The proceedings contain 36 papers. The special focus in this conference is on Slow intelligence systems, Mobile intelligent application, Human-computer interaction, Semantic computing and processing, Cultural and soci...
ISBN:
(纸本)1891706322
The proceedings contain 36 papers. The special focus in this conference is on Slow intelligence systems, Mobile intelligent application, Human-computer interaction, Semantic computing and processing, Cultural and social multimedia and software engineering and Software security. The topics include: Relating slow intelligence research to bilingualism;design and implementation of image analysis system by applying component-based slow intelligence system framework;a framework for intrusion detection system based on the slow intelligent approach;cloud services for medical image processing: application of service science and slow intelligence systems;a slow intelligence framework for human behavior recognition using wearable cameras;development of a real-time air pollution alert system using smart phones;sharing digital and physical contents on and above distributed surfaces using active infrared keying;fuzzy color space segmentation to identify the same dominant colors as users;insights on the development of visual tools for analysis of pollution data;ontological filtering for sentiment analysis;effcient computation of object boundary intersection and error tolerance in VRCC-3D+;EEG-based BCI data analysis on visual-perceptual priming in the context of a museum of fine;use of large multi-touch screens for informal learning;categorization and evolution over the years;variability management in software product line activity diagrams;an integrated architecture for multiagent virtual worlds for performing adaptive testing games and optimimal resources utilization for indexing within a distributed multimedia retrieval system and functionalities.
Recently, the usage of innovative decision support systems (DSSs) for monitoring the subject's health status in the daily living is becoming a common practice to provide real aid in chronic patients' managemen...
详细信息
Recently, the usage of innovative decision support systems (DSSs) for monitoring the subject's health status in the daily living is becoming a common practice to provide real aid in chronic patients' management. Rule-based implementations of such DSSs simulate the decision-making process described in clinical guidelines by also allowing new/existing rules to be directly and dynamically added/edited by the physicians. However, this task is error-prone and can generate different kinds of anomalies that compromise the effectiveness and correctness of the final DSSs. In order to face such an issue, this paper presents a novel algorithm for verifying the reliability of clinical guidelines, encoded in the form of complex rules with also statistical or trend patterns in their conditions, so as to determine two categories of potential structural anomalies, i.e. inconsistency or redundancy. Moreover, in order to provide a deep insight about the verification outcome, the method has been enriched with a taxonomy for classifying the detected anomalies. The algorithm has been evaluated on different rule bases in terms of time-processing, proving its efficiency. This research work has been developed within the EU IST CHRONIOUS Project, devoted to define a generic platform for remotely monitoring the health status of chronic patients.
The sharing, distribution and transmission of proliferated digital multimedia contents over the insecure worldwide available internet and wired/wireless networks has encouraged the copyright fraud, unauthorized access...
详细信息
ISBN:
(纸本)9783642292156
The sharing, distribution and transmission of proliferated digital multimedia contents over the insecure worldwide available internet and wired/wireless networks has encouraged the copyright fraud, unauthorized access and illegal usage. This brings new technical challenges to provide the end-to-end security to multimedia contents for establishing ownership rights, ensuring authorized access, preventing illegal replication etc. To address the above mentioned requirements, a visual multimedia content protection technique is proposed. The technique is based on the high dynamic responses of multiple high-dimensional chaotic systems. The multimedia encryption is achieved by randomly picking the actual encryption keys out of numbers of hybridized keys that are extracted from complex sequences of three high dimensional chaotic systems. Accordingly, a high encryption effect is turned up in the encrypted content. The proposed technique is experimented on the multimedia color imagery. The decomposed R, G, B components of color plain-image are initially diffused with their self, before diffusing with encryption keys. It is experimentally verified that the proposed technique has great encryption performance and achieves high confidential security. Eventually, the statistical results confirm the practicability and suitability of the approach for visual multimedia content protection.
The paper introduces a "lazy" Data Mining technology, which models students' learning characteristics by considering real data instead of deriving ("guessing") their characteristics explicitly....
详细信息
The paper introduces a "lazy" Data Mining technology, which models students' learning characteristics by considering real data instead of deriving ("guessing") their characteristics explicitly. In former work, the authors developed a modeling system for university learning processes, which aims at evaluating and refining university curricula to reach an optimal learning success in terms of the best possible grade point average (GPA). This is performed by applying an Educational Data Mining (EDM) technology to former students curricula and their degree of success (GPA) and thus, uncovering golden didactic knowledge for successful education. Here, we introduce a complementary technology to mine course characteristics similarities of former students' study traces and utilize them to optimize curricula of current students based to their performance traits revealed by their study achievements so far. This way, technology generates suggestions of personalized curricula. Furthermore, this technology is supplemented by an adaptation mechanism, which compares recent data with historical data to ensure that the similarity of mined characteristics follow the dynamic changes affecting curriculum (e.g., revision of course contents and materials, and changes in teachers, etc.).
In this paper, we propose a new architecture of Pulse Mode Neural Network (PMNN) with very simple activation function. Pulse mode is gaining support in the field of hardware Neural Networks thanks to its higher densit...
详细信息
Online chats are recently shown to result in long term associations among users, represented by a directed weighted network, similar to dialogs in online social networks. We consider the persistent network which emerg...
详细信息
Online chats are recently shown to result in long term associations among users, represented by a directed weighted network, similar to dialogs in online social networks. We consider the persistent network which emerges from user-to-user communications found in the empirical dataset from IRC Ubuntu channel. The structure of these networks is determined by computing topological centrality measures, link correlations and community detection, and by testing validity of the "social ties" hypothesis. To unravel underlying linking mechanisms, we further study type of messages exchanged among users and users with Web bots, and their emotional content, annotated in the texts of messages. We find that the ranking of the users according to the frequency of their messages obeys Zipf's law with a unique exponent for each message type. Furthermore, the specific hierarchical structure of the network with a strong core as well as its social organization are shown to be closely related with the most frequently used message types and the amount of emotional arousal in them.
Recently with the development of more affordable 3D acquisition systems and the availability of 3D face databases, 3D face recognition has been attracting interest to tackle the limitations in performance of most exis...
详细信息
ISBN:
(纸本)9780889869493
Recently with the development of more affordable 3D acquisition systems and the availability of 3D face databases, 3D face recognition has been attracting interest to tackle the limitations in performance of most existing 2D systems. In this work, a novel method for the automatic processing of 3D facial data is presented. Here the input data can be in the form either of a 3D triangular facial mesh (containing the coordinate and connectivity information), or of a data point cloud. In the new approach, the main goal is to automatically determine a symmetry profile for the face. This is undertaken by computing the intersection between the symmetry plane (found by an automatic search) and the facial mesh, resulting in a planer curve that accurately represents the symmetry profile. This is then utilized to allocate the central region of the face and it extracts a set of profiles from that region which can be used for recognition purposes.
Streaming real time video over wireless networks cannot guarantee that all the frames could meet their deadlines. Wireless networks may suffer from bandwidth limitations. To reduce the streaming data over wireless net...
详细信息
Streaming real time video over wireless networks cannot guarantee that all the frames could meet their deadlines. Wireless networks may suffer from bandwidth limitations. To reduce the streaming data over wireless networks, we propose a technique to identify, and extract the Region Of Interest (ROI), and drop the non-ROI from the frames that are between the reference frames. The Sum of Absolute Differences (SAD) will compute the consecutive video frames to identify the ROI as it considered the most motion and important region. The reconstruction mechanism to the non-ROI is performed on the mobile side by applying linear interpolation between the reference frames. We evaluate the proposed approach by using Mean Opinion Score (MOS) measurements. MOS are used to evaluate the two scenarios with equivalent encoding size, where the users observe the first scenario with a low bit rate for the original videos, while for the second scenario the users observe our proposed approach. The results show that our technique significantly reduces the amount of data, while the reconstruction mechanism provides acceptable video quality to the mobile viewers.
The variation of facial appearance due to the viewpoint or pose obviously degrades the accuracy of any face recognition systems. One solution is generating the virtual frontal view from any given non-frontal view. In ...
详细信息
The proceedings contain 485 papers. The topics discussed include: analysis on environmental cost internalization effect - a study based on CO2 emission;pricing decision theory and the empirical research on internation...
ISBN:
(纸本)9780769546476
The proceedings contain 485 papers. The topics discussed include: analysis on environmental cost internalization effect - a study based on CO2 emission;pricing decision theory and the empirical research on international carbon emissions trading;research on science and technology awards evaluation system based on multi-agent;study on proportional-derivative controller for a class of chaotic financial systems;numerical simulations of temperature field of coal-bed methane with heat injection based on ANSYS;the Lagrange interpolation of trapezium fuzzy numbers;personalized learning resources recommendation model based on transfer learning;one of aerial image geometric correction methods based on 3-D projection;research on fault diagnosis of mixed-signal circuits based on genetic algorithms;analysis on analytic arithmetic of oriented warhead's contact of missile and target;and an effective pattern matching algorithm for intrusion detection.
暂无评论