首页 > 最新文献

2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)最新文献

英文 中文
Embedded System Design for Visual Scene Classification 视觉场景分类的嵌入式系统设计
Sumair Aziz, Zeshan Kareem, Muhammad Umar Khan, Muhammad Atif Imtiaz
Computer vision and robotics community is experiencing growing interest in visual scene classification due to availability of low cost and compact visual sensing devices. This paper presents framework aimed at embedded system design for visual scene classification. In the proposed framework we used data fusion of local and global descriptors as feature vectors for scene classification. We construct feature vector by integrating Local Quinary Patterns (LQP), Bag of Visual Words (BoW) and Histogram of Oriented Gradients (HOG). For classification multiclass Support Vector Machines (SVM) is used. Experiments are performed on publicly available MIT indoor scene classification database. Comparison of our approach with other methods show that our approach is efficient in terms of overall accuracy.
由于低成本和紧凑的视觉传感设备的可用性,计算机视觉和机器人社区对视觉场景分类的兴趣日益浓厚。本文提出了一种用于嵌入式系统视觉场景分类的框架。在该框架中,我们将局部描述符和全局描述符的数据融合作为场景分类的特征向量。我们通过整合局部五元模式(LQP)、视觉词袋(BoW)和定向梯度直方图(HOG)来构造特征向量。采用多类支持向量机(SVM)进行分类。实验在公开的MIT室内场景分类数据库上进行。与其他方法的比较表明,我们的方法在总体精度方面是有效的。
{"title":"Embedded System Design for Visual Scene Classification","authors":"Sumair Aziz, Zeshan Kareem, Muhammad Umar Khan, Muhammad Atif Imtiaz","doi":"10.1109/IEMCON.2018.8614864","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614864","url":null,"abstract":"Computer vision and robotics community is experiencing growing interest in visual scene classification due to availability of low cost and compact visual sensing devices. This paper presents framework aimed at embedded system design for visual scene classification. In the proposed framework we used data fusion of local and global descriptors as feature vectors for scene classification. We construct feature vector by integrating Local Quinary Patterns (LQP), Bag of Visual Words (BoW) and Histogram of Oriented Gradients (HOG). For classification multiclass Support Vector Machines (SVM) is used. Experiments are performed on publicly available MIT indoor scene classification database. Comparison of our approach with other methods show that our approach is efficient in terms of overall accuracy.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"28 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Smart Mirror - a Secured Application of Artificial Intelligence Recognizing Human Face and Voice 智能镜子——人工智能识别人脸和声音的安全应用
Koushiki Mukhopadhyay, Chandrava Sinha, Himadri Nath Saha, Sukanya Rakshit, Supratim Auddy
Smart mirrors are a brand new addition to the IoT product family that has been obtaining a great deal of attention in recent years by each industrial makers and hobbyists. This paper describes the planning associated implementation of a voice controlled wall mirror, referred to as “Magic Mirror” with Artificial Intelligence for the home environment. It is a mirror, which can display real time content like time, date, weather and news at the same time. The Magic Mirror consists of functionalities like real time information and data updates, voice commands, face recognition. The user can control the magic mirror by voice commands.
智能镜子是物联网产品家族的一个全新成员,近年来一直受到每个工业制造商和爱好者的极大关注。本文描述了一个语音控制的墙镜的规划相关实施,被称为“魔镜”与人工智能的家庭环境。它是一面镜子,可以同时显示时间、日期、天气和新闻等实时内容。魔镜包括实时信息和数据更新、语音命令、面部识别等功能。用户可以通过语音命令控制魔镜。
{"title":"Smart Mirror - a Secured Application of Artificial Intelligence Recognizing Human Face and Voice","authors":"Koushiki Mukhopadhyay, Chandrava Sinha, Himadri Nath Saha, Sukanya Rakshit, Supratim Auddy","doi":"10.1109/IEMCON.2018.8615072","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615072","url":null,"abstract":"Smart mirrors are a brand new addition to the IoT product family that has been obtaining a great deal of attention in recent years by each industrial makers and hobbyists. This paper describes the planning associated implementation of a voice controlled wall mirror, referred to as “Magic Mirror” with Artificial Intelligence for the home environment. It is a mirror, which can display real time content like time, date, weather and news at the same time. The Magic Mirror consists of functionalities like real time information and data updates, voice commands, face recognition. The user can control the magic mirror by voice commands.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114321115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Browser Cookies for Event Monitoring and User Verification of an Account 使用浏览器cookie进行事件监控和用户帐户验证
Pritam Paul, B. Biswas, Zubayr Khalid, Shuva Biswas, Nixon Dutta, Himadri Nath Saha, Mautushi Das
In a server-based system where end users use their own account to get connection to the server and possibly other accounts, encapsulation and protection of data of the accounts is a big factor. The administrator must be aware of data security of an account, so that it is not passed to any third party. Another job of administrator is to monitor the identity of the user of an account, which unfortunately is not taken care of most of the times. A third job that an administrator should take care of is monitoring the events in an account - such as devices used to open the website or whether more than one device is using a single account at the same time. In this paper, we have given a concept of using browser cookies effectively in order to monitor the identity of user and the events in an account. In this context we have managed to give solution for three different problems - a) Possibility and technology approach of how to control who is using login/password system; b) The login/password information is not passed to other person for use without the notice of administrator team; c) Ability to identify simultaneous use of login/password. We have used cookies for 2 different parameters - a) Protocol id: A unique id for each and every protocol (i.e., browser + device system); and b) Client id: Varies whenever the user changes his protocol, even if he opens the same account. Our system has efficiency to give solutions of all the said problems.
在基于服务器的系统中,最终用户使用自己的帐户连接到服务器,也可能连接到其他帐户,因此帐户数据的封装和保护是一个重要因素。管理员必须注意帐户的数据安全,以免将其传递给第三方。管理员的另一项工作是监视帐户用户的身份,不幸的是,大多数时候都没有注意到这一点。管理员应该负责的第三项工作是监控帐户中的事件,例如用于打开网站的设备,或者是否有多个设备同时使用一个帐户。在本文中,我们给出了一个有效地利用浏览器cookie来监控用户身份和账户事件的概念。在这种情况下,我们已经设法为三个不同的问题提供解决方案- a)如何控制谁使用登录/密码系统的可能性和技术方法;b)未经管理员团队通知,不将登录/密码信息传递给他人使用;c)识别同时使用登录/密码的能力。我们为2个不同的参数使用了cookie - a)协议id:每个协议(即浏览器+设备系统)的唯一id;b)客户端id:随着用户更改协议而变化,即使他开设了相同的帐户。该系统能够有效地解决上述所有问题。
{"title":"Using Browser Cookies for Event Monitoring and User Verification of an Account","authors":"Pritam Paul, B. Biswas, Zubayr Khalid, Shuva Biswas, Nixon Dutta, Himadri Nath Saha, Mautushi Das","doi":"10.1109/IEMCON.2018.8615105","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8615105","url":null,"abstract":"In a server-based system where end users use their own account to get connection to the server and possibly other accounts, encapsulation and protection of data of the accounts is a big factor. The administrator must be aware of data security of an account, so that it is not passed to any third party. Another job of administrator is to monitor the identity of the user of an account, which unfortunately is not taken care of most of the times. A third job that an administrator should take care of is monitoring the events in an account - such as devices used to open the website or whether more than one device is using a single account at the same time. In this paper, we have given a concept of using browser cookies effectively in order to monitor the identity of user and the events in an account. In this context we have managed to give solution for three different problems - a) Possibility and technology approach of how to control who is using login/password system; b) The login/password information is not passed to other person for use without the notice of administrator team; c) Ability to identify simultaneous use of login/password. We have used cookies for 2 different parameters - a) Protocol id: A unique id for each and every protocol (i.e., browser + device system); and b) Client id: Varies whenever the user changes his protocol, even if he opens the same account. Our system has efficiency to give solutions of all the said problems.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116160251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Understanding Tracking Methodology of Kernelized Correlation Filter 了解核化相关滤波器的跟踪方法
Srishti Yadav, S. Payandeh
Visual tracking as a field of research has undergone tremendous progress in the past decade. Researchers around the world have presented state-of-art trackers which work in presence of occlusions, clutter, variations in illumination and many others. Despite the significant progress the challenge continues in presenting real-time trackers which are computationally efficient and accurate. Kernelized Correlation Filter (KCF) is one of the recent finding which has shown good results. Based on the idea of traditional correlational filter, it uses kernel trick and circulant matrices to significantly improve the computation speed. Given the complexity of this tracker, a clear step-by-step explanation is highly desirable in order to fully appreciate and expedite the research in real-time visual tracking. This paper aims to make the understanding of this tracker simpler for the benefit of the research community
视觉跟踪作为一个研究领域,在过去的十年中取得了巨大的进步。世界各地的研究人员已经提出了最先进的跟踪器,可以在遮挡、杂乱、光照变化和许多其他情况下工作。尽管取得了重大进展,但在提供计算效率高且准确的实时跟踪器方面仍然存在挑战。核化相关滤波器(KCF)是近年来取得良好效果的一项新发现。在传统相关滤波思想的基础上,采用核技巧和循环矩阵,大大提高了计算速度。考虑到这种跟踪器的复杂性,为了充分理解和加快实时视觉跟踪的研究,一个清晰的一步一步的解释是非常可取的。本文旨在使这个跟踪器的理解更简单,为研究界的利益
{"title":"Understanding Tracking Methodology of Kernelized Correlation Filter","authors":"Srishti Yadav, S. Payandeh","doi":"10.1109/IEMCON.2018.8614990","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614990","url":null,"abstract":"Visual tracking as a field of research has undergone tremendous progress in the past decade. Researchers around the world have presented state-of-art trackers which work in presence of occlusions, clutter, variations in illumination and many others. Despite the significant progress the challenge continues in presenting real-time trackers which are computationally efficient and accurate. Kernelized Correlation Filter (KCF) is one of the recent finding which has shown good results. Based on the idea of traditional correlational filter, it uses kernel trick and circulant matrices to significantly improve the computation speed. Given the complexity of this tracker, a clear step-by-step explanation is highly desirable in order to fully appreciate and expedite the research in real-time visual tracking. This paper aims to make the understanding of this tracker simpler for the benefit of the research community","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121642982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the Fog Node Model for Multi-purpose Fog Computing Systems 多用途雾计算系统的雾节点模型研究
Jemshit Tuvakov, Kee-Hyun Park
Fog computing aims to process the data locally and transmit only meaningful part of the data to the cloud instead of transmitting the raw data. Consequently, it helps reduce the volume of data and react to real-time events with lower latency for IoT systems. In this work, we introduced a conceptual fog node model for multi-purpose fog computing systems. This fog node model contains modules, such as analytics tools, collaboration logic, cryptography, etc. that are essential to accomplish the goals of fog computing.
雾计算的目的是在本地处理数据,只将有意义的部分数据传输到云端,而不是传输原始数据。因此,它有助于减少数据量,并以更低的延迟对物联网系统的实时事件做出反应。在这项工作中,我们引入了一个用于多用途雾计算系统的概念雾节点模型。这个雾节点模型包含分析工具、协作逻辑、密码学等模块,这些模块对于实现雾计算的目标至关重要。
{"title":"On the Fog Node Model for Multi-purpose Fog Computing Systems","authors":"Jemshit Tuvakov, Kee-Hyun Park","doi":"10.1109/IEMCON.2018.8614845","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614845","url":null,"abstract":"Fog computing aims to process the data locally and transmit only meaningful part of the data to the cloud instead of transmitting the raw data. Consequently, it helps reduce the volume of data and react to real-time events with lower latency for IoT systems. In this work, we introduced a conceptual fog node model for multi-purpose fog computing systems. This fog node model contains modules, such as analytics tools, collaboration logic, cryptography, etc. that are essential to accomplish the goals of fog computing.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":" 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Propagation Modeling of IoT Devices for Deployment in Multi-level Hilly Urban Environments 面向多层次丘陵城市环境部署的物联网设备传播建模
T. Olasupo
Internet of Things (IoT) devices are deployed in various environments to obtain desired information. Accurate propagation models are required for these devices to adequately relay the gathered information to the processing center. A comprehensive search of the literature reveals there are no sufficient studies on empirical propagation models to support reliable deployment of IoT devices in multi-level hilly and mountainous urban environments. This research provides empirical path loss models and data for low power wireless devices deployed in such environments. This paper compares the proposed models with theoretical models. Results show that theoretical models deviate from proposed models by 10 to 43 %. Finally, results also show that models established at low packet error rate and high signal-to-noise ratio are more reliable than those formed without considering these parameters. The provided models, as well as the measured data, can be used for proficient design and deployment of wireless sensor network that enables IoT in various similar hilly urban environments.
物联网(IoT)设备部署在各种环境中以获取所需的信息。这些设备需要精确的传播模型才能将收集到的信息充分地传递到处理中心。通过对文献的全面检索,我们发现目前还没有足够的经验传播模型研究来支持物联网设备在多层次丘陵和山地城市环境中的可靠部署。本研究为部署在此类环境中的低功耗无线设备提供了经验路径损耗模型和数据。本文将提出的模型与理论模型进行了比较。结果表明,理论模型与建议模型的偏差为10% ~ 43%。最后,研究结果还表明,在低分组错误率和高信噪比条件下建立的模型比不考虑这些参数的模型更可靠。所提供的模型以及测量数据可用于熟练设计和部署无线传感器网络,从而在各种类似的丘陵城市环境中实现物联网。
{"title":"Propagation Modeling of IoT Devices for Deployment in Multi-level Hilly Urban Environments","authors":"T. Olasupo","doi":"10.1109/IEMCON.2018.8614903","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614903","url":null,"abstract":"Internet of Things (IoT) devices are deployed in various environments to obtain desired information. Accurate propagation models are required for these devices to adequately relay the gathered information to the processing center. A comprehensive search of the literature reveals there are no sufficient studies on empirical propagation models to support reliable deployment of IoT devices in multi-level hilly and mountainous urban environments. This research provides empirical path loss models and data for low power wireless devices deployed in such environments. This paper compares the proposed models with theoretical models. Results show that theoretical models deviate from proposed models by 10 to 43 %. Finally, results also show that models established at low packet error rate and high signal-to-noise ratio are more reliable than those formed without considering these parameters. The provided models, as well as the measured data, can be used for proficient design and deployment of wireless sensor network that enables IoT in various similar hilly urban environments.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"177 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114009508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Control System Design, Analysis & Implementation of Two Wheeled Self Balancing Robot (TWSBR) 两轮自平衡机器人(TWSBR)控制系统设计、分析与实现
Muhammad Atif Imtiaz, Mahum Naveed, Nimra Bibi, Sumair Aziz, Syed Zohaib Hassan Naqvi
Self-balancing robot has the ability of locomotion with balancing capabilities. The two wheeled self-balancing robot can rotate to swiftly change its direction of motion and precisely navigate tight gaps as compared to a three or four-wheeled robot. The paper aims to present modeling, analysis and control design of Two Wheeled Self Balancing Robot (TWSBR) using simulation tools and hardware. Mathematical and state space modelling of TWSBR are performed using Lagrange equations. Based on the model, Linear Quadratic Regulator (LQR), Proportional Integral Derivative (PID) and pole placement control methods are anticipated for stabilization and balancing control of the system. A comparative assessment of the controllers is presented after analyzing performance of each controller individually. Based on results and simplicity of controller, PID controller is implemented in hardware. The implemented robust controller design is able to self balance the robot as expected on tuning PID parameters found from simulations. Hardware implementation of TWSBR shows that it has ability of motion with balancing aptitudes and can be used to handle plethora of tasks proficiently as humans do.
自平衡机器人具有具有平衡能力的运动能力。与三轮或四轮机器人相比,两轮自平衡机器人可以快速改变运动方向,并精确地在狭窄的缝隙中行驶。本文旨在利用仿真工具和硬件对两轮自平衡机器人(TWSBR)进行建模、分析和控制设计。利用拉格朗日方程对TWSBR进行了数学建模和状态空间建模。在此基础上,提出了线性二次调节器(LQR)、比例积分导数(PID)和极点放置控制方法来实现系统的稳定和平衡控制。在分析了各控制器的性能后,对各控制器进行了比较评估。基于结果和控制器的简单性,在硬件上实现了PID控制器。所实现的鲁棒控制器设计能够根据从仿真中获得的PID参数进行自平衡。TWSBR的硬件实现表明,它具有具有平衡能力的运动能力,可以像人类一样熟练地处理大量的任务。
{"title":"Control System Design, Analysis & Implementation of Two Wheeled Self Balancing Robot (TWSBR)","authors":"Muhammad Atif Imtiaz, Mahum Naveed, Nimra Bibi, Sumair Aziz, Syed Zohaib Hassan Naqvi","doi":"10.1109/IEMCON.2018.8614858","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614858","url":null,"abstract":"Self-balancing robot has the ability of locomotion with balancing capabilities. The two wheeled self-balancing robot can rotate to swiftly change its direction of motion and precisely navigate tight gaps as compared to a three or four-wheeled robot. The paper aims to present modeling, analysis and control design of Two Wheeled Self Balancing Robot (TWSBR) using simulation tools and hardware. Mathematical and state space modelling of TWSBR are performed using Lagrange equations. Based on the model, Linear Quadratic Regulator (LQR), Proportional Integral Derivative (PID) and pole placement control methods are anticipated for stabilization and balancing control of the system. A comparative assessment of the controllers is presented after analyzing performance of each controller individually. Based on results and simplicity of controller, PID controller is implemented in hardware. The implemented robust controller design is able to self balance the robot as expected on tuning PID parameters found from simulations. Hardware implementation of TWSBR shows that it has ability of motion with balancing aptitudes and can be used to handle plethora of tasks proficiently as humans do.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115750458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Video abstraction inspired by human visual attention models 受人类视觉注意模型启发的视频抽象
S. O. Gilani, Mohsin Jamil
This paper describes an application of three different state-of-the-art human inspired visual attention models to video abstraction. Two types of video abstractions, video skim and key frame extraction, are performed over three different genres of videos. Qualitative and quantitative results are reported based on user studies and statistical tests. A comparison is made with human made video abstraction set to benchmark the current analysis. We report some abstraction similarities at scene level showing that all three models are successful in capturing semantic content despite having anatomical differences. However different models are more suitable for different genres of videos.
本文介绍了三种不同的最先进的人类视觉注意模型在视频抽象中的应用。两种类型的视频抽象,视频略读和关键帧提取,在三个不同类型的视频执行。根据用户研究和统计测试报告定性和定量结果。并与人工视频抽象集进行了比较,作为当前分析的基准。我们报告了场景级别上的一些抽象相似性,表明尽管存在解剖上的差异,但所有三种模型都成功地捕获了语义内容。然而,不同的模型更适合不同类型的视频。
{"title":"Video abstraction inspired by human visual attention models","authors":"S. O. Gilani, Mohsin Jamil","doi":"10.1109/IEMCON.2018.8614889","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614889","url":null,"abstract":"This paper describes an application of three different state-of-the-art human inspired visual attention models to video abstraction. Two types of video abstractions, video skim and key frame extraction, are performed over three different genres of videos. Qualitative and quantitative results are reported based on user studies and statistical tests. A comparison is made with human made video abstraction set to benchmark the current analysis. We report some abstraction similarities at scene level showing that all three models are successful in capturing semantic content despite having anatomical differences. However different models are more suitable for different genres of videos.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"50 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134245496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges for Developing Countries to Adopt ICT in Government Services 发展中国家在政府服务中采用信息通信技术的挑战
Muhammad Aftab, Seounghwan Myeong
This paper talks about the adoption of information and communication technology in the governmental services in the developing nations. It has been observed that technological advancement needs a lot of investment and at the same time demands people to be very well educated so that they can use the technology otherwise the initiative is good for nothing. The adoption of ICT guarantees a sharp change in outlook where government organizations will be more responsive and straightforward, advance proficient Public Private Partnerships (PPP), and engagement of residents by making information more specifically available. In this paper a detailed discussion about the adoption of ICT in developing nations is being done to understand what are the different challenges which are being faced and how those challenges can be overcome. This article will be helpful for the decision makers from developing countries to understand the addressed challenges in order to successfully adopt Information and communication technologies in government services.
本文讨论了发展中国家在政府服务中采用信息通信技术的情况。据观察,技术进步需要大量的投资,同时要求人们受过良好的教育,这样他们才能使用技术,否则主动性是没有意义的。信息和通信技术的采用保证了前景的急剧变化,政府组织将更加响应和直接,推进熟练的公私合作伙伴关系(PPP),并通过更具体地提供信息来促进居民的参与。本文对发展中国家采用信息通信技术进行了详细的讨论,以了解正在面临的不同挑战以及如何克服这些挑战。本文将有助于发展中国家的决策者了解所面临的挑战,以便在政府服务中成功地采用信息和通信技术。
{"title":"Challenges for Developing Countries to Adopt ICT in Government Services","authors":"Muhammad Aftab, Seounghwan Myeong","doi":"10.1109/IEMCON.2018.8614765","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614765","url":null,"abstract":"This paper talks about the adoption of information and communication technology in the governmental services in the developing nations. It has been observed that technological advancement needs a lot of investment and at the same time demands people to be very well educated so that they can use the technology otherwise the initiative is good for nothing. The adoption of ICT guarantees a sharp change in outlook where government organizations will be more responsive and straightforward, advance proficient Public Private Partnerships (PPP), and engagement of residents by making information more specifically available. In this paper a detailed discussion about the adoption of ICT in developing nations is being done to understand what are the different challenges which are being faced and how those challenges can be overcome. This article will be helpful for the decision makers from developing countries to understand the addressed challenges in order to successfully adopt Information and communication technologies in government services.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134337919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model-Driven Development of Mobile Applications: A Systematic Literature Review 模型驱动的移动应用开发:系统的文献综述
Hanny Tufail, F. Azam, Muhammad Waseem Anwar, Iqra Qasim
Mobile application development for cross platform has been struggling with the increase in numbers of mobile devices and their specifications (i.e. screen sizes, resolutions etc.). Model-Driven Development (MDD) is a significant method to cope with this problem and allow the ultimate solution to change management as well. MDD is the next level in harnessing UML and development environments to manage software development. Although researchers have devised many MDD techniques, languages and tools in the domain of mobile application development. Our conjecture to the best of our knowledge is, no research study is available yet that analyzes and summarizes the modern trends, tools and techniques in this context. Therefore, in this article, we performed a Systematic Literature Review (SLR) that recognizes 30 studies (2013–2018) where MDD is utilized for MAD. This leads to identification of 11 models, and 21 tools. Subsequently, a comprehensive analysis of MDD tools for mobile application is presented. The researchers and practitioners of mobile application domain shall find these findings amply valuable.
跨平台移动应用开发一直在努力应对移动设备数量及其规格(如屏幕尺寸、分辨率等)的增加。模型驱动开发(MDD)是处理这个问题的重要方法,并允许最终的解决方案也用于变更管理。MDD是利用UML和开发环境来管理软件开发的下一个层次。尽管研究人员已经在移动应用程序开发领域设计了许多MDD技术、语言和工具。据我们所知,我们的猜想是,目前还没有研究可以分析和总结这方面的现代趋势、工具和技术。因此,在本文中,我们进行了系统文献综述(SLR),识别了30项研究(2013-2018),其中MDD用于MAD。这导致了11个模型和21个工具的识别。随后,对移动应用的MDD工具进行了全面的分析。对于移动应用领域的研究者和实践者来说,这些发现是非常有价值的。
{"title":"Model-Driven Development of Mobile Applications: A Systematic Literature Review","authors":"Hanny Tufail, F. Azam, Muhammad Waseem Anwar, Iqra Qasim","doi":"10.1109/IEMCON.2018.8614821","DOIUrl":"https://doi.org/10.1109/IEMCON.2018.8614821","url":null,"abstract":"Mobile application development for cross platform has been struggling with the increase in numbers of mobile devices and their specifications (i.e. screen sizes, resolutions etc.). Model-Driven Development (MDD) is a significant method to cope with this problem and allow the ultimate solution to change management as well. MDD is the next level in harnessing UML and development environments to manage software development. Although researchers have devised many MDD techniques, languages and tools in the domain of mobile application development. Our conjecture to the best of our knowledge is, no research study is available yet that analyzes and summarizes the modern trends, tools and techniques in this context. Therefore, in this article, we performed a Systematic Literature Review (SLR) that recognizes 30 studies (2013–2018) where MDD is utilized for MAD. This leads to identification of 11 models, and 21 tools. Subsequently, a comprehensive analysis of MDD tools for mobile application is presented. The researchers and practitioners of mobile application domain shall find these findings amply valuable.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1