首页 > 最新文献

2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)最新文献

英文 中文
A circular chain intrusion detection for cloud computing based on improved AdjointVM approach 基于改进AdjointVM方法的云计算环链入侵检测
U. Oktay, M. Aydin, O. K. Sahingoz
Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).
最近出现了云计算,并获得了在新的体系结构中实现现有网络和数据中心的势头,以便及时启用服务。尽管它提供了巨大的机会,但也存在一些重大挑战,如安全性,必须解决才能有效使用。保密是信息安全最重要的一点,特别是在金融、政府和军事应用中。在本文中,我们提出了一种用于云计算的混合方法,以保护云用户免受不受信任的云提供商和不受信任的员工的影响。所提出的方法是作为对现有模型(称为AdjointVM)的改进而构建的。该模型旨在克服AdjointVM模型的弱点之一,即保护架构的无防御性,为用户构建更加安全的云环境。在AdjointVM中,要保护虚拟机,必须配置两个虚拟机:受保护虚拟机和保护虚拟机。这些虚拟机连接成一个循环链,以监控入侵。与AdjointVM不同,在AdjointVM中,运行的虚拟机数量与必须保护的虚拟机数量成正比,在提议的模型中,这个数字保持不变,这导致资本支出(capex)的减少。
{"title":"A circular chain intrusion detection for cloud computing based on improved AdjointVM approach","authors":"U. Oktay, M. Aydin, O. K. Sahingoz","doi":"10.1109/CINTI.2013.6705192","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705192","url":null,"abstract":"Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fall body detection algorithm based on tri-accelerometer sensors 基于三加速度传感器的跌倒体检测算法
P. Salgado, P. Afonso
In this paper a fall body detection system for a smartphone device is proposed. Its embedded tri-accelerometer sensor was utilized to collect the information about the body motion used by a real-time Pose Body Model (PBM) identified by an Extended Kalman filter algorithm. The PBM supply an estimate about the vertical pose angle value and a neural network is used to detect body fall incidents. Moreover, an automatic Multimedia Messaging Service (MMS) will be sent to a central of vigilant where additional information including the time and the GPS coordinates, reports the suspected fall location.
本文提出了一种适用于智能手机的跌倒检测系统。利用嵌入式三加速度传感器采集人体运动信息,利用扩展卡尔曼滤波算法建立实时姿态身体模型(PBM)。PBM提供了垂直位姿角值的估计,并使用神经网络检测身体坠落事件。此外,自动多媒体信息服务(MMS)将发送到警戒中心,在那里包括时间和GPS坐标在内的附加信息将报告疑似坠落的位置。
{"title":"Fall body detection algorithm based on tri-accelerometer sensors","authors":"P. Salgado, P. Afonso","doi":"10.1109/CINTI.2013.6705221","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705221","url":null,"abstract":"In this paper a fall body detection system for a smartphone device is proposed. Its embedded tri-accelerometer sensor was utilized to collect the information about the body motion used by a real-time Pose Body Model (PBM) identified by an Extended Kalman filter algorithm. The PBM supply an estimate about the vertical pose angle value and a neural network is used to detect body fall incidents. Moreover, an automatic Multimedia Messaging Service (MMS) will be sent to a central of vigilant where additional information including the time and the GPS coordinates, reports the suspected fall location.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Optimizing camera placement for localization accuracy 优化相机位置定位精度
D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz
This paper presents the optimization of a camera placement for improved localization accuracy. It is the basis of a localization system aiming for high localization accuracy. This goal is achieved using several cameras with very redundant field-of-views. The paper presents the calculation of the localization accuracy - which depends on the camera model and the pixel quantizing error - at one specific point. A method is introduced for handling areas in a probabilistic sense instead of examining only one point. The accuracy can be improved by adding a new camera to the system. The calculation of the optimal position of the new camera at compliance to some restrictions is demonstrated. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.
为了提高定位精度,本文提出了一种优化摄像机放置的方法。它是实现高定位精度的定位系统的基础。这个目标是通过几个具有冗余视场的相机来实现的。本文给出了特定点定位精度的计算方法,定位精度取决于相机模型和像素量化误差。介绍了一种从概率意义上处理区域的方法,而不是只检查一个点。通过在系统中增加一个新的摄像头,可以提高精度。给出了新摄像机在满足某些约束条件下的最优位置的计算。Smart Mobile Eyes for Localization (SMEyeL)项目是开源的:源代码、所有测量输入数据和文档都是公开的。
{"title":"Optimizing camera placement for localization accuracy","authors":"D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz","doi":"10.1109/CINTI.2013.6705193","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705193","url":null,"abstract":"This paper presents the optimization of a camera placement for improved localization accuracy. It is the basis of a localization system aiming for high localization accuracy. This goal is achieved using several cameras with very redundant field-of-views. The paper presents the calculation of the localization accuracy - which depends on the camera model and the pixel quantizing error - at one specific point. A method is introduced for handling areas in a probabilistic sense instead of examining only one point. The accuracy can be improved by adding a new camera to the system. The calculation of the optimal position of the new camera at compliance to some restrictions is demonstrated. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Kernel sets in compass edge detection 罗盘边缘检测中的核集
P. Císar, S. M. Cisar, B. Markoski
Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differential operators. Differential operations measure the rate of change in the image brightness function. The compass approach implies taking a single mask and rotating it to major compass orientations. Using a suitable programming environment, this paper provides a comparative visual analysis of several digital images, with the ability to change the kernel set in compass edge detection.
边缘检测是数字图像分析中的一项重要操作,它包括一套识别不连续点的数学方法。为此,使用了不同的算法来估计图像梯度。许多边缘检测技术都是基于卷积掩模和微分算子的离散逼近来实现的。差分操作测量图像亮度函数的变化率。罗盘方法意味着取单个掩模并将其旋转到主要罗盘方向。本文利用合适的编程环境,对多幅数字图像进行了对比视觉分析,并在罗盘边缘检测中实现了核集的改变。
{"title":"Kernel sets in compass edge detection","authors":"P. Císar, S. M. Cisar, B. Markoski","doi":"10.1109/CINTI.2013.6705199","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705199","url":null,"abstract":"Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differential operators. Differential operations measure the rate of change in the image brightness function. The compass approach implies taking a single mask and rotating it to major compass orientations. Using a suitable programming environment, this paper provides a comparative visual analysis of several digital images, with the ability to change the kernel set in compass edge detection.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Effects of random temperature and pressure influence on the single-channel optical transmission system 随机温度和压力对单通道光传输系统的影响
L. Ladanyi, M. Ďulík, J. Mullerová
In this article we focus on the numerical investigation of random temperature changes in different sections of the optical fibers and their influence on material properties of the fibers. The important issue is to determine whether these temperature changes affect the dispersion and nonlinear effects in the fiber and consequently the transmitted pulse. Moreover, the effects of pressure are also investigated. We found out that the pressure and temperature changes influence dispersion effects in single-channel optical transmission system.
本文重点研究了光纤不同截面温度的随机变化及其对光纤材料性能的影响。重要的问题是确定这些温度变化是否会影响光纤中的色散和非线性效应,从而影响传输的脉冲。此外,还研究了压力的影响。我们发现压力和温度的变化会影响单通道光传输系统中的色散效应。
{"title":"Effects of random temperature and pressure influence on the single-channel optical transmission system","authors":"L. Ladanyi, M. Ďulík, J. Mullerová","doi":"10.1109/CINTI.2013.6705203","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705203","url":null,"abstract":"In this article we focus on the numerical investigation of random temperature changes in different sections of the optical fibers and their influence on material properties of the fibers. The important issue is to determine whether these temperature changes affect the dispersion and nonlinear effects in the fiber and consequently the transmitted pulse. Moreover, the effects of pressure are also investigated. We found out that the pressure and temperature changes influence dispersion effects in single-channel optical transmission system.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123683868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Document creation with Information retrieval system support 文档创建与信息检索系统的支持
T. Betina, I. Polásek
This paper proposes a method to directly facilitate the author's needs during the creation of text documents or source code. The Information retrieval system is integrated with a text editor in order to find similar documents to the created document during its writing phase. The Suggested retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segments are subsequently used to calculate similarity with the new document using an optimal matching algorithm.
本文提出了一种在文本文档或源代码创建过程中直接方便作者需求的方法。信息检索系统与文本编辑器集成,以便在编写阶段查找与创建的文档相似的文档。建议的检索方法包括从不同文本文档格式和源代码文档中提取文本并将其分割为逻辑段和语义段。这些片段随后使用最优匹配算法计算与新文档的相似度。
{"title":"Document creation with Information retrieval system support","authors":"T. Betina, I. Polásek","doi":"10.1109/CINTI.2013.6705181","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705181","url":null,"abstract":"This paper proposes a method to directly facilitate the author's needs during the creation of text documents or source code. The Information retrieval system is integrated with a text editor in order to find similar documents to the created document during its writing phase. The Suggested retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segments are subsequently used to calculate similarity with the new document using an optimal matching algorithm.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"133 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semi-automatic refactoring to aspect-oriented platform 面向方面平台的半自动重构
Pipik Roman, I. Polásek
Refactoring is necessary in large software projects and an aspect-oriented approach can help to maintain concerns in the source code. While tools for object-oriented refactoring are the usual part of development environments, support for aspect-oriented refactoring is minimal. We analyzed object-oriented bad smells applicable for an aspect-oriented approach and propose a method for the detection of crosscutting concerns and consecutive refactoring.
重构在大型软件项目中是必要的,面向方面的方法可以帮助维护源代码中的关注点。虽然面向对象重构工具是开发环境的常见组成部分,但对面向方面重构的支持却很少。我们分析了适用于面向方面方法的面向对象的不良气味,并提出了一种检测横切关注点和连续重构的方法。
{"title":"Semi-automatic refactoring to aspect-oriented platform","authors":"Pipik Roman, I. Polásek","doi":"10.1109/CINTI.2013.6705180","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705180","url":null,"abstract":"Refactoring is necessary in large software projects and an aspect-oriented approach can help to maintain concerns in the source code. While tools for object-oriented refactoring are the usual part of development environments, support for aspect-oriented refactoring is minimal. We analyzed object-oriented bad smells applicable for an aspect-oriented approach and propose a method for the detection of crosscutting concerns and consecutive refactoring.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Agreement assessment of biochemical pathway models by structural analysis of their intersection 通过交叉的结构分析来评估生化途径模型的一致性
T. Rubina, M. Mednis, E. Stalidzans
In case of model development, it would be an advantage to assess the quality of available models looking for the best one or to find suitable parts of a published model to build a new one. The differences or contradictions in reconstructions can indicate the level of agreement between different authors about the topic of interest. The intersecting part of models can reveal also the differences in the scope of the models. Two pairs of models from BioCyc database were analyzed: 1) the Escherichia coli models ecol199310cyc and ecol316407cyc and 2) the Saccharomyces cerevisiae models iND750 and iLL672. The ModeRator software tool is used to compare models and generate their intersection model. The structural parameters of models are analyzed by the software BINESA. The study reveals very different parameters of the intersections of the pairs of the E. coli and the S. cerevisiae models. The models built by the same group of authors like in the case of E. coli is selected as an example of a high agreement between models and can be interpreted as a consensus part of two initial models. The intersection of the S. cerevisiae models demonstrates very different structural properties and the intersection model would not be able to function even after significant improvement. The structural analysis of the pairs of original models and their intersections is performed to determine which structural parameters can be used to determine a poor agreement between the pairs of models. It is concluded that an application of the automated comparison and intersection generation of two models can give a fast insight in the similarity of the models to find out the consensus level in modelling of metabolism of a particular organism. This approach can be used also to find similarities between the models of different organisms. Automation of intersection creation and structural analysis are enabling technologies of this approach.
在模型开发的情况下,评估可用模型的质量,寻找最好的模型,或者找到已发布模型的合适部分来构建新模型,这将是一个优势。重构中的差异或矛盾可以表明不同作者对感兴趣的主题的一致程度。模型的相交部分也可以揭示模型范围的差异。对BioCyc数据库中的两对模型进行分析:1)大肠杆菌模型ecol199310cyc和ecol316407cyc; 2)酿酒酵母模型iND750和iLL672。使用ModeRator软件工具对模型进行比较,生成它们的交集模型。利用BINESA软件对模型的结构参数进行了分析。该研究揭示了大肠杆菌和酿酒葡萄球菌模型对相交的非常不同的参数。由同一组作者建立的模型,如大肠杆菌的例子,被选为模型之间高度一致的例子,可以解释为两个初始模型的共识部分。交叉模型的结构特性差异很大,即使经过显著改进,交叉模型也无法发挥作用。对原始模型对及其交点进行结构分析,以确定哪些结构参数可以用来确定模型对之间的一致性较差。结果表明,应用两个模型的自动比较和交叉生成可以快速地了解模型的相似度,从而找出特定生物体代谢建模的一致水平。这种方法也可以用来发现不同生物模型之间的相似性。交叉口创建自动化和结构分析是实现该方法的技术。
{"title":"Agreement assessment of biochemical pathway models by structural analysis of their intersection","authors":"T. Rubina, M. Mednis, E. Stalidzans","doi":"10.1109/CINTI.2013.6705232","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705232","url":null,"abstract":"In case of model development, it would be an advantage to assess the quality of available models looking for the best one or to find suitable parts of a published model to build a new one. The differences or contradictions in reconstructions can indicate the level of agreement between different authors about the topic of interest. The intersecting part of models can reveal also the differences in the scope of the models. Two pairs of models from BioCyc database were analyzed: 1) the Escherichia coli models ecol199310cyc and ecol316407cyc and 2) the Saccharomyces cerevisiae models iND750 and iLL672. The ModeRator software tool is used to compare models and generate their intersection model. The structural parameters of models are analyzed by the software BINESA. The study reveals very different parameters of the intersections of the pairs of the E. coli and the S. cerevisiae models. The models built by the same group of authors like in the case of E. coli is selected as an example of a high agreement between models and can be interpreted as a consensus part of two initial models. The intersection of the S. cerevisiae models demonstrates very different structural properties and the intersection model would not be able to function even after significant improvement. The structural analysis of the pairs of original models and their intersections is performed to determine which structural parameters can be used to determine a poor agreement between the pairs of models. It is concluded that an application of the automated comparison and intersection generation of two models can give a fast insight in the similarity of the models to find out the consensus level in modelling of metabolism of a particular organism. This approach can be used also to find similarities between the models of different organisms. Automation of intersection creation and structural analysis are enabling technologies of this approach.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"68 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of dynamic overlays for association football from TV broadcasting 足协足球电视转播动态叠加检测
Ing Francisco Siles
This paper presents a new dissimilarity measure for the detection of dynamic overlays in football games from TV broadcasting. The detection of the dynamic overlays is used for finding the replays in the input video, that are to be removed for further processing. The replays' detection and removal is part of the first module of the system ACE-Football for the automated interpretation of association football games, which is being developed at the PRIS-lab. Positive results of experiments conducted on several games of the latest FIFA's World Cup are presented.
本文提出了一种新的不相似度度量方法,用于检测电视转播足球比赛中的动态重叠。动态覆盖的检测用于查找输入视频中的重播,这些重播将被删除以进行进一步处理。回放的检测和移除是ACE-Football系统第一个模块的一部分,该系统用于足协比赛的自动解说,该系统正在priss实验室开发。本文介绍了在最近一届世界杯的几场比赛中进行的实验的积极结果。
{"title":"Detection of dynamic overlays for association football from TV broadcasting","authors":"Ing Francisco Siles","doi":"10.1109/CINTI.2013.6705165","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705165","url":null,"abstract":"This paper presents a new dissimilarity measure for the detection of dynamic overlays in football games from TV broadcasting. The detection of the dynamic overlays is used for finding the replays in the input video, that are to be removed for further processing. The replays' detection and removal is part of the first module of the system ACE-Football for the automated interpretation of association football games, which is being developed at the PRIS-lab. Positive results of experiments conducted on several games of the latest FIFA's World Cup are presented.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Routing in the mechanical transport systems on the basis of knowledge 在机械运输系统布线知识的基础上
S. Belyakov, A. Bozhenyuk, I. Rozenberg
This paper investigates the ways of building the routing algorithms in mechanical transport systems on the basis of knowledge. It is assumed that the expert observing the behavior of the system shows his experience by specifying the subsystems with a specific behavior. To create a routing table, the model of fuzzy temporal hypergraph is used. Fixed and dynamic routing is considered; modifications of Dijkstra's algorithm for the case of a fuzzy temporal graph are shown.
研究了基于知识的机械运输系统路由算法的构建方法。假设观察系统行为的专家通过指定具有特定行为的子系统来展示他的经验。采用模糊时间超图模型建立路由表。考虑了固定路由和动态路由;给出了Dijkstra算法在模糊时间图情况下的改进。
{"title":"Routing in the mechanical transport systems on the basis of knowledge","authors":"S. Belyakov, A. Bozhenyuk, I. Rozenberg","doi":"10.1109/CINTI.2013.6705183","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705183","url":null,"abstract":"This paper investigates the ways of building the routing algorithms in mechanical transport systems on the basis of knowledge. It is assumed that the expert observing the behavior of the system shows his experience by specifying the subsystems with a specific behavior. To create a routing table, the model of fuzzy temporal hypergraph is used. Fixed and dynamic routing is considered; modifications of Dijkstra's algorithm for the case of a fuzzy temporal graph are shown.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1