首页 > 最新文献

2014 IEEE 5th International Conference on Software Engineering and Service Science最新文献

英文 中文
A kind of two-level cooperation distributed scheduling strategy 一种两级协作分布式调度策略
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933594
Dongru Ruan, Yu Hua, Zhifeng Pang
This paper studies the two-level collaborative work architecture of resources allocation mechanism for remote collaborative distribution, researches on key technologies of two-level organization activities in real-time dynamic allocate resources, proposed a two-level collaborative scheduling algorithm to support resources co-allocation. The application showed that the system had a good serviceability.
研究了面向远程协同分配的两级协同工作体系结构的资源分配机制,研究了两级组织活动实时动态分配资源的关键技术,提出了支持资源协同分配的两级协同调度算法。应用表明,该系统具有良好的可维护性。
{"title":"A kind of two-level cooperation distributed scheduling strategy","authors":"Dongru Ruan, Yu Hua, Zhifeng Pang","doi":"10.1109/ICSESS.2014.6933594","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933594","url":null,"abstract":"This paper studies the two-level collaborative work architecture of resources allocation mechanism for remote collaborative distribution, researches on key technologies of two-level organization activities in real-time dynamic allocate resources, proposed a two-level collaborative scheduling algorithm to support resources co-allocation. The application showed that the system had a good serviceability.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"30 1","pages":"410-413"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77564734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and design on Web application vulnerability scanning service Web应用漏洞扫描服务的研究与设计
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933657
Wu Qianqian, L. Xiangjun
Web application has got a remarkable change in the past few years, many new technologies are reshaping the pattern of Web applications. Since many manufacturers' promotion on HTML5 technology, more and more websites are using HTML5 gradually. The new technology provides users with a variety of Internet applications, but introduces new security problems at the same time. Currently, most Web application scanners can not detect the security problems with HTML5 features, which make HTML5 security issues become blind spots in security vulnerability scanning process. The paper focuses on a research among the existing Web application scanners firstly. Then we selected W3af(Web Application Attack and Audit Framework) as a basic platform for transformation, and by customizing scanning modules and scripts, we designed a Web application security scanning service. The practical scan results show that it can not only detect the Clickjacking vulnerabilities brought by HTML5, but also provide efficient Web application security scanning and evaluation services for the websites.
Web应用程序在过去的几年中发生了显著的变化,许多新技术正在重塑Web应用程序的模式。由于许多厂商对HTML5技术的推广,越来越多的网站逐渐开始使用HTML5。新技术为用户提供了多种互联网应用,但同时也带来了新的安全问题。目前,大多数Web应用程序扫描器无法检测到HTML5特性的安全问题,这使得HTML5安全问题成为安全漏洞扫描过程中的盲点。本文首先对现有的Web应用程序扫描器进行了研究。然后选择W3af(Web Application Attack and Audit Framework)作为基本的转换平台,通过定制扫描模块和脚本,设计了一个Web应用安全扫描服务。实际扫描结果表明,该方法不仅可以检测出HTML5带来的点击劫持漏洞,还可以为网站提供高效的Web应用安全扫描和评估服务。
{"title":"Research and design on Web application vulnerability scanning service","authors":"Wu Qianqian, L. Xiangjun","doi":"10.1109/ICSESS.2014.6933657","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933657","url":null,"abstract":"Web application has got a remarkable change in the past few years, many new technologies are reshaping the pattern of Web applications. Since many manufacturers' promotion on HTML5 technology, more and more websites are using HTML5 gradually. The new technology provides users with a variety of Internet applications, but introduces new security problems at the same time. Currently, most Web application scanners can not detect the security problems with HTML5 features, which make HTML5 security issues become blind spots in security vulnerability scanning process. The paper focuses on a research among the existing Web application scanners firstly. Then we selected W3af(Web Application Attack and Audit Framework) as a basic platform for transformation, and by customizing scanning modules and scripts, we designed a Web application security scanning service. The practical scan results show that it can not only detect the Clickjacking vulnerabilities brought by HTML5, but also provide efficient Web application security scanning and evaluation services for the websites.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"134 1","pages":"671-674"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80031367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Study on object transaction based on networked RFID systems 基于网络化RFID系统的对象事务研究
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933660
Xuan Shen, Chenqi Bao, Jianmin Bao, Huan Wang
Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID system. Meanwhile, this paper presents an encryption scheme to protect the information stored in electric tags from being illegally used. After collecting relevant statistics and analyzing cases based on networked RFID systems, this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.
射频识别(RFID)是一种新型的自动识别技术。然而,由于严重的安全问题,RFID的使用引起了极大的关注。本文首先提出了一种基于网络RFID系统的安全事务框架(STF)和对象事务流程。其次,值得一提的是,安全交易框架(Secure Transaction Frame, STF)中的认证技术能够验证电子标签的所有权,以应对网络化RFID系统中常见的攻击。同时,本文提出了一种保护电子标签信息不被非法利用的加密方案。在对基于网络化RFID系统的相关数据进行统计和案例分析的基础上,研究了阅读器对电子标签中存储信息的大量需求,并最终给出了一种解决这一问题的缓存机制。
{"title":"Study on object transaction based on networked RFID systems","authors":"Xuan Shen, Chenqi Bao, Jianmin Bao, Huan Wang","doi":"10.1109/ICSESS.2014.6933660","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933660","url":null,"abstract":"Radio Frequency IDentification(RFID) is a novel technology of automated identification. The use of RFID, however, raises great concerns due to the serious security issue. In this paper, we at first propose a Secure Transaction Frame(STF) and a flow of object transaction based on networked RFID systems. Then, it is worth mentioning that the authentication technology in Secure Transaction Frame(STF) is able to verify the ownership of electric tags in order to deal with common attacks in the networked RFID system. Meanwhile, this paper presents an encryption scheme to protect the information stored in electric tags from being illegally used. After collecting relevant statistics and analyzing cases based on networked RFID systems, this paper also researches the mass requests for the information stored in the electric tags by the reader and eventually, gives a cache mechanism to solve that problem.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"7 1","pages":"683-687"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WSN-based monitoring system for factory aquaculture 基于wsn的工厂化养殖监测系统
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933600
Yanhua Chen, G. Hou, J. Ou
This paper proposes a WSN-based monitoring system for factory aquaculture, which is used to monitor the parameters of water quality. This system is composed of two parts, which are a wireless sensor network and an upper computer. The solution of this system is designed by using the wireless sensor network and ZigBee technologies. The hardware architectures of nodes and related circuits are designed according to the design principles of hardware. We also show the design of software running on this system. Experiments are conducted to test the performance and the function of our proposed system, and experimental results show that our proposed monitoring system performs well for monitoring the parameters of water quality.
本文提出了一种基于wsn的工厂化水产养殖水质监测系统,用于对水质参数进行监测。该系统由无线传感器网络和上位机两部分组成。采用无线传感器网络和ZigBee技术设计了该系统的解决方案。根据硬件设计原则,设计了节点的硬件架构和相关电路。并给出了运行在该系统上的软件设计。通过实验对系统的性能和功能进行了测试,实验结果表明,所提出的监测系统能够很好地监测水质参数。
{"title":"WSN-based monitoring system for factory aquaculture","authors":"Yanhua Chen, G. Hou, J. Ou","doi":"10.1109/ICSESS.2014.6933600","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933600","url":null,"abstract":"This paper proposes a WSN-based monitoring system for factory aquaculture, which is used to monitor the parameters of water quality. This system is composed of two parts, which are a wireless sensor network and an upper computer. The solution of this system is designed by using the wireless sensor network and ZigBee technologies. The hardware architectures of nodes and related circuits are designed according to the design principles of hardware. We also show the design of software running on this system. Experiments are conducted to test the performance and the function of our proposed system, and experimental results show that our proposed monitoring system performs well for monitoring the parameters of water quality.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"9 1","pages":"439-442"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85638204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aspect-oriented reuse mechanism for security targets and protection profiles 安全目标和保护概要文件的面向方面的重用机制
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933536
Y. Goto, Huilin Chen, Da Bao
Common Criteria (CC) is an international standard for evaluation and certification of IT products. Although a security target (ST) is an important and central document used in the security evaluation process of CC, creating STs is not so easy task for most of software engineers. On the other hand, there are dependency relations among several elements of an ST and a protection profile (PP). Elements of an ST/PP are elements of mandatory contents of STs/PPs defined in CC part 1, e.g., security problems, security objectives, security requirements, and so on. If there is a same element in both an ST/PP and other ST/PP, then what to describe and how to describe elements that depend on the same element are probably similar. Such same element and its dependent elements are a cross-cutting concern among the STs/PPs. Although retrieving cross-cutting concerns among certified STs and PPs are useful for creation and evaluation of STs and PPs, it is difficult, not impossible, to do that because certified STs and PPs are published as PDF files. This paper presents an aspect-oriented reuse mechanism for STs and PPs to help creation and evaluation of STs. The paper also shows technical issues and current implementation of the mechanism.
CC (Common Criteria)是一个用于评估和认证IT产品的国际标准。虽然安全目标(ST)是CC安全评估过程中重要的中心文件,但对于大多数软件工程师来说,创建ST并不是一件容易的事情。另一方面,ST和保护配置文件(PP)的几个要素之间存在依赖关系。ST/PP的要素是在CC第1部分中定义的ST/PP的强制性内容的要素,例如,安全问题、安全目标、安全要求等。如果在一个ST/PP和其他ST/PP中都有相同的元素,那么描述什么以及如何描述依赖于同一元素的元素可能是相似的。这些相同的元素及其相关的元素是化粪池/PPs之间的交叉关注。虽然检索经认证的化粪池和pp之间的交叉关注点对创建和评估化粪池和pp很有用,但很难做到这一点,因为经认证的化粪池和pp是以PDF文件的形式发布的。本文提出了一种面向方面的STs和pp重用机制,以帮助STs的创建和评估。文章还介绍了该机制的技术问题和目前的实施情况。
{"title":"Aspect-oriented reuse mechanism for security targets and protection profiles","authors":"Y. Goto, Huilin Chen, Da Bao","doi":"10.1109/ICSESS.2014.6933536","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933536","url":null,"abstract":"Common Criteria (CC) is an international standard for evaluation and certification of IT products. Although a security target (ST) is an important and central document used in the security evaluation process of CC, creating STs is not so easy task for most of software engineers. On the other hand, there are dependency relations among several elements of an ST and a protection profile (PP). Elements of an ST/PP are elements of mandatory contents of STs/PPs defined in CC part 1, e.g., security problems, security objectives, security requirements, and so on. If there is a same element in both an ST/PP and other ST/PP, then what to describe and how to describe elements that depend on the same element are probably similar. Such same element and its dependent elements are a cross-cutting concern among the STs/PPs. Although retrieving cross-cutting concerns among certified STs and PPs are useful for creation and evaluation of STs and PPs, it is difficult, not impossible, to do that because certified STs and PPs are published as PDF files. This paper presents an aspect-oriented reuse mechanism for STs and PPs to help creation and evaluation of STs. The paper also shows technical issues and current implementation of the mechanism.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"19 1","pages":"161-164"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81144346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive RRT based on dynamic step for UAVs route planning 基于动态步长的自适应RRT无人机航路规划
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933760
Na Lin, Ya-lun Zhang
Executing task in the complex environment, the traditional RRT algorithm is easy to make the tree fall into local minimum area which resulted in poor efficiency. In order to solve the problem, this paper proposes an adaptive RRT algorithm based on dynamic step for path planning and uses the cubic polynomial BSpline curve fitting to smooth the plannned path. The simulation results show that the number of explore failures reduced 35186 times, consuming time reduced 963 ms, distance reduced 33 km at the 3000th iteration by using the adaptive RRT based on dynamic step comparing to the traditional RRT algorithm.
在复杂环境下执行任务时,传统的RRT算法容易使树陷入局部最小区域,导致效率低下。为了解决这一问题,本文提出了一种基于动态步长的自适应RRT算法进行路径规划,并利用三次多项式b样条曲线拟合对规划的路径进行平滑处理。仿真结果表明,与传统RRT算法相比,基于动态步长的自适应RRT算法在第3000次迭代时勘探失败次数减少35186次,消耗时间减少963 ms,距离减少33 km。
{"title":"An adaptive RRT based on dynamic step for UAVs route planning","authors":"Na Lin, Ya-lun Zhang","doi":"10.1109/ICSESS.2014.6933760","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933760","url":null,"abstract":"Executing task in the complex environment, the traditional RRT algorithm is easy to make the tree fall into local minimum area which resulted in poor efficiency. In order to solve the problem, this paper proposes an adaptive RRT algorithm based on dynamic step for path planning and uses the cubic polynomial BSpline curve fitting to smooth the plannned path. The simulation results show that the number of explore failures reduced 35186 times, consuming time reduced 963 ms, distance reduced 33 km at the 3000th iteration by using the adaptive RRT based on dynamic step comparing to the traditional RRT algorithm.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"291 1","pages":"1111-1114"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76261507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Signal extraction and fault identification of steam turbine vibration 汽轮机振动信号提取与故障识别
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933610
Junru Gao, Xin Meng, Yajun Sun
This paper, the vibration signal of steam turbine which are detected by fault diagnosis are influenced by environmental noise and detecting instrument itself, leading to vibration signal waveform distortion which contains a large number of non-stationary composition, and cannot effectively react turbine fault characteristics, and the coupling among different fault characteristics of unilateral fault features make it difficult to identify fault accurately. Aiming at solving this problem, this paper combine the axis of spectrum analysis with path analysis of vibration signal processing and recognition method, two kinds of detection method in the fault diagnosis process validation to ensure the accuracy of test results.
本文研究了汽轮机故障诊断检测到的振动信号受环境噪声和检测仪器本身的影响,导致振动信号波形失真,其中包含大量非平稳成分,不能有效反应汽轮机故障特征,且单侧故障特征的不同故障特征之间存在耦合,难以准确识别故障。针对这一问题,本文将轴向频谱分析与路径分析相结合,对振动信号进行处理和识别方法,在故障诊断过程中对两种检测方法进行验证,保证检测结果的准确性。
{"title":"Signal extraction and fault identification of steam turbine vibration","authors":"Junru Gao, Xin Meng, Yajun Sun","doi":"10.1109/ICSESS.2014.6933610","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933610","url":null,"abstract":"This paper, the vibration signal of steam turbine which are detected by fault diagnosis are influenced by environmental noise and detecting instrument itself, leading to vibration signal waveform distortion which contains a large number of non-stationary composition, and cannot effectively react turbine fault characteristics, and the coupling among different fault characteristics of unilateral fault features make it difficult to identify fault accurately. Aiming at solving this problem, this paper combine the axis of spectrum analysis with path analysis of vibration signal processing and recognition method, two kinds of detection method in the fault diagnosis process validation to ensure the accuracy of test results.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"22 1","pages":"481-483"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77850440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reliability analysis of power supply based on recursive algorithm 基于递归算法的电源可靠性分析
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933574
Ma Weiqing, Zhan Huiming, Kang Chaoqun, Z. Ye
Aimed at improving power supply reliability, according to the radial pattern of power supply network, reliability analysis of power supply network based on recursive algorithm is put forward in this paper. The power supply network is represented by a binary tree, and by means of recursive algorithm in a reverse order, the reliability of sub-feeders are reasonably equivalent by a line to simplify the whole power supply network. Thus, time and space of computation are saved. Finally, a case has been used to illustrate the effectiveness of the method.
为了提高供电可靠性,根据供电网络的径向分布规律,提出了基于递归算法的供电网络可靠性分析方法。供电网络用二叉树表示,通过反向递归算法,将各子馈线的可靠性合理等效为一条线,从而简化整个供电网络。从而节省了计算的时间和空间。最后,通过一个算例说明了该方法的有效性。
{"title":"Reliability analysis of power supply based on recursive algorithm","authors":"Ma Weiqing, Zhan Huiming, Kang Chaoqun, Z. Ye","doi":"10.1109/ICSESS.2014.6933574","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933574","url":null,"abstract":"Aimed at improving power supply reliability, according to the radial pattern of power supply network, reliability analysis of power supply network based on recursive algorithm is put forward in this paper. The power supply network is represented by a binary tree, and by means of recursive algorithm in a reverse order, the reliability of sub-feeders are reasonably equivalent by a line to simplify the whole power supply network. Thus, time and space of computation are saved. Finally, a case has been used to illustrate the effectiveness of the method.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"308 1","pages":"327-330"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77955222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quick search algorithms based on ethnic facial image database 基于民族人脸图像数据库的快速搜索算法
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933633
BaoWei Hou, Rui Zheng, Guosheng Yang
The current popular image features index structure can be divided into tree-based structures, hash-based structures and machine learning based structures. In face recognition, selecting the appropriate image feature indexing structure to achieve large-scale face image matching has aways been a problem. In this paper, we present a global image features indexing method based on complete binary tree, using the ethnic facial image database, by contrast with the local sensitive hash(LSH), and principal component analysis (PCA) is adopted to extract facial image features for convienent. Experimental results show that the proposed method is superior to the local sensitive hashing in velocity.
目前流行的图像特征索引结构可以分为基于树的结构、基于哈希的结构和基于机器学习的结构。在人脸识别中,选择合适的图像特征索引结构来实现大规模的人脸图像匹配一直是一个难题。本文提出了一种基于完全二叉树的全局图像特征索引方法,以民族人脸图像数据库为基础,对比局部敏感哈希(LSH)方法,采用主成分分析(PCA)方法提取人脸图像特征,便于检索。实验结果表明,该方法在速度上优于局部敏感哈希算法。
{"title":"Quick search algorithms based on ethnic facial image database","authors":"BaoWei Hou, Rui Zheng, Guosheng Yang","doi":"10.1109/ICSESS.2014.6933633","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933633","url":null,"abstract":"The current popular image features index structure can be divided into tree-based structures, hash-based structures and machine learning based structures. In face recognition, selecting the appropriate image feature indexing structure to achieve large-scale face image matching has aways been a problem. In this paper, we present a global image features indexing method based on complete binary tree, using the ethnic facial image database, by contrast with the local sensitive hash(LSH), and principal component analysis (PCA) is adopted to extract facial image features for convienent. Experimental results show that the proposed method is superior to the local sensitive hashing in velocity.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"50 1","pages":"573-576"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78092576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stereoscopic video color correction based on decorrelation color space 基于去相关色彩空间的立体视频色彩校正
Pub Date : 2014-06-27 DOI: 10.1109/ICSESS.2014.6933554
Chaohui Lu, J. Pan, Yaran Chen
In the production of stereoscopic video, there are some color differences between different views. In this paper, a color correction method based on decorrelation color space is proposed. Image features from the reference image and original image are first extracted by Harris algorithm, and Normalized Cross-Correlation algorithm (NCC) is used to find the corresponding match points of the images. Then the RGB color space is converted into decorrelation color space in which colors are corrected with a formula which includes mean and variance. After that, images are converted back into the RGB color space. Experiment results show that the proposed method can produce a better correction result than histogram match.
在制作立体视频时,不同视点之间存在一定的色差。提出了一种基于去相关色彩空间的色彩校正方法。首先通过Harris算法从参考图像和原始图像中提取图像特征,然后使用归一化互相关算法(NCC)找到图像对应的匹配点。然后将RGB色彩空间转换为去相关色彩空间,在去相关色彩空间中使用包含均值和方差的公式对色彩进行校正。之后,图像被转换回RGB色彩空间。实验结果表明,该方法比直方图匹配具有更好的校正效果。
{"title":"Stereoscopic video color correction based on decorrelation color space","authors":"Chaohui Lu, J. Pan, Yaran Chen","doi":"10.1109/ICSESS.2014.6933554","DOIUrl":"https://doi.org/10.1109/ICSESS.2014.6933554","url":null,"abstract":"In the production of stereoscopic video, there are some color differences between different views. In this paper, a color correction method based on decorrelation color space is proposed. Image features from the reference image and original image are first extracted by Harris algorithm, and Normalized Cross-Correlation algorithm (NCC) is used to find the corresponding match points of the images. Then the RGB color space is converted into decorrelation color space in which colors are corrected with a formula which includes mean and variance. After that, images are converted back into the RGB color space. Experiment results show that the proposed method can produce a better correction result than histogram match.","PeriodicalId":6473,"journal":{"name":"2014 IEEE 5th International Conference on Software Engineering and Service Science","volume":"77 1","pages":"244-247"},"PeriodicalIF":0.0,"publicationDate":"2014-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72864408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 5th International Conference on Software Engineering and Service Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1