首页 > 最新文献

2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)最新文献

英文 中文
Research on incentive mechanism in network education platform 网络教育平台激励机制研究
Min Hou, Jun Han, Jiasha Zhang, Jing Liu
Network education has been developing rapidly, but there is always a problem that learners' motivation is not high. This paper is based on incentive theory and motivation theory, according to four stages of teaching process: stimulate, guide, maintain and evaluate, the corresponding incentive measures are put forward, the structure of the network teaching incentive measures is formed. Then, on the basis of the framework of incentive measures, taking Blackboard as an example, the research of incentive mechanism in three courses: information technology education, instructional design and educational technology research methods is investigated, which is widely used in Capital Normal University. We analyze the present situation of the blackboard, find out its advantages and disadvantages, and put forward the corresponding solution to the problem. This study not only provides a reference for the analysis of incentive measures in the network teaching platform, but also puts forward new ideas for the study of incentive mechanism, and further deepens our understanding of the incentive mechanism.
网络教育发展迅速,但一直存在着学习者积极性不高的问题。本文以激励理论和动机理论为基础,根据教学过程中的激励、引导、保持和评价四个阶段,提出了相应的激励措施,形成了网络教学激励措施的结构。然后,在激励措施框架的基础上,以《黑板》为例,对在首都师范大学广泛应用的信息技术教育、教学设计和教育技术研究方法三门课程的激励机制进行了研究。我们分析了黑板的现状,找出了它的优点和缺点,并针对问题提出了相应的解决方案。本研究不仅为网络教学平台的激励措施分析提供了参考,而且为激励机制的研究提出了新的思路,进一步加深了我们对激励机制的认识。
{"title":"Research on incentive mechanism in network education platform","authors":"Min Hou, Jun Han, Jiasha Zhang, Jing Liu","doi":"10.1109/FSKD.2016.7603538","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603538","url":null,"abstract":"Network education has been developing rapidly, but there is always a problem that learners' motivation is not high. This paper is based on incentive theory and motivation theory, according to four stages of teaching process: stimulate, guide, maintain and evaluate, the corresponding incentive measures are put forward, the structure of the network teaching incentive measures is formed. Then, on the basis of the framework of incentive measures, taking Blackboard as an example, the research of incentive mechanism in three courses: information technology education, instructional design and educational technology research methods is investigated, which is widely used in Capital Normal University. We analyze the present situation of the blackboard, find out its advantages and disadvantages, and put forward the corresponding solution to the problem. This study not only provides a reference for the analysis of incentive measures in the network teaching platform, but also puts forward new ideas for the study of incentive mechanism, and further deepens our understanding of the incentive mechanism.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A prediction based on clustering and personality questionnaire data for IGD risk: A preliminary work 基于聚类和人格问卷数据预测IGD风险的初步研究
Xiaoliang Gong, Bozhong Long, Kun Fang, Zongling Di, Yichu Hou, Lei Cao
With the development of the Internet, a lot of people trapped in the network, especially the adolescent depending on the network game and disturbing their normal life. 579 freshmen participated in this work who were collected the personality questionnaires in the first week they came in university and their grades points average (GPA) after half year. The questionnaires were including Self-Control (SCS), Barratt impulse Inventory (BIS) and Chinese Big Five Personality (CBF). This work used multi-clustering algorithms to construct the models of predicting for Internet game disorder (IGD) risk, including FCM, K-means, and Hierarchical for training model. This is the first try to predict the risk of IGD by personality traits. The results shown the questionnaire data were well separated by different clustering algorithms into three groups who were shared the analogous personality traits which has a relationship with the behavior of IGD. But compared to the GPA of each group, the efficiency of the prediction model seems not so satisfactory. There need more efforts to optimized the model in the future.
随着互联网的发展,很多人被困在网络中,尤其是青少年对网络游戏的依赖,扰乱了他们的正常生活。579名大一新生在入学第一周接受了性格问卷调查,半年后接受了平均绩点(GPA)调查。问卷包括自我控制量表(SCS)、Barratt冲动量表(BIS)和中国大五人格量表(CBF)。本研究采用多聚类算法构建网络游戏障碍(IGD)风险预测模型,包括FCM、K-means和Hierarchical用于训练模型。这是首次尝试通过人格特征来预测患IGD的风险。结果表明,不同的聚类算法将问卷数据很好地划分为三组,这三组具有与IGD行为相关的相似人格特征。但与各组的GPA相比,预测模型的效率似乎不太令人满意。未来的模型还需要进一步优化。
{"title":"A prediction based on clustering and personality questionnaire data for IGD risk: A preliminary work","authors":"Xiaoliang Gong, Bozhong Long, Kun Fang, Zongling Di, Yichu Hou, Lei Cao","doi":"10.1109/FSKD.2016.7603433","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603433","url":null,"abstract":"With the development of the Internet, a lot of people trapped in the network, especially the adolescent depending on the network game and disturbing their normal life. 579 freshmen participated in this work who were collected the personality questionnaires in the first week they came in university and their grades points average (GPA) after half year. The questionnaires were including Self-Control (SCS), Barratt impulse Inventory (BIS) and Chinese Big Five Personality (CBF). This work used multi-clustering algorithms to construct the models of predicting for Internet game disorder (IGD) risk, including FCM, K-means, and Hierarchical for training model. This is the first try to predict the risk of IGD by personality traits. The results shown the questionnaire data were well separated by different clustering algorithms into three groups who were shared the analogous personality traits which has a relationship with the behavior of IGD. But compared to the GPA of each group, the efficiency of the prediction model seems not so satisfactory. There need more efforts to optimized the model in the future.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115653137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Context-sensitive similarity based supervised image change detection 基于上下文敏感相似度的监督图像变化检测
C. Li, Leifu Gao
To deal with the problem that traditional satellite remote sensing image change detection methods overestimate changed areas, a context-sensitive similarity based supervised satellite image change detection method was proposed. Both context-sensitive magnitude and direction of change in the vicinity of each pixel by means of local intercept and slope were exploited, and then SVM (support vector machine) with local intercept and slope was used in satellite image change detection. In the experiment for change detection of high resolution bi-temporal multispectral earthquake satellite images including building damage, the results showed that compared to standard SVM, the accuracy of satellite image change detection had been obviously improved, and overestimation of changed areas had been effectively reduced.
针对传统卫星遥感图像变化检测方法对变化区域估计过高的问题,提出了一种基于上下文敏感相似度的有监督卫星图像变化检测方法。利用局部截距和局部斜率对每个像素附近的上下文敏感的变化幅度和变化方向进行提取,然后将具有局部截距和局部斜率的支持向量机(SVM)用于卫星图像变化检测。在高分辨率双时相多光谱地震卫星图像包括建筑物损伤的变化检测实验中,结果表明,与标准支持向量机相比,卫星图像变化检测的精度得到了明显提高,变化区域的高估得到了有效降低。
{"title":"Context-sensitive similarity based supervised image change detection","authors":"C. Li, Leifu Gao","doi":"10.1109/FSKD.2016.7603147","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603147","url":null,"abstract":"To deal with the problem that traditional satellite remote sensing image change detection methods overestimate changed areas, a context-sensitive similarity based supervised satellite image change detection method was proposed. Both context-sensitive magnitude and direction of change in the vicinity of each pixel by means of local intercept and slope were exploited, and then SVM (support vector machine) with local intercept and slope was used in satellite image change detection. In the experiment for change detection of high resolution bi-temporal multispectral earthquake satellite images including building damage, the results showed that compared to standard SVM, the accuracy of satellite image change detection had been obviously improved, and overestimation of changed areas had been effectively reduced.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124170812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Structural learning framework for binary short text classification 二元短文本分类的结构学习框架
Wuying Liu, Lin Wang
With the fast-paced prevalence of smartphones, binary short text classification (STC) is becoming a basic and challenging issue, and relevant STC algorithms can be successfully used in spam filtering for short message service (SMS), wechat, microblogging, and so on. In this manuscript, we address the structural feature of SMS documents and propose a structural learning framework, which decomposes the complex binary STC problem according to the SMS document structure, and predicts the final category by combining several sub-predictions. Supported by our index of string-frequence, we also implement some STC domain classifiers. The experimental results show that the performance of two previous STC algorithms can be upgraded by the structural learning framework, and our STC domain classifiers can achieve the state-of-the-art performance on the task of Chinese SMS spam filtering within the structural learning framework.
随着智能手机的快速普及,二进制短文本分类(STC)成为一个基础且具有挑战性的问题,而相关的STC算法可以成功地应用于短信服务(SMS)、b微信、微博等垃圾邮件过滤中。在本文中,我们针对短信文档的结构特征,提出了一个结构化学习框架,该框架根据短信文档的结构对复杂的二进制STC问题进行分解,并结合多个子预测来预测最终的类别。在字符串频率索引的支持下,我们还实现了一些STC域分类器。实验结果表明,基于结构学习框架的两种STC算法的性能都得到了提升,我们的STC域分类器在结构学习框架下对中文短信垃圾邮件过滤的任务达到了最先进的性能。
{"title":"Structural learning framework for binary short text classification","authors":"Wuying Liu, Lin Wang","doi":"10.1109/FSKD.2016.7603347","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603347","url":null,"abstract":"With the fast-paced prevalence of smartphones, binary short text classification (STC) is becoming a basic and challenging issue, and relevant STC algorithms can be successfully used in spam filtering for short message service (SMS), wechat, microblogging, and so on. In this manuscript, we address the structural feature of SMS documents and propose a structural learning framework, which decomposes the complex binary STC problem according to the SMS document structure, and predicts the final category by combining several sub-predictions. Supported by our index of string-frequence, we also implement some STC domain classifiers. The experimental results show that the performance of two previous STC algorithms can be upgraded by the structural learning framework, and our STC domain classifiers can achieve the state-of-the-art performance on the task of Chinese SMS spam filtering within the structural learning framework.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A high-precision registration algorithm for heterologous image based on effective sub-graph extraction and feature points bidirectional matching 一种基于有效子图提取和特征点双向匹配的异源图像高精度配准算法
Xiujie Qu, Yue Sun, Yue Gu, Shuang Yu, Liwen Gao
Aiming at solving the problem of low matching accuracy caused by different imaging mechanism of heterologous image, we propose a novel image registration algorithm based on effective sub-image extraction and bidirectional matching for surf feature points. The algorithm adopts a coarse-to-fine matching strategy. Firstly, we transform the edge image into frequency domain through fast Fourier transform, and roughly estimate transform parameters using the cross power spectrum; secondly, we divide the images after rough matching into several sub-graphs, from which we will pick out the effective sub-graph in terms of normalized mutual information, then we match bidirectionally the feature points of effective sub-graph pair according to time domain features, thus obtaining accurate transformation parameters, completing the fine matching. Experimental results of heterologous images in different scenarios show that, the proposed algorithm effectively improves the registration accuracy which is up to sub pixel level.
针对异源图像成像机制不同导致匹配精度低的问题,提出了一种基于有效子图像提取和冲浪特征点双向匹配的图像配准算法。该算法采用一种从粗到精的匹配策略。首先,通过快速傅里叶变换将边缘图像变换到频域,并利用交叉功率谱粗略估计变换参数;其次,将粗糙匹配后的图像分成若干子图,根据归一化互信息从中挑选出有效子图,然后根据时域特征对有效子图对的特征点进行双向匹配,从而获得准确的变换参数,完成精细匹配;不同场景下的异源图像实验结果表明,该算法有效地提高了配准精度,配准精度达到亚像素级。
{"title":"A high-precision registration algorithm for heterologous image based on effective sub-graph extraction and feature points bidirectional matching","authors":"Xiujie Qu, Yue Sun, Yue Gu, Shuang Yu, Liwen Gao","doi":"10.1109/FSKD.2016.7603457","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603457","url":null,"abstract":"Aiming at solving the problem of low matching accuracy caused by different imaging mechanism of heterologous image, we propose a novel image registration algorithm based on effective sub-image extraction and bidirectional matching for surf feature points. The algorithm adopts a coarse-to-fine matching strategy. Firstly, we transform the edge image into frequency domain through fast Fourier transform, and roughly estimate transform parameters using the cross power spectrum; secondly, we divide the images after rough matching into several sub-graphs, from which we will pick out the effective sub-graph in terms of normalized mutual information, then we match bidirectionally the feature points of effective sub-graph pair according to time domain features, thus obtaining accurate transformation parameters, completing the fine matching. Experimental results of heterologous images in different scenarios show that, the proposed algorithm effectively improves the registration accuracy which is up to sub pixel level.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Iterative sparse matrix-vector multiplication on in-memory cluster computing accelerated by GPUs for big data 基于gpu加速的大数据内存集群计算迭代稀疏矩阵向量乘法
Jiwu Peng, Zheng Xiao, Cen Chen, Wangdong Yang
Iterative SpMV (ISpMV) is a key operation in many graph-based data mining algorithms and machine learning algorithms. Along with the development of big data, the matrices can be so large, perhaps billion-scale, that the SpMV can not be implemented in a single computer. Therefore, it is a challenging issue to implement and optimize SpMV for large-scale data sets. In this paper, we used an in-memory heterogeneous CPU-GPU cluster computing platforms (IMHCPs) to efficiently solve billion-scale SpMV problem. A dedicated and efficient hierarchy partitioning strategy for sparse matrices and the vector is proposed. The partitioning strategy contains partitioning sparse matrices among workers in the cluster and among GPUs in one worker. More, the performance of the IMHCPs-based SpMV is evaluated from the aspects of computation efficiency and scalability.
迭代SpMV (ISpMV)是许多基于图的数据挖掘算法和机器学习算法中的关键操作。随着大数据的发展,矩阵可能非常大,甚至可能达到十亿级,以至于SpMV无法在一台计算机上实现。因此,在大规模数据集上实现和优化SpMV是一个具有挑战性的问题。本文采用内存异构CPU-GPU集群计算平台(IMHCPs)来高效解决十亿规模的SpMV问题。针对稀疏矩阵和向量,提出了一种专用的、高效的层次划分策略。该分区策略包含集群中工作线程之间和一个工作线程中的gpu之间的稀疏矩阵分区。并从计算效率和可扩展性方面对基于imhcps的SpMV进行了性能评价。
{"title":"Iterative sparse matrix-vector multiplication on in-memory cluster computing accelerated by GPUs for big data","authors":"Jiwu Peng, Zheng Xiao, Cen Chen, Wangdong Yang","doi":"10.1109/FSKD.2016.7603391","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603391","url":null,"abstract":"Iterative SpMV (ISpMV) is a key operation in many graph-based data mining algorithms and machine learning algorithms. Along with the development of big data, the matrices can be so large, perhaps billion-scale, that the SpMV can not be implemented in a single computer. Therefore, it is a challenging issue to implement and optimize SpMV for large-scale data sets. In this paper, we used an in-memory heterogeneous CPU-GPU cluster computing platforms (IMHCPs) to efficiently solve billion-scale SpMV problem. A dedicated and efficient hierarchy partitioning strategy for sparse matrices and the vector is proposed. The partitioning strategy contains partitioning sparse matrices among workers in the cluster and among GPUs in one worker. More, the performance of the IMHCPs-based SpMV is evaluated from the aspects of computation efficiency and scalability.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Non-commutative hyper residuated lattices and hyper pseudo-BCK algebras 非交换超剩余格与超伪bck代数
Xiaohong Zhang, Q. Zhan, Xue-ping Wang
The new notion of non-commutative hyper residuated lattice is introduced and some properties are investigated. Moreover, two definitions of hyper pseudo-BCK algebras are discussed, and the following result is proved: every strong non-commuatative hyper residuated lattice can induce a weak hyper pseudo-BCK algebra. Finally, some mistakes in literatures are pointed out.
引入了非交换超剩余格的新概念,并研究了一些性质。此外,讨论了超伪bck代数的两种定义,并证明了以下结果:每一个强非交换超残格都能推导出一个弱超伪bck代数。最后,指出了文献中的一些错误。
{"title":"Non-commutative hyper residuated lattices and hyper pseudo-BCK algebras","authors":"Xiaohong Zhang, Q. Zhan, Xue-ping Wang","doi":"10.1109/FSKD.2016.7603536","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603536","url":null,"abstract":"The new notion of non-commutative hyper residuated lattice is introduced and some properties are investigated. Moreover, two definitions of hyper pseudo-BCK algebras are discussed, and the following result is proved: every strong non-commuatative hyper residuated lattice can induce a weak hyper pseudo-BCK algebra. Finally, some mistakes in literatures are pointed out.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125752899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving bi-objective unconstrained binary quadratic programming problem with multi-objective path relinking algorithm 用多目标路径链接算法求解双目标无约束二元二次规划问题
Lei Song, Rong-Qiang Zeng, Yang Wang, Ming-Sheng Shang
This paper investigates a multi-objective path relinking algorithm in order to optimize a bi-objective unconstrained binary quadratic programming problem. In this algorithm, we integrate the path relinking techniques into hypervolume-based multi-objective optimization, where we propose a method to generate a path and select a set of non-dominated solutions from the generated path for further improvements. Experimental results show that the proposed algorithm is very effective compared with the original multi-objective optimization algorithms.
研究了一种求解双目标无约束二元二次规划问题的多目标路径链接算法。在该算法中,我们将路径链接技术整合到基于hypervolume的多目标优化中,提出了一种生成路径并从生成的路径中选择一组非支配解的方法,以进一步改进。实验结果表明,与原有的多目标优化算法相比,该算法是非常有效的。
{"title":"Solving bi-objective unconstrained binary quadratic programming problem with multi-objective path relinking algorithm","authors":"Lei Song, Rong-Qiang Zeng, Yang Wang, Ming-Sheng Shang","doi":"10.1109/FSKD.2016.7603188","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603188","url":null,"abstract":"This paper investigates a multi-objective path relinking algorithm in order to optimize a bi-objective unconstrained binary quadratic programming problem. In this algorithm, we integrate the path relinking techniques into hypervolume-based multi-objective optimization, where we propose a method to generate a path and select a set of non-dominated solutions from the generated path for further improvements. Experimental results show that the proposed algorithm is very effective compared with the original multi-objective optimization algorithms.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124758928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel improved ViBe algorithm to accelerate the ghost suppression 一种新的改进的ViBe算法来加速对鬼影的抑制
Keyang Cheng, Kaifa Hui, Yongzhao Zhan, M. Qi
This paper presents a new improved ViBe algorithm approach to accelerate the ghost suppression, which is a robust and efficient background subtraction algorithm for video sequences. The ViBe has the advantages of faster processing speed and lighter computation load compared with other algorithms. For the sake of the real-time performance of the background modeling, it only uses the first frame to build the background model during the process of initialization. However, it will result in introducing ghost area in the subtraction progression, which has an impact on the performance of the background modeling. We put forward a novel method to accelerate the elimination of the ghost area by detecting and reinitializing the region of the ghost area. Our enhanced algorithm is compared with other improved algorithms with the same aim to suppress the generation of the ghost by conducting a series of contrast experiments. The comparison figures show that our method has better performance in ghost suppression. The PCC is used as a metric to evaluate our algorithm performance. The experiment results show that the PCC of our algorithm has improved after the second frame distinctly in contrast to the original algorithm as well as the improved algorithms mentioned in this paper. Besides, the time for processing per frame can still meet the demand of real-time performance.
本文提出了一种新的改进的ViBe算法来加速对鬼影的抑制,这是一种鲁棒高效的视频序列背景减除算法。与其他算法相比,ViBe具有更快的处理速度和更轻的计算负荷等优点。为了保证背景建模的实时性,在初始化过程中只使用第一帧来构建背景模型。然而,它会导致在减法过程中引入鬼影区域,从而影响背景建模的性能。提出了一种通过检测和重新初始化鬼区区域来加速鬼区消除的新方法。通过一系列的对比实验,将我们的增强算法与其他具有相同目标的改进算法进行了比较,以抑制鬼影的产生。对比结果表明,该方法具有较好的虚影抑制性能。PCC被用作评估算法性能的指标。实验结果表明,与原算法和本文提出的改进算法相比,本算法在第二帧后的PCC有了明显的提高。此外,每帧的处理时间仍然可以满足实时性的要求。
{"title":"A novel improved ViBe algorithm to accelerate the ghost suppression","authors":"Keyang Cheng, Kaifa Hui, Yongzhao Zhan, M. Qi","doi":"10.1109/FSKD.2016.7603432","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603432","url":null,"abstract":"This paper presents a new improved ViBe algorithm approach to accelerate the ghost suppression, which is a robust and efficient background subtraction algorithm for video sequences. The ViBe has the advantages of faster processing speed and lighter computation load compared with other algorithms. For the sake of the real-time performance of the background modeling, it only uses the first frame to build the background model during the process of initialization. However, it will result in introducing ghost area in the subtraction progression, which has an impact on the performance of the background modeling. We put forward a novel method to accelerate the elimination of the ghost area by detecting and reinitializing the region of the ghost area. Our enhanced algorithm is compared with other improved algorithms with the same aim to suppress the generation of the ghost by conducting a series of contrast experiments. The comparison figures show that our method has better performance in ghost suppression. The PCC is used as a metric to evaluate our algorithm performance. The experiment results show that the PCC of our algorithm has improved after the second frame distinctly in contrast to the original algorithm as well as the improved algorithms mentioned in this paper. Besides, the time for processing per frame can still meet the demand of real-time performance.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128376830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Random selection false source-based algorithm for protecting source-location privacy in WSNs 基于随机选择假源的wsn源位置隐私保护算法
Leqiang Bai, Ling Li, Shiguang Qian, Shihong Zhang
In order to improve the issue that the existing source location privacy protection algorithms have lower safety periods, the random selection fake source-based algorithm for protecting source-location privacy is put forward. The algorithm selects phantom source node with random walk. The intermediate node is selected from the nodes on the shortest phantom source-sink path with the random number and information about hops to sink. Fake source node is selected by intermediate node through random walk. Analytical results demonstrate that the algorithm can select intermediate node during the process of each packet transmission. The simulation results show that the algorithm can enhance safety period and improve the level of source-location privacy against local adversary.
为了改进现有源位置隐私保护算法安全周期较低的问题,提出了基于随机选择伪源的源位置隐私保护算法。该算法采用随机行走的方法选择虚影源节点。中间节点从最短虚影源-接收路径上的节点中选择,中间节点具有随机数和接收跳数信息。假源节点由中间节点通过随机游走选择。分析结果表明,该算法可以在每个数据包传输过程中选择中间节点。仿真结果表明,该算法可以提高安全周期,提高对局部攻击的信源位置隐私水平。
{"title":"Random selection false source-based algorithm for protecting source-location privacy in WSNs","authors":"Leqiang Bai, Ling Li, Shiguang Qian, Shihong Zhang","doi":"10.1109/FSKD.2016.7603499","DOIUrl":"https://doi.org/10.1109/FSKD.2016.7603499","url":null,"abstract":"In order to improve the issue that the existing source location privacy protection algorithms have lower safety periods, the random selection fake source-based algorithm for protecting source-location privacy is put forward. The algorithm selects phantom source node with random walk. The intermediate node is selected from the nodes on the shortest phantom source-sink path with the random number and information about hops to sink. Fake source node is selected by intermediate node through random walk. Analytical results demonstrate that the algorithm can select intermediate node during the process of each packet transmission. The simulation results show that the algorithm can enhance safety period and improve the level of source-location privacy against local adversary.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128447397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1