首页 > 最新文献

International Conference on Computer Vision and Image Analysis Applications最新文献

英文 中文
Frequency domain DOA estimation for positioning in impulse radio ultra-widband systems 脉冲无线电超宽带系统定位的频域DOA估计
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351876
H. Meknessi, F. Harrabi, A. Gharsallah
The emergence of smart antenna technology gave the advantage to reduce interference inherent in dense multipath propagation channels to improve coverage and increase system capacity, so, various localization systems have been proposed based on the Impulse Radio Ultra Wide band (IR-UWB) signals using direction of arrival estimation. In order to ensure high precision in indoor environment, DOA estimation techniques have been developed. In this paper, performance of many high resolution methods for Impulse Radio Ultra Wide band (IR-UWB) systems in frequency domain such as ROOT-MUSIC, estimation of signal parameters via rotational invariance technique (ESPRIT) and Matrix PENCIL are evaluated, as well as these techniques are compared also with the performance corresponding to the Cramer- Rae lower bound (CRB). Synthesis results and relevant performance comparisons are presented.
智能天线技术的出现有利于减少密集多径传播信道中固有的干扰,从而提高覆盖范围和系统容量,因此,各种基于脉冲无线电超宽带(IR-UWB)信号的定位系统被提出,并采用到达方向估计。为了保证在室内环境下的高精度,人们开发了定位估计技术。本文对脉冲无线电超宽带(IR-UWB)系统的许多高分辨率方法(如ROOT-MUSIC、旋转不变性技术(ESPRIT)和矩阵铅笔)在频域的性能进行了评估,并将这些技术与Cramer- Rae下界(CRB)对应的性能进行了比较。给出了综合结果和相关性能比较。
{"title":"Frequency domain DOA estimation for positioning in impulse radio ultra-widband systems","authors":"H. Meknessi, F. Harrabi, A. Gharsallah","doi":"10.1109/ICCVIA.2015.7351876","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351876","url":null,"abstract":"The emergence of smart antenna technology gave the advantage to reduce interference inherent in dense multipath propagation channels to improve coverage and increase system capacity, so, various localization systems have been proposed based on the Impulse Radio Ultra Wide band (IR-UWB) signals using direction of arrival estimation. In order to ensure high precision in indoor environment, DOA estimation techniques have been developed. In this paper, performance of many high resolution methods for Impulse Radio Ultra Wide band (IR-UWB) systems in frequency domain such as ROOT-MUSIC, estimation of signal parameters via rotational invariance technique (ESPRIT) and Matrix PENCIL are evaluated, as well as these techniques are compared also with the performance corresponding to the Cramer- Rae lower bound (CRB). Synthesis results and relevant performance comparisons are presented.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124777422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supporting young students to learn computer programming in an early schooling 支持年轻学生在早期学习计算机编程
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351898
M. Alghamdi, D. Al-Jumeily, A. Hussain
The deployments of technology across the global toward efficient learning environment are growing rapidly. In United Kingdom educational system, the government is investing 1.1 million pounds in primary and secondary school for early programming lessoning starting from age five upwards. The ideology behind this innovation is to make younger generation linked to innovation and digital industries and improve the pace with the most successful education system in the world. In this paper, an assessment-driven educational programming tutoring system for young students is described in a high-level overview (which provides an abstract design of the main components of the proposed system), as well as a detailed discussion of some of the existing tutoring programming tools for kids. The intention will be to develop this given proposed design fully functional and then evaluate it in different primary schools from the UK and other Middle East countries. One of our main intended aims of this study would be to offer a suitable educational programming system that could ease the process of teaching and learning programming for kids in primary schooling.
在全球范围内,面向高效学习环境的技术部署正在迅速增长。在英国的教育系统中,政府在小学和中学投资了110万英镑,用于从5岁以上开始的早期编程课程。这一创新背后的理念是让年轻一代与创新和数字产业联系起来,并提高与世界上最成功的教育体系的步伐。在本文中,对一个评估驱动的年轻学生教育编程辅导系统进行了高级概述(提供了拟议系统主要组件的抽象设计),并详细讨论了一些现有的儿童辅导编程工具。我们的目的是将这个给定的设计开发成功能齐全的设计,然后在英国和其他中东国家的不同小学中进行评估。我们这项研究的主要目的之一是提供一个合适的教育编程系统,可以简化小学儿童的教学和学习编程的过程。
{"title":"Supporting young students to learn computer programming in an early schooling","authors":"M. Alghamdi, D. Al-Jumeily, A. Hussain","doi":"10.1109/ICCVIA.2015.7351898","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351898","url":null,"abstract":"The deployments of technology across the global toward efficient learning environment are growing rapidly. In United Kingdom educational system, the government is investing 1.1 million pounds in primary and secondary school for early programming lessoning starting from age five upwards. The ideology behind this innovation is to make younger generation linked to innovation and digital industries and improve the pace with the most successful education system in the world. In this paper, an assessment-driven educational programming tutoring system for young students is described in a high-level overview (which provides an abstract design of the main components of the proposed system), as well as a detailed discussion of some of the existing tutoring programming tools for kids. The intention will be to develop this given proposed design fully functional and then evaluate it in different primary schools from the UK and other Middle East countries. One of our main intended aims of this study would be to offer a suitable educational programming system that could ease the process of teaching and learning programming for kids in primary schooling.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123592755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A new privacy-preserving web metering scheme using third-party-centric analytics 一个新的保护隐私的网络计量方案,使用以第三方为中心的分析
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351874
Fahad Alarifi, M. Fernández
It is desirable for advertising webservers to have a web metering scheme that can securely produce accurate number of unique users while preserving users' privacy. To achieve such balance between accuracy and privacy, the web metering scheme has to collect data about users in a privacy-preserving manner. If users are authenticated, it is easy to determine the number of unique visitors; however, authentication and privacy are inherently conflicting requirements. This paper proposes an analytics-based web metering scheme that improves privacy while providing “good enough” accurate results, compared to previous schemes. More precisely, we propose a generic web metering scheme to securely capture data about users in a privacy-preserving manner, and study different scenarios in which the scheme can be implemented. Each scenario is described, outlining assumptions and techniques. The scenarios and underlying techniques can be used as improvements to the privacy of existing schemes (like Google Analytics) while maintaining accurate results.
广告网站服务器希望有一个网络计量方案,可以安全地产生准确的唯一用户数量,同时保护用户的隐私。为了在准确性和隐私性之间取得平衡,网络计量方案必须以保护隐私的方式收集用户数据。如果对用户进行了身份验证,则很容易确定唯一访问者的数量;然而,身份验证和隐私本质上是相互冲突的需求。本文提出了一种基于分析的网络计量方案,与以前的方案相比,该方案在提供“足够好”的准确结果的同时提高了隐私性。更准确地说,我们提出了一种通用的web计量方案,以保护隐私的方式安全地捕获用户数据,并研究了该方案可以实现的不同场景。描述了每个场景,概述了假设和技术。场景和底层技术可用于改进现有方案(如Google Analytics)的隐私性,同时保持准确的结果。
{"title":"A new privacy-preserving web metering scheme using third-party-centric analytics","authors":"Fahad Alarifi, M. Fernández","doi":"10.1109/ICCVIA.2015.7351874","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351874","url":null,"abstract":"It is desirable for advertising webservers to have a web metering scheme that can securely produce accurate number of unique users while preserving users' privacy. To achieve such balance between accuracy and privacy, the web metering scheme has to collect data about users in a privacy-preserving manner. If users are authenticated, it is easy to determine the number of unique visitors; however, authentication and privacy are inherently conflicting requirements. This paper proposes an analytics-based web metering scheme that improves privacy while providing “good enough” accurate results, compared to previous schemes. More precisely, we propose a generic web metering scheme to securely capture data about users in a privacy-preserving manner, and study different scenarios in which the scheme can be implemented. Each scenario is described, outlining assumptions and techniques. The scenarios and underlying techniques can be used as improvements to the privacy of existing schemes (like Google Analytics) while maintaining accurate results.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121461704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of routing protocols in wireless sensor network 无线传感器网络路由协议的分类
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351790
Hiba Sami Bazzi, A. Haidar, Ahmad Bilal
Lifetime of a node is a critical concern in wireless sensor network (WSN). Nowadays networks are becoming large, so data collected is becoming even larger, which all consume great amount of energy leading to an early death of a node. Therefore, researches are done to minimize the energy used in data sampling and collection to prolong the life time of a network. Through years several routing protocols are proposed and enhanced. In this paper we introduce several factors to consider before choosing and implementing a routing protocol.
节点生存期是无线传感器网络中一个非常重要的问题。现在网络变得越来越大,因此收集的数据也越来越大,这些都消耗了大量的能量,导致节点过早死亡。因此,研究如何最大限度地减少数据采样和采集所消耗的能量,从而延长网络的寿命。多年来,人们提出并改进了几种路由协议。本文介绍了在选择和实现路由协议之前需要考虑的几个因素。
{"title":"Classification of routing protocols in wireless sensor network","authors":"Hiba Sami Bazzi, A. Haidar, Ahmad Bilal","doi":"10.1109/ICCVIA.2015.7351790","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351790","url":null,"abstract":"Lifetime of a node is a critical concern in wireless sensor network (WSN). Nowadays networks are becoming large, so data collected is becoming even larger, which all consume great amount of energy leading to an early death of a node. Therefore, researches are done to minimize the energy used in data sampling and collection to prolong the life time of a network. Through years several routing protocols are proposed and enhanced. In this paper we introduce several factors to consider before choosing and implementing a routing protocol.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Labeling abnormalities in video based complex Human-Object Interactions by robust affordance modelling 基于鲁棒可视性模型的复杂人机交互视频异常标记
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351886
Mahmudul Hassan, A. Dharmaratne
Identifying abnormalities in complex Human Object Interaction (HOI) based videos and labeling their possible categories is a novel and ambitious research problem, which requires an optimal blend of the state of the art computer vision and machine learning algorithms. For classifying a HOI event normal or abnormal and subsequently classifying the potential abnormal categories requires the knowledge of the mutual relations between the Human, object and the ambient environment. Researchers have been using various contexts like spatial, temporal, sequential etc. to classify the abnormal actions. In this paper, we have introduced a novel context of object's affordance (which is a semantic map of the human, object and the ambient environment) to identify abnormalities in Human Object Interactions. Furthermore, the sub-classification of the abnormalities is also realized. In order to achieve our goal, we have introduced a set of novel attributes associated with the Human and the Objects and mapped them in a Bayesian network framework. The inference capabilities of the system depict the successful identification of abnormal events. We have also initiated a novel dataset of abnormal Human-Object Interactions in domestic settings. This research work also made a valiant effort to capitalize the abundant statistical data sources currently available, related to the domestic accidents and use them to nourish a practical classifier.
识别基于复杂人机交互(HOI)的视频中的异常并标记其可能的类别是一个新颖而雄心勃勃的研究问题,这需要最先进的计算机视觉和机器学习算法的最佳融合。要对HOI事件进行正常或异常分类,并随后对潜在的异常类别进行分类,需要了解人、物体和周围环境之间的相互关系。研究者们一直在使用空间、时间、顺序等不同的语境对异常行为进行分类。在本文中,我们引入了一种新的对象的提供性上下文(它是人、对象和周围环境的语义图)来识别人与对象交互中的异常。此外,还实现了异常的分类。为了实现我们的目标,我们引入了一组与人类和物体相关的新属性,并将它们映射到贝叶斯网络框架中。系统的推理能力描述了异常事件的成功识别。我们还在家庭环境中启动了一个新的异常人-物交互数据集。本研究工作还大胆地利用现有的丰富的与国内事故相关的统计数据源,并利用它们来滋养一个实用的分类器。
{"title":"Labeling abnormalities in video based complex Human-Object Interactions by robust affordance modelling","authors":"Mahmudul Hassan, A. Dharmaratne","doi":"10.1109/ICCVIA.2015.7351886","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351886","url":null,"abstract":"Identifying abnormalities in complex Human Object Interaction (HOI) based videos and labeling their possible categories is a novel and ambitious research problem, which requires an optimal blend of the state of the art computer vision and machine learning algorithms. For classifying a HOI event normal or abnormal and subsequently classifying the potential abnormal categories requires the knowledge of the mutual relations between the Human, object and the ambient environment. Researchers have been using various contexts like spatial, temporal, sequential etc. to classify the abnormal actions. In this paper, we have introduced a novel context of object's affordance (which is a semantic map of the human, object and the ambient environment) to identify abnormalities in Human Object Interactions. Furthermore, the sub-classification of the abnormalities is also realized. In order to achieve our goal, we have introduced a set of novel attributes associated with the Human and the Objects and mapped them in a Bayesian network framework. The inference capabilities of the system depict the successful identification of abnormal events. We have also initiated a novel dataset of abnormal Human-Object Interactions in domestic settings. This research work also made a valiant effort to capitalize the abundant statistical data sources currently available, related to the domestic accidents and use them to nourish a practical classifier.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114376812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fraud detection in international calls using fuzzy logic 模糊逻辑在国际电话诈骗检测中的应用
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351891
Hussein M. Marah, Osama Mohamed Elrajubi, Abdulla A. Abouda
Fraud is a problem that affects operators and telecommunication companies all around the world. One of the most known fraud is the bypass fraud, which is used in international calls in order to avoid access charges and making profits. This kind of fraud causes severe losses in revenue to operators with other negative side effects. In this paper a new fraud detection technique is proposed. The proposed technique depends on user profiling and using fuzzy logic. Fuzzy logic was used in decision making process by utilizing fuzzy logic membership function. A real database from mobile operator company Almadar Aljadid in Libya is used in this investigation. Five features are extracted and employed as detection patterns in the proposed technique. The five features or detection patterns are, subscriber's mobility, incoming to outgoing calls ratio, suspicious cell activity, irregular calls, and service type.
欺诈是一个影响世界各地运营商和电信公司的问题。最著名的诈骗之一是旁路诈骗,这种诈骗是在国际电话中使用,以避免接入费和获利。这种欺诈行为给运营商造成了严重的收入损失,并带来了其他负面影响。本文提出了一种新的欺诈检测技术。该技术依赖于用户分析和模糊逻辑。利用模糊逻辑隶属函数,将模糊逻辑应用于决策过程。本次调查使用了利比亚移动运营商Almadar Aljadid的真实数据库。在该技术中,提取了五个特征并将其作为检测模式。这五个特征或检测模式是:用户的移动性、呼入呼出比率、可疑蜂窝活动、不规则呼叫和服务类型。
{"title":"Fraud detection in international calls using fuzzy logic","authors":"Hussein M. Marah, Osama Mohamed Elrajubi, Abdulla A. Abouda","doi":"10.1109/ICCVIA.2015.7351891","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351891","url":null,"abstract":"Fraud is a problem that affects operators and telecommunication companies all around the world. One of the most known fraud is the bypass fraud, which is used in international calls in order to avoid access charges and making profits. This kind of fraud causes severe losses in revenue to operators with other negative side effects. In this paper a new fraud detection technique is proposed. The proposed technique depends on user profiling and using fuzzy logic. Fuzzy logic was used in decision making process by utilizing fuzzy logic membership function. A real database from mobile operator company Almadar Aljadid in Libya is used in this investigation. Five features are extracted and employed as detection patterns in the proposed technique. The five features or detection patterns are, subscriber's mobility, incoming to outgoing calls ratio, suspicious cell activity, irregular calls, and service type.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128269120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An algorithm to find the best time to tweet 找到发推特的最佳时间的算法
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351786
Abdullatif M. Al Abdullatif, Raid Alsoghayer, Esra M. AlMajhad
The modern technological developments created a quantum leap and a real revolution in the world of communication. Among the most prominent of these communications are the social networks that have made communication easy and fast between individuals. Twitter is one of the social networks that have grown significantly in recent years. Due to the dynamic nature of its timeline, hidden tweets to the followers decreases the activity level with them. Thus, this forms a major challenge for the tweeter. We aim to solve this problem by proposing system that use a novel algorithm dedicated to discover the appropriate times to tweet based on the analysis of the active followers usage behavior. This research will offer a highly valuable solution that helps the tweeters to receive the highest percentage of engagement and the proliferation of tweets among their targeted followers.
现代技术的发展给通信世界带来了巨大的飞跃和真正的革命。在这些通信中,最突出的是社交网络,它使个人之间的通信变得简单快捷。Twitter是近年来发展迅速的社交网络之一。由于其时间轴的动态性,向关注者隐藏的tweet降低了他们的活动水平。因此,这对推特者构成了一个重大挑战。为了解决这个问题,我们提出了一个系统,该系统使用一种新颖的算法,专门根据对活跃关注者使用行为的分析来发现适当的推文时间。这项研究将提供一个非常有价值的解决方案,帮助推特者在他们的目标追随者中获得最高的参与度和推文的扩散。
{"title":"An algorithm to find the best time to tweet","authors":"Abdullatif M. Al Abdullatif, Raid Alsoghayer, Esra M. AlMajhad","doi":"10.1109/ICCVIA.2015.7351786","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351786","url":null,"abstract":"The modern technological developments created a quantum leap and a real revolution in the world of communication. Among the most prominent of these communications are the social networks that have made communication easy and fast between individuals. Twitter is one of the social networks that have grown significantly in recent years. Due to the dynamic nature of its timeline, hidden tweets to the followers decreases the activity level with them. Thus, this forms a major challenge for the tweeter. We aim to solve this problem by proposing system that use a novel algorithm dedicated to discover the appropriate times to tweet based on the analysis of the active followers usage behavior. This research will offer a highly valuable solution that helps the tweeters to receive the highest percentage of engagement and the proliferation of tweets among their targeted followers.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Green novel power control framework for dense femtocell grids 面向密集飞cell网格的新型绿色功率控制框架
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351895
Mazen Al Haddad, M. Bayoumi
High dense neighboring Femtocells are seen as future low-cost solution to significantly gain capacity compared to Macro-only deployment. Dense HetNet, which requires progressive introduction of Femtocells, offers scalable networks towards 1000 fold gains in capacity as per technology vision for 5G. In such dense networks, the problem of interference comes between the Macrocells and Femtocells as well as among the Femtocells themselves. Valuable insights in the Macro-Femto interference are available, while the Femto-Femto interference aspects remain partially addressed. This paper outlines this problem and points potential solution strategies to mitigate the Femto-Femto interference, increase the network capacity, decrease the power consumption and likewise reduce the CO2 footprint. According to the system level simulation of our novel power control framework, user throughput is 15,9% to 49,3% greater than that of the conventional power control schemas. This is equal to 9,87 to 12,35kg CO2 emission reduction per year for one Femtocell BS.
高密度相邻的Femtocells被视为未来的低成本解决方案,与宏观部署相比,可以显著增加容量。密集的HetNet需要逐步引入Femtocells,根据5G的技术愿景,它提供了可扩展的网络,容量将增加1000倍。在如此密集的网络中,干扰问题出现在macrocell和femtocell之间,以及femtocell之间。在Macro-Femto干扰方面有价值的见解是可用的,而Femto-Femto干扰方面仍有部分解决。本文概述了这一问题,并指出了潜在的解决策略,以减轻Femto-Femto干扰,增加网络容量,降低功耗,同样减少二氧化碳足迹。根据我们的新型功率控制框架的系统级仿真,用户吞吐量比传统功率控制方案高15.9%至49.3%。这相当于一个Femtocell BS每年减少9,87至12,35公斤的二氧化碳排放量。
{"title":"Green novel power control framework for dense femtocell grids","authors":"Mazen Al Haddad, M. Bayoumi","doi":"10.1109/ICCVIA.2015.7351895","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351895","url":null,"abstract":"High dense neighboring Femtocells are seen as future low-cost solution to significantly gain capacity compared to Macro-only deployment. Dense HetNet, which requires progressive introduction of Femtocells, offers scalable networks towards 1000 fold gains in capacity as per technology vision for 5G. In such dense networks, the problem of interference comes between the Macrocells and Femtocells as well as among the Femtocells themselves. Valuable insights in the Macro-Femto interference are available, while the Femto-Femto interference aspects remain partially addressed. This paper outlines this problem and points potential solution strategies to mitigate the Femto-Femto interference, increase the network capacity, decrease the power consumption and likewise reduce the CO2 footprint. According to the system level simulation of our novel power control framework, user throughput is 15,9% to 49,3% greater than that of the conventional power control schemas. This is equal to 9,87 to 12,35kg CO2 emission reduction per year for one Femtocell BS.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A combined distance measure for 2D shape matching 二维形状匹配的组合距离度量
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351875
G. Ramachandran
We present a method for 2D shape matching using a combination of distance functions and discrete curvature. The eccentricity transform computes the longest geodesic distance across the object. This transform is invariant to translation and rotation. The maximal eccentricity points yield diameters across the image. We compute the Euclidean distances from the boundary to the diameter to characterize the curvature of the shape. Our shape descriptor is comprised of the best matches retrieved from the normalized histogram of the eccentricities, the Hausdorff distance between the set of distances to the diameter and a measure of the number of points lying on either side of the diameter along with the peak values. We evaluate this descriptor on 2D image databases consisting of rigid and articulated shapes by ranking the number of matches. In almost all cases, the shapes are matched with at least one shape from the same class.
提出了一种结合距离函数和离散曲率的二维形状匹配方法。偏心变换计算穿过物体的最长测地线距离。这个变换对平移和旋转是不变的。最大偏心点产生整个图像的直径。我们计算从边界到直径的欧氏距离来表征形状的曲率。我们的形状描述符由从离心率的归一化直方图中检索到的最佳匹配,到直径的距离集之间的豪斯多夫距离以及位于直径两侧的点的数量以及峰值的度量组成。我们通过对匹配数量进行排序,在由刚性和铰接形状组成的2D图像数据库上评估该描述符。在几乎所有情况下,这些形状都与来自同一类的至少一个形状相匹配。
{"title":"A combined distance measure for 2D shape matching","authors":"G. Ramachandran","doi":"10.1109/ICCVIA.2015.7351875","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351875","url":null,"abstract":"We present a method for 2D shape matching using a combination of distance functions and discrete curvature. The eccentricity transform computes the longest geodesic distance across the object. This transform is invariant to translation and rotation. The maximal eccentricity points yield diameters across the image. We compute the Euclidean distances from the boundary to the diameter to characterize the curvature of the shape. Our shape descriptor is comprised of the best matches retrieved from the normalized histogram of the eccentricities, the Hausdorff distance between the set of distances to the diameter and a measure of the number of points lying on either side of the diameter along with the peak values. We evaluate this descriptor on 2D image databases consisting of rigid and articulated shapes by ranking the number of matches. In almost all cases, the shapes are matched with at least one shape from the same class.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accurate, swift and noiseless image binarization 准确、快速、无噪声的图像二值化
Pub Date : 2015-12-10 DOI: 10.1109/ICCVIA.2015.7351908
Wassim Al-Khawand, S. Kadry, Riccardo Bozzo, K. Smaili
In this paper, we will present an accurate, swift and noiseless image binarization technique that was tested on real life back side container images. Our approach consists of converting a colored image to a grayscaled one, then to construct the histogram which will be divided into group of colors and after that, the foreground - that can be darker or lighter than the background - will be automatically identified and finally, the foreground boundaries will be assiduously enhanced before creating the binarized image. The average processing time of our proposed method is around 0.8 milliseconds which makes it highly suitable for real life multi-user applications.
在本文中,我们将提出一种准确,快速和无噪声的图像二值化技术,并在实际生活中的背面容器图像上进行了测试。我们的方法包括将彩色图像转换为灰度图像,然后构建直方图,然后将直方图划分为颜色组,然后自动识别前景-可以比背景更暗或更亮-最后,在创建二值化图像之前,将前景边界进行强化。我们提出的方法的平均处理时间约为0.8毫秒,这使得它非常适合现实生活中的多用户应用。
{"title":"Accurate, swift and noiseless image binarization","authors":"Wassim Al-Khawand, S. Kadry, Riccardo Bozzo, K. Smaili","doi":"10.1109/ICCVIA.2015.7351908","DOIUrl":"https://doi.org/10.1109/ICCVIA.2015.7351908","url":null,"abstract":"In this paper, we will present an accurate, swift and noiseless image binarization technique that was tested on real life back side container images. Our approach consists of converting a colored image to a grayscaled one, then to construct the histogram which will be divided into group of colors and after that, the foreground - that can be darker or lighter than the background - will be automatically identified and finally, the foreground boundaries will be assiduously enhanced before creating the binarized image. The average processing time of our proposed method is around 0.8 milliseconds which makes it highly suitable for real life multi-user applications.","PeriodicalId":419122,"journal":{"name":"International Conference on Computer Vision and Image Analysis Applications","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115471727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Conference on Computer Vision and Image Analysis Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1