aggregation and group-by in the semantic-model approach to information integration. Query processing algorithms materialization, subqueries, and wrapper have been extended for such aggregate queries. Algorithms have been presented for two cases: In the first case information at different sources are disjoint, while in the second case information sources may contain overlapping information.
本文研究了信息集成的语义模型方法中涉及聚合和分组的查询的高效处理。针对这种聚合查询,查询处理算法物化、子查询和包装器得到了扩展。针对两种情况提出了算法:在第一种情况下,不同来源的信息是不相交的,而在第二种情况下,信息源可能包含重叠信息。
{"title":"Query optimization in information integration for queries involving aggregation and group by","authors":"Wejdan Alkaldi, F. Sadri","doi":"10.1109/ICDIM.2011.6093349","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093349","url":null,"abstract":"This paper addresses the efficient processing of queries involving aggregation and group-by in the semantic-model approach to information integration. Query processing algorithms materialization, subqueries, and wrapper have been extended for such aggregate queries. Algorithms have been presented for two cases: In the first case information at different sources are disjoint, while in the second case information sources may contain overlapping information.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintaining imbalance highly dependent medical data using dirichlet process data generation 使用狄利克雷过程数据生成来维护不平衡的高度依赖的医疗数据
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093359
Tieta Antaresti, M. I. Fanany, A. M. Arymurthy
The existence of imbalanced data between one class and another class is an important issue to be considered in a classification problem. One of the well-known data balancing technique is the artificial oversampling, which increase the size of datasets. In this research, multinomial classification was applied to classify some recorded features obtained from a single ECG (electrocardiograph) sensor. Therefore, a Dirichlet process, a dirichlet distribution of cumulative distribution function of each data partition, was needed to model the distribution of the new generated data by also considering the statistical properties of the previous data. Data balancing process had given the result of 77.21% classification accuracy (CA), and 90.9% area under ROC curve (AUC).
一类数据与另一类数据之间是否存在不平衡是分类问题中需要考虑的一个重要问题。人工过采样是众所周知的数据平衡技术之一,它增加了数据集的大小。在这项研究中,多项分类被用于分类从单个心电(心电图)传感器获得的一些记录特征。因此,需要Dirichlet过程,即每个数据分区的累积分布函数的Dirichlet分布,在考虑之前数据的统计特性的情况下,对新生成数据的分布进行建模。经数据平衡处理,分类准确率(CA)为77.21%,ROC曲线下面积(AUC)为90.9%。
{"title":"Maintaining imbalance highly dependent medical data using dirichlet process data generation","authors":"Tieta Antaresti, M. I. Fanany, A. M. Arymurthy","doi":"10.1109/ICDIM.2011.6093359","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093359","url":null,"abstract":"The existence of imbalanced data between one class and another class is an important issue to be considered in a classification problem. One of the well-known data balancing technique is the artificial oversampling, which increase the size of datasets. In this research, multinomial classification was applied to classify some recorded features obtained from a single ECG (electrocardiograph) sensor. Therefore, a Dirichlet process, a dirichlet distribution of cumulative distribution function of each data partition, was needed to model the distribution of the new generated data by also considering the statistical properties of the previous data. Data balancing process had given the result of 77.21% classification accuracy (CA), and 90.9% area under ROC curve (AUC).","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121397495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effect of user search behaviour on web information gathering tasks 用户搜索行为对网络信息收集任务的影响
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093353
Anwar Alhenshiri, Hoda Badesh
Research has identified high level tasks in activities users perform on the web. Amongst those tasks is information gathering. This type of task is complex, exploratory, and it usually requires more user effort than other tasks. During the task of information gathering, users may follow one or more types of search behaviour. This paper investigates the effect of the user search behaviour on the task of information gathering on the web. Activities users perform on the web during information gathering and their correlation with the type of behaviour followed by the user were examined. The research draws recommendations for further studies that may concern developing tools for supporting web information gathering tasks according to the user search behaviour
研究已经确定了用户在网络上执行的活动中的高级任务。其中一项任务是信息收集。这种类型的任务是复杂的、探索性的,通常比其他任务需要更多的用户努力。在信息收集的过程中,用户可能遵循一种或多种类型的搜索行为。本文研究了用户搜索行为对网络信息收集任务的影响。研究了用户在信息收集过程中在网络上进行的活动及其与用户所遵循的行为类型的相关性。这项研究为进一步的研究提供了建议,这些研究可能涉及开发工具来支持根据用户搜索行为收集网络信息的任务
{"title":"The effect of user search behaviour on web information gathering tasks","authors":"Anwar Alhenshiri, Hoda Badesh","doi":"10.1109/ICDIM.2011.6093353","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093353","url":null,"abstract":"Research has identified high level tasks in activities users perform on the web. Amongst those tasks is information gathering. This type of task is complex, exploratory, and it usually requires more user effort than other tasks. During the task of information gathering, users may follow one or more types of search behaviour. This paper investigates the effect of the user search behaviour on the task of information gathering on the web. Activities users perform on the web during information gathering and their correlation with the type of behaviour followed by the user were examined. The research draws recommendations for further studies that may concern developing tools for supporting web information gathering tasks according to the user search behaviour","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"82 299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125965631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian based subgroup discovery 基于贝叶斯的子组发现
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093343
T. Anwar, S. Asghar, S. Fong
Data Mining is concerned with extraction of interesting patterns or knowledge from huge amounts of Data. Generally data mining tasks are either predictive or descriptive. Classification falls under predictive induction while clustering and association rule mining fall under descriptive induction. Subgroup discovery is a task at the intersection of supervised learning and descriptive induction. In subgroup discovery we want to uncover individual patterns in data with a given property of interest. We want to find subgroups that cover a large population and are statistically different. The main application areas of subgroup discovery are exploration and descriptive induction, where the user wants to find the overview of dependencies between a target and many explaining variables. Many techniques have been proposed for discovering subgroups and some of these techniques are based on classification. But none of the techniques uses Bayesian networks for the generation of subgroups. Our contributions include a technique for the discovery of subgroups where the subgroups are generated using Bayesian networks.
数据挖掘涉及从大量数据中提取有趣的模式或知识。通常,数据挖掘任务要么是预测性的,要么是描述性的。分类属于预测归纳,聚类和关联规则挖掘属于描述性归纳。子群发现是监督学习和描述归纳法的交叉任务。在子组发现中,我们希望发现具有给定感兴趣属性的数据中的单个模式。我们想要找到覆盖大量人口并且在统计上有所不同的亚群。子组发现的主要应用领域是探索和描述性归纳,其中用户希望找到目标和许多解释变量之间的依赖关系的概述。已经提出了许多用于发现子组的技术,其中一些技术是基于分类的。但是这些技术都没有使用贝叶斯网络来生成子群。我们的贡献包括一种发现子组的技术,其中子组是使用贝叶斯网络生成的。
{"title":"Bayesian based subgroup discovery","authors":"T. Anwar, S. Asghar, S. Fong","doi":"10.1109/ICDIM.2011.6093343","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093343","url":null,"abstract":"Data Mining is concerned with extraction of interesting patterns or knowledge from huge amounts of Data. Generally data mining tasks are either predictive or descriptive. Classification falls under predictive induction while clustering and association rule mining fall under descriptive induction. Subgroup discovery is a task at the intersection of supervised learning and descriptive induction. In subgroup discovery we want to uncover individual patterns in data with a given property of interest. We want to find subgroups that cover a large population and are statistically different. The main application areas of subgroup discovery are exploration and descriptive induction, where the user wants to find the overview of dependencies between a target and many explaining variables. Many techniques have been proposed for discovering subgroups and some of these techniques are based on classification. But none of the techniques uses Bayesian networks for the generation of subgroups. Our contributions include a technique for the discovery of subgroups where the subgroups are generated using Bayesian networks.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127150904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multisensor fusion-based object detection and tracking using Active Shape Model 基于主动形状模型的多传感器融合目标检测与跟踪
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093321
Dongeun Lee, Sunghoon Choi
This paper proposes automatic target detection and tracking system using Active Shape Model (ASM). Existing model based approaches for tracking are either manually initiated or need some form of user interaction to locate the object in images. Also the low light environmental conditions for surveillance systems make the tracking further harder. Hence the proposed system makes use of multiple sensors in the form of IR and visible cameras to enable tracking in degraded and low light environments. The proposed algorithm consists of the following stages: (i) input image evaluation for obtaining the conditions under which the camera is placed, (ii) an integrated motion detector and target tracker, (iii) active shape tracker(AST) for performing tracking, (iv) update of tracking results for real time tracking of targets. In the first stage the input image is evaluated for the lighting conditions. If the lighting conditions are poor then IR sensor is integrated with the CCD sensor for tracking applications. In the second stage the motion detector and region tracker are used to provide feedback to AST for automatic initialization of tracking. Tracking is carried out in the third stage using ASM. The final stage extracts the parameters and tracking information and applies it to the next frame if the tracking is carried out in real time. The major contribution this work lies in the integration for a completed system, which covers from image processing to tracking algorithms. The approach of combining multiple algorithms succeeds in overcoming fundamental limitations of tracking and at the same time realizes real time implementation. Experimental results show that the proposed algorithm can track people under various environment in real-time. The proposed system has potential uses in the area of surveillance, shape analysis, and model-based coding.
提出了一种基于主动形状模型(ASM)的目标自动检测与跟踪系统。现有的基于模型的跟踪方法要么是手动启动的,要么需要某种形式的用户交互来定位图像中的对象。此外,监视系统的低光环境条件使跟踪更加困难。因此,提出的系统利用红外和可见光相机形式的多个传感器来实现退化和弱光环境下的跟踪。提出的算法包括以下几个阶段:(i)输入图像评估以获得摄像机的放置条件;(ii)集成运动检测器和目标跟踪器;(iii)执行跟踪的主动形状跟踪器(AST); (iv)跟踪结果更新以实时跟踪目标。在第一阶段,根据光照条件对输入图像进行评估。如果照明条件差,则红外传感器与CCD传感器集成,用于跟踪应用。第二阶段利用运动检测器和区域跟踪器向AST提供反馈,实现跟踪的自动初始化。跟踪在第三阶段使用ASM进行。如果是实时跟踪,则最后阶段提取参数和跟踪信息,并将其应用于下一帧。这项工作的主要贡献在于集成了一个完整的系统,包括从图像处理到跟踪算法。多算法结合的方法成功地克服了跟踪的基本限制,同时实现了实时性。实验结果表明,该算法能够实时跟踪不同环境下的人。所提出的系统在监视、形状分析和基于模型的编码领域具有潜在的用途。
{"title":"Multisensor fusion-based object detection and tracking using Active Shape Model","authors":"Dongeun Lee, Sunghoon Choi","doi":"10.1109/ICDIM.2011.6093321","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093321","url":null,"abstract":"This paper proposes automatic target detection and tracking system using Active Shape Model (ASM). Existing model based approaches for tracking are either manually initiated or need some form of user interaction to locate the object in images. Also the low light environmental conditions for surveillance systems make the tracking further harder. Hence the proposed system makes use of multiple sensors in the form of IR and visible cameras to enable tracking in degraded and low light environments. The proposed algorithm consists of the following stages: (i) input image evaluation for obtaining the conditions under which the camera is placed, (ii) an integrated motion detector and target tracker, (iii) active shape tracker(AST) for performing tracking, (iv) update of tracking results for real time tracking of targets. In the first stage the input image is evaluated for the lighting conditions. If the lighting conditions are poor then IR sensor is integrated with the CCD sensor for tracking applications. In the second stage the motion detector and region tracker are used to provide feedback to AST for automatic initialization of tracking. Tracking is carried out in the third stage using ASM. The final stage extracts the parameters and tracking information and applies it to the next frame if the tracking is carried out in real time. The major contribution this work lies in the integration for a completed system, which covers from image processing to tracking algorithms. The approach of combining multiple algorithms succeeds in overcoming fundamental limitations of tracking and at the same time realizes real time implementation. Experimental results show that the proposed algorithm can track people under various environment in real-time. The proposed system has potential uses in the area of surveillance, shape analysis, and model-based coding.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks 基于有限状态机的自组织网络异常节点检测新方法
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093331
Dina Sadat Jalali, Alireza Shahrbanoonezhad
In this paper we express a new intrusion detection system based FSM (Finite State Machine) in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing and overall network reduce performance. The presented approach based on FSM focuses at recognizing the malicious nodes within the network in a fast and accurate way, then it deals with rapid introduction of the malicious nodes to other nodes in the network to prevent sending multiple packets and drop and packet change. Finally, we will show the significant improvement of some factors in comparison with other last works and we simulated our methods by NS2 software.
本文提出了一种基于有限状态机的自组织网络入侵检测系统。安全是当前网络中最重要的问题之一。移动自组织网络中最常见的攻击案例可能是路由数据包的丢失和传入数据包的改变,其目的是破坏网络路由和降低整个网络的性能。该方法首先对网络中的恶意节点进行快速、准确的识别,然后将恶意节点快速引入到网络中的其他节点中,以防止发送多包、丢包和包变化。最后,我们将展示一些因素与其他作品相比有显著改善,并通过NS2软件对我们的方法进行了模拟。
{"title":"A new method based on Finite State Machine for detecting misbehaving nodes in ad hoc networks","authors":"Dina Sadat Jalali, Alireza Shahrbanoonezhad","doi":"10.1109/ICDIM.2011.6093331","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093331","url":null,"abstract":"In this paper we express a new intrusion detection system based FSM (Finite State Machine) in ad hoc networks. Security is one of the most important issues in current networks. The most common cases of attacks in mobile Ad hoc networks can be drop of routing packages and changes in the incoming packet which aims at disrupting the network routing and overall network reduce performance. The presented approach based on FSM focuses at recognizing the malicious nodes within the network in a fast and accurate way, then it deals with rapid introduction of the malicious nodes to other nodes in the network to prevent sending multiple packets and drop and packet change. Finally, we will show the significant improvement of some factors in comparison with other last works and we simulated our methods by NS2 software.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of P2P streaming systems for webcast 网络直播P2P流媒体系统的评价
Pub Date : 2011-12-01 DOI: 10.1109/ICDIM.2011.6093352
Y. Gotoh, Kentaro Suzuki, T. Yoshihisa, H. Taniguchi, M. Kanazawa
Due to the recent spread of streaming delivery of movies, streaming using Peer-to-Peer (P2P) streaming technology has attracted much attention. In P2P streaming systems, to distribute the network load, peers from which the user receives data is selected at random. For this, clients have to wait until their desired data is delivered. Therefore, there are many researches to reduce the waiting time. However, because of the complexity of the implementation, they usually evaluate these methods using computer simulations. In actual environment, indeed, interruption time is not always reduced by increasing clients to deliver data. To evaluate the effectiveness of P2P streaming systems, it is important to implement an actual P2P streaming system. In this paper, we evaluate a P2P streaming system. By using our implemented P2P streaming system, we investigate situations that its system is effective. As a result of our evaluation, we confirmed that interruption time is reduced effectively.
近年来,随着电影流媒体传输的普及,利用P2P流媒体技术进行流媒体传输受到了广泛关注。在P2P流媒体系统中,为了分配网络负载,用户接收数据的对等点是随机选择的。为此,客户机必须等待所需的数据交付。因此,减少等待时间的研究很多。然而,由于实现的复杂性,他们通常使用计算机模拟来评估这些方法。实际上,在实际环境中,并不总是通过增加客户机来交付数据来减少中断时间。为了评估P2P流媒体系统的有效性,重要的是实现一个实际的P2P流媒体系统。在本文中,我们评估了一个P2P流媒体系统。通过我们所实现的P2P流媒体系统,我们考察了系统的有效性。经过评估,我们确认中断时间有效地减少了。
{"title":"Evaluation of P2P streaming systems for webcast","authors":"Y. Gotoh, Kentaro Suzuki, T. Yoshihisa, H. Taniguchi, M. Kanazawa","doi":"10.1109/ICDIM.2011.6093352","DOIUrl":"https://doi.org/10.1109/ICDIM.2011.6093352","url":null,"abstract":"Due to the recent spread of streaming delivery of movies, streaming using Peer-to-Peer (P2P) streaming technology has attracted much attention. In P2P streaming systems, to distribute the network load, peers from which the user receives data is selected at random. For this, clients have to wait until their desired data is delivered. Therefore, there are many researches to reduce the waiting time. However, because of the complexity of the implementation, they usually evaluate these methods using computer simulations. In actual environment, indeed, interruption time is not always reduced by increasing clients to deliver data. To evaluate the effectiveness of P2P streaming systems, it is important to implement an actual P2P streaming system. In this paper, we evaluate a P2P streaming system. By using our implemented P2P streaming system, we investigate situations that its system is effective. As a result of our evaluation, we confirmed that interruption time is reduced effectively.","PeriodicalId":355775,"journal":{"name":"2011 Sixth International Conference on Digital Information Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115379764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2011 Sixth International Conference on Digital Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1