首页 > 最新文献

2016 22nd International Conference on Automation and Computing (ICAC)最新文献

英文 中文
Novel malware detection methods by using LCS and LCSS 基于LCS和LCSS的新型恶意软件检测方法
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604978
Fahad Mira, Antony Brown, Wei Huang
The field of computer security faces numerous vulnerabilities which cause network resources to become unavailable and violate systems confidentiality and integrity. Malicious software (Malware) has become one of the most serious security threats on the Internet. Malware is a widespread problem and despite the common use of anti-virus software, the diversity of malware is still increasing. A major challenge facing the anti-virus industry is how to effectively detect thousands of malware samples that are received every day. In this paper, a novel approach based on dynamic analysis of malware is proposed whereby Longest Common Subsequence (LCSS) and Longest Common Substring (LCS) algorithms are adopted to accurately detect malware. The empirical results show that the proposed approach performs favorably compared to other related work that use API call sequences.
计算机安全领域面临着许多漏洞,这些漏洞导致网络资源不可用,违反了系统的机密性和完整性。恶意软件(Malware)已经成为互联网上最严重的安全威胁之一。恶意软件是一个普遍存在的问题,尽管反病毒软件的普遍使用,恶意软件的多样性仍在增加。反病毒行业面临的一个主要挑战是如何有效地检测每天收到的数千个恶意软件样本。本文提出了一种基于恶意软件动态分析的新方法,即采用最长公共子序列(LCSS)和最长公共子串(LCS)算法来准确检测恶意软件。实证结果表明,与其他使用API调用序列的相关工作相比,所提出的方法具有良好的性能。
{"title":"Novel malware detection methods by using LCS and LCSS","authors":"Fahad Mira, Antony Brown, Wei Huang","doi":"10.1109/IConAC.2016.7604978","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604978","url":null,"abstract":"The field of computer security faces numerous vulnerabilities which cause network resources to become unavailable and violate systems confidentiality and integrity. Malicious software (Malware) has become one of the most serious security threats on the Internet. Malware is a widespread problem and despite the common use of anti-virus software, the diversity of malware is still increasing. A major challenge facing the anti-virus industry is how to effectively detect thousands of malware samples that are received every day. In this paper, a novel approach based on dynamic analysis of malware is proposed whereby Longest Common Subsequence (LCSS) and Longest Common Substring (LCS) algorithms are adopted to accurately detect malware. The empirical results show that the proposed approach performs favorably compared to other related work that use API call sequences.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Model parameters identification for excess oxygen by Standard Genetic Algorithm 基于标准遗传算法的过量氧模型参数辨识
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604918
K. Rajarathinam, J. Gomm, Dingli Yu, Ahmed Saad Abdelhadi
In this paper, a realistic excess oxygen model parameter identification by Standard Genetic Algorithms (SGAs) is proposed and demonstrated. The realistic excess oxygen model is developed by three sub-model; air-fuel ratio conversion model, dynamic continuous transfer function and excess oxygen look-up table to characterise the real excess oxygen plant's numerical data. The predetermined time constant approximation method is applied on 1st, 2nd, 3rd, 4th and 5th model orders for an initial value estimation with SGAs. For an optimal model order assessment and selection, the information criteria are applied. The simulation results assured that the 4th order continuous transfer function as a realistic model well characterises the real excess oxygen plant's response.
本文提出并论证了一种基于标准遗传算法(SGAs)的实际过量氧模型参数辨识方法。实际的过量氧模型分为三个子模型;用空燃比转换模型、动态连续传递函数和过量氧查找表来表征实际过量氧厂的数值数据。将预定时间常数近似法应用于1、2、3、4和5阶模型,用SGAs进行初值估计。为了最优的模型顺序评估和选择,应用了信息准则。仿真结果表明,所建立的4阶连续传递函数模型能较好地表征实际的超氧装置响应。
{"title":"Model parameters identification for excess oxygen by Standard Genetic Algorithm","authors":"K. Rajarathinam, J. Gomm, Dingli Yu, Ahmed Saad Abdelhadi","doi":"10.1109/IConAC.2016.7604918","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604918","url":null,"abstract":"In this paper, a realistic excess oxygen model parameter identification by Standard Genetic Algorithms (SGAs) is proposed and demonstrated. The realistic excess oxygen model is developed by three sub-model; air-fuel ratio conversion model, dynamic continuous transfer function and excess oxygen look-up table to characterise the real excess oxygen plant's numerical data. The predetermined time constant approximation method is applied on 1st, 2nd, 3rd, 4th and 5th model orders for an initial value estimation with SGAs. For an optimal model order assessment and selection, the information criteria are applied. The simulation results assured that the 4th order continuous transfer function as a realistic model well characterises the real excess oxygen plant's response.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133042107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The impact of gender on the Quality of Experience for video services 性别对视频服务体验质量的影响
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604967
Tawfeeg S. Noor, N. Osman, I. Mkwawa
Quality of Experience has become a significant parameter in evaluating and rating video services. This paper presents the impact of gender on the Quality of Experience for video services. Initial results from subjective tests show that male viewers requested higher video quality compared to female viewers, while female viewers concentrated more on the contents of the video.
体验质量已经成为评价和评价视频服务的一个重要参数。本文介绍了性别对视频服务体验质量的影响。初步主观测试结果显示,男性观众对视频质量的要求高于女性观众,而女性观众对视频内容的关注程度更高。
{"title":"The impact of gender on the Quality of Experience for video services","authors":"Tawfeeg S. Noor, N. Osman, I. Mkwawa","doi":"10.1109/IConAC.2016.7604967","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604967","url":null,"abstract":"Quality of Experience has become a significant parameter in evaluating and rating video services. This paper presents the impact of gender on the Quality of Experience for video services. Initial results from subjective tests show that male viewers requested higher video quality compared to female viewers, while female viewers concentrated more on the contents of the video.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130821747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint estimation of fast-updating state and intermittent-updating state 快速更新状态和间歇更新状态的联合估计
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604886
Hang Geng, Yan Liang, C. Wen, Yonggang Chen
This paper formulates a joint estimation problem of fast-updating state and intermittent-updating state in multi-rate systems. The original multi-rate system is first transformed into a single-rate one. Since the direct use of Kalman filtering method on the lifted system will result in the Kalman smoother, the causality constraints must be taken into account in the filter design. Then, based on the lifted system a multi-rate filter (MRF) with causality constraints is derived in the linear minimum mean squared error (LMMSE) sense using the orthogonality principle. A numerical example is given to show the effectiveness of the proposed filter.
提出了多速率系统中快速更新状态和间歇更新状态的联合估计问题。最初的多费率制首先转变为单费率制。由于对提升系统直接使用卡尔曼滤波方法会使卡尔曼平滑,因此在滤波器设计中必须考虑因果约束。在此基础上,利用正交性原理推导出线性最小均方误差(LMMSE)意义上具有因果约束的多速率滤波器(MRF)。算例表明了该滤波器的有效性。
{"title":"Joint estimation of fast-updating state and intermittent-updating state","authors":"Hang Geng, Yan Liang, C. Wen, Yonggang Chen","doi":"10.1109/IConAC.2016.7604886","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604886","url":null,"abstract":"This paper formulates a joint estimation problem of fast-updating state and intermittent-updating state in multi-rate systems. The original multi-rate system is first transformed into a single-rate one. Since the direct use of Kalman filtering method on the lifted system will result in the Kalman smoother, the causality constraints must be taken into account in the filter design. Then, based on the lifted system a multi-rate filter (MRF) with causality constraints is derived in the linear minimum mean squared error (LMMSE) sense using the orthogonality principle. A numerical example is given to show the effectiveness of the proposed filter.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126664731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of IoT network infrastructure 物联网网络基础设施性能评估
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604944
Waleed Rafique, M. A. Shah
It is expected that billions of devices will be connected with each other through the Internet of Things (IoT). Different aspects of IoT, such as security, have been extensively explored in the literature. However, the research focuses on how to identify and secure the IoT. We believe that it is very important to investigate how the IoT infrastructure will response when a huge amount of data is generated by IoT devices. We also need to make sure that the existing network infrastructure will not be chocked, causing the existing services to block. Along with that, the security and privacy are the huge concern for IoT. In this research, our contribution is twofold. Firstly, we investigate the performance issues of IoT network infrastructures for parameters such as throughput, delay and load etc. Secondly, we analyze the overheads that are generated as a result of deploying security in IoT. We simulate different IoT scenarios. Some interesting results are revealed.
预计数十亿台设备将通过物联网(IoT)相互连接。物联网的不同方面,如安全,已经在文献中进行了广泛的探讨。然而,研究的重点是如何识别和保护物联网。我们认为,当物联网设备产生大量数据时,研究物联网基础设施如何响应是非常重要的。我们还需要确保现有的网络基础设施不会被阻塞,从而导致现有的服务阻塞。除此之外,安全和隐私是物联网的巨大关注点。在这项研究中,我们的贡献是双重的。首先,我们研究了物联网网络基础设施的性能问题,如吞吐量、延迟和负载等参数。其次,我们分析了由于在物联网中部署安全性而产生的开销。我们模拟不同的物联网场景。揭示了一些有趣的结果。
{"title":"Performance evaluation of IoT network infrastructure","authors":"Waleed Rafique, M. A. Shah","doi":"10.1109/IConAC.2016.7604944","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604944","url":null,"abstract":"It is expected that billions of devices will be connected with each other through the Internet of Things (IoT). Different aspects of IoT, such as security, have been extensively explored in the literature. However, the research focuses on how to identify and secure the IoT. We believe that it is very important to investigate how the IoT infrastructure will response when a huge amount of data is generated by IoT devices. We also need to make sure that the existing network infrastructure will not be chocked, causing the existing services to block. Along with that, the security and privacy are the huge concern for IoT. In this research, our contribution is twofold. Firstly, we investigate the performance issues of IoT network infrastructures for parameters such as throughput, delay and load etc. Secondly, we analyze the overheads that are generated as a result of deploying security in IoT. We simulate different IoT scenarios. Some interesting results are revealed.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Single image haze removal algorithm using pixel-based airlight constraints 使用基于像素的空气光约束的单幅图像雾度消除算法
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604930
Zhenwei Gao, Yongqiang Bai
Fast single image dehazing has been a challenging problem in many fields, such as computer vision and real-time applications. The existing image dehazing algorithms cannot achieve a trade-off between the dehazing performance and the computational complexity. The proposed approach first applies the mean filter twice to estimate airlight, which include pixel-based dark channel and bright channel constraints. And then the relationship between channel values of the restored image and atmospheric light is qualitatively analyzed to give the optimum estimate of atmospheric light. Using the airlight and atmospheric light, we can easily restore the scene radiance via the atmospheric scattering model. Compared with others, the main advantage of the proposed approach is its high speed and significant visibility improvement even in the sky and white areas. This speed allows the enhanced haze image to be applied in real-time processing applications. A comparative study and quantitative evaluation are proposed with a few other state of the art algorithms which demonstrates that similar or better quality results are obtained.
在计算机视觉和实时应用等许多领域,快速单幅图像去毛刺一直是一个具有挑战性的问题。现有的图像去毛刺算法无法在去毛刺性能和计算复杂度之间取得平衡。本文提出的方法首先应用两次均值滤波来估计空气亮度,其中包括基于像素的暗通道和亮通道约束。然后定性分析还原图像的通道值与大气光之间的关系,给出大气光的最佳估计值。利用空气光和大气光,我们可以通过大气散射模型轻松还原场景辐射度。与其他方法相比,建议方法的主要优点是速度快,即使在天空和白色区域也能显著改善能见度。这种速度使得增强后的雾霾图像可以应用于实时处理应用中。我们提出了与其他几种最先进算法的比较研究和定量评估,结果表明可以获得类似或更高质量的结果。
{"title":"Single image haze removal algorithm using pixel-based airlight constraints","authors":"Zhenwei Gao, Yongqiang Bai","doi":"10.1109/IConAC.2016.7604930","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604930","url":null,"abstract":"Fast single image dehazing has been a challenging problem in many fields, such as computer vision and real-time applications. The existing image dehazing algorithms cannot achieve a trade-off between the dehazing performance and the computational complexity. The proposed approach first applies the mean filter twice to estimate airlight, which include pixel-based dark channel and bright channel constraints. And then the relationship between channel values of the restored image and atmospheric light is qualitatively analyzed to give the optimum estimate of atmospheric light. Using the airlight and atmospheric light, we can easily restore the scene radiance via the atmospheric scattering model. Compared with others, the main advantage of the proposed approach is its high speed and significant visibility improvement even in the sky and white areas. This speed allows the enhanced haze image to be applied in real-time processing applications. A comparative study and quantitative evaluation are proposed with a few other state of the art algorithms which demonstrates that similar or better quality results are obtained.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129670853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Forensic analysis of I2P activities I2P活动的法医分析
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604974
Maxim Wilson, B. Bazli
File sharing applications that operate as form of peer-to-peer (P2P) networks have been popular amongst users and developers for their heterogeneity and easy deployments features. However, they have been used for illegal activities online. This brings new challenges to forensic investigations in detecting, retrieving and analysing the P2P applications. We investigate the characteristics of I2P network in order to outline the problems and methods in detection of I2P artefacts. Furthermore, we present new methods to detect the presence of I2P using forensically approved tools and reconstruct the history of I2P activity using artefacts left over by I2P router software.
以点对点(P2P)网络形式运行的文件共享应用程序因其异构性和易于部署的特性而受到用户和开发人员的欢迎。然而,它们却被用于网上的非法活动。这给司法调查在P2P应用程序的检测、检索和分析方面带来了新的挑战。我们研究了I2P网络的特点,概述了检测I2P伪信号的问题和方法。此外,我们提出了使用法医认可的工具检测I2P存在的新方法,并使用I2P路由器软件遗留的人工制品重建I2P活动的历史。
{"title":"Forensic analysis of I2P activities","authors":"Maxim Wilson, B. Bazli","doi":"10.1109/IConAC.2016.7604974","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604974","url":null,"abstract":"File sharing applications that operate as form of peer-to-peer (P2P) networks have been popular amongst users and developers for their heterogeneity and easy deployments features. However, they have been used for illegal activities online. This brings new challenges to forensic investigations in detecting, retrieving and analysing the P2P applications. We investigate the characteristics of I2P network in order to outline the problems and methods in detection of I2P artefacts. Furthermore, we present new methods to detect the presence of I2P using forensically approved tools and reconstruct the history of I2P activity using artefacts left over by I2P router software.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Investigation on the construction of the Relevance Vector Machine based on cross entropy minimization 基于交叉熵最小化的相关向量机构造研究
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604924
Xiaofang Liu, Ruikang Li, Dansong Cheng, K. Cheng
As a machine learning method under sparse Bayesian framework, classical Relevance Vector Machine (RVM) applies kernel methods to construct Radial Basis Function(RBF) networks using a least number of relevant basis functions. Compared to the well-known Support Vector Machine (SVM), the RVM provides a better sparsity, and an automatic estimation of hyperparameters. However, the performance of the original RVM purely depends on the smoothness of the presumed prior of the connection weights and parameters. Consequently, the sparsity is actually still controlled by the selection of kernel functions or kernel parameters. This may lead to severe underfitting or overfitting in some cases. In the research presented in this paper, we explicitly involve the number of basis functions into the objective of the optimization procedure, and construct the RVM by the minimization of the cross entropy between the “hypothetical” probability distribution in the forward training pathway and the “true” probability distribution in the backward testing pathway. The experimental results have shown that our proposed methodology can achieve both the least complexity of structure and goodness of appropriate fit to data.
经典的相关向量机(RVM)是稀疏贝叶斯框架下的一种机器学习方法,它采用核方法,利用最少数量的相关基函数来构造径向基函数(RBF)网络。与支持向量机(SVM)相比,RVM提供了更好的稀疏性和超参数的自动估计。但是,原始RVM的性能完全取决于连接权重和参数的假定先验的平滑性。因此,稀疏性实际上仍然由核函数或核参数的选择来控制。在某些情况下,这可能导致严重的欠拟合或过拟合。在本文的研究中,我们明确地将基函数的个数纳入到优化过程的目标中,并通过最小化前向训练路径中的“假设”概率分布与后向测试路径中的“真实”概率分布之间的交叉熵来构建RVM。实验结果表明,本文提出的方法既能达到最小的结构复杂度,又能达到较好的数据拟合效果。
{"title":"Investigation on the construction of the Relevance Vector Machine based on cross entropy minimization","authors":"Xiaofang Liu, Ruikang Li, Dansong Cheng, K. Cheng","doi":"10.1109/IConAC.2016.7604924","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604924","url":null,"abstract":"As a machine learning method under sparse Bayesian framework, classical Relevance Vector Machine (RVM) applies kernel methods to construct Radial Basis Function(RBF) networks using a least number of relevant basis functions. Compared to the well-known Support Vector Machine (SVM), the RVM provides a better sparsity, and an automatic estimation of hyperparameters. However, the performance of the original RVM purely depends on the smoothness of the presumed prior of the connection weights and parameters. Consequently, the sparsity is actually still controlled by the selection of kernel functions or kernel parameters. This may lead to severe underfitting or overfitting in some cases. In the research presented in this paper, we explicitly involve the number of basis functions into the objective of the optimization procedure, and construct the RVM by the minimization of the cross entropy between the “hypothetical” probability distribution in the forward training pathway and the “true” probability distribution in the backward testing pathway. The experimental results have shown that our proposed methodology can achieve both the least complexity of structure and goodness of appropriate fit to data.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to applying creative computing in tourism by constructing a Big Data based Knowledge System Framework 构建基于大数据的知识系统框架,探索创意计算在旅游中的应用
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604926
Lin Zou, Qinyun Liu, Chi Zhang, Hongji Yang
Creative computing is a new concept on guiding human beings to create fresh, surprising and useful systems to achieve effective working in different fields. Creative computing aims at combining knowledge from different disciplines. Being interdisciplinary is able to accomplish a knowledge combination which will blur the boundary between distinct fields. A series of weaved knowledge may well enable solving problems because the knowledge is the origin of creativity. This paper aims to construct a Big Data based Knowledge System (BDBKE) Framework in a way of creative computing: knowledge combination. Related work about Creative Computing, Knowledge Engineering and Big Data will be reviewed first; then each sub-system of BDBKE will be presented in details; and next the core algorithms of Ontology Classification Inference Engines will be explained step by step.
创造性计算是一种指导人类创造新颖、令人惊奇和有用的系统以实现在不同领域有效工作的新概念。创造性计算旨在结合不同学科的知识。跨学科能够完成一种知识组合,模糊不同领域之间的界限。一系列编织的知识可以很好地解决问题,因为知识是创造力的源泉。本文旨在以一种创造性计算方式——知识组合——构建基于大数据的知识系统框架。首先对创造性计算、知识工程和大数据的相关工作进行综述;然后详细介绍BDBKE的各个子系统;接下来将对本体分类推理机的核心算法进行逐步讲解。
{"title":"An approach to applying creative computing in tourism by constructing a Big Data based Knowledge System Framework","authors":"Lin Zou, Qinyun Liu, Chi Zhang, Hongji Yang","doi":"10.1109/IConAC.2016.7604926","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604926","url":null,"abstract":"Creative computing is a new concept on guiding human beings to create fresh, surprising and useful systems to achieve effective working in different fields. Creative computing aims at combining knowledge from different disciplines. Being interdisciplinary is able to accomplish a knowledge combination which will blur the boundary between distinct fields. A series of weaved knowledge may well enable solving problems because the knowledge is the origin of creativity. This paper aims to construct a Big Data based Knowledge System (BDBKE) Framework in a way of creative computing: knowledge combination. Related work about Creative Computing, Knowledge Engineering and Big Data will be reviewed first; then each sub-system of BDBKE will be presented in details; and next the core algorithms of Ontology Classification Inference Engines will be explained step by step.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130118501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Person-specific hand reconstruction for natural HCI 针对自然HCI的手部重建
Pub Date : 2016-09-01 DOI: 10.1109/IConAC.2016.7604901
Xiaowen Yang, Qingde Li, Xie Han, Zhichun Zhang
Seamless interaction between human beings and computer generated 3D objects is an essential task for mixed reality technologies. With the availability of modern wearable tracking systems, it is now possible to interact virtual objects with hand directly. However, without a precise reconstruction of hand geometry, it is difficult to achieve realistic and natural interaction between hand and virtual objects. Today, it is not only necessary to recognize the motion of hand, more importantly, but also necessary to precisely reconstruct the hand geometry, so that a sensible interaction between an actual hand and virtual objects can become possible. In this paper, a technique for natural interaction between hand and virtual objects in virtual environment is proposed. In our method, the 3D hand geometry is implicitly represented as a kind of distance function based on finger joint positions from position tracker and the motion model of the hand is reconstructed according to the data of data glove. The experiment results show that our technique has a much better performance due to the fact that it is much convenient to perform object collision detection and shape matching tasks.
人与计算机生成的三维物体之间的无缝交互是混合现实技术的基本任务。随着现代可穿戴跟踪系统的出现,现在可以直接用手与虚拟物体进行交互。然而,如果没有对手的几何形状进行精确的重建,就很难实现手与虚拟物体之间真实、自然的交互。今天,不仅需要识别手的运动,更重要的是需要精确地重建手的几何形状,从而使真实的手和虚拟物体之间的合理交互成为可能。提出了一种在虚拟环境中实现手与虚拟物体自然交互的技术。该方法将手部三维几何图形隐式表示为一种基于位置跟踪器中手指关节位置的距离函数,并根据数据手套数据重构手部运动模型。实验结果表明,该方法能够方便地完成物体碰撞检测和形状匹配任务,具有较好的性能。
{"title":"Person-specific hand reconstruction for natural HCI","authors":"Xiaowen Yang, Qingde Li, Xie Han, Zhichun Zhang","doi":"10.1109/IConAC.2016.7604901","DOIUrl":"https://doi.org/10.1109/IConAC.2016.7604901","url":null,"abstract":"Seamless interaction between human beings and computer generated 3D objects is an essential task for mixed reality technologies. With the availability of modern wearable tracking systems, it is now possible to interact virtual objects with hand directly. However, without a precise reconstruction of hand geometry, it is difficult to achieve realistic and natural interaction between hand and virtual objects. Today, it is not only necessary to recognize the motion of hand, more importantly, but also necessary to precisely reconstruct the hand geometry, so that a sensible interaction between an actual hand and virtual objects can become possible. In this paper, a technique for natural interaction between hand and virtual objects in virtual environment is proposed. In our method, the 3D hand geometry is implicitly represented as a kind of distance function based on finger joint positions from position tracker and the motion model of the hand is reconstructed according to the data of data glove. The experiment results show that our technique has a much better performance due to the fact that it is much convenient to perform object collision detection and shape matching tasks.","PeriodicalId":375052,"journal":{"name":"2016 22nd International Conference on Automation and Computing (ICAC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 22nd International Conference on Automation and Computing (ICAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1