Earticle

현재 위치 Home

International Journal of Multimedia and Ubiquitous Engineering

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJMUE) [Science & Engineering Research Support Center, Republic of Korea(IJMUE)]
  • pISSN
    1975-0080
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.11 No.9 (39건)
No
1

An Empirical Analysis of Android Apps Bug and Automated Testing Approach for Android Apps

Yi Bie, Sheng Bin, Gengxin Sun, Xicheng Zhou

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Android platforms and its applications (apps) have gained tremendous popularity recently, hence the reliability of Android apps is becoming increasingly important. Due to the novelty of the Android platform, apps are prone to errors, which would affect user experience and requires frequent bug fixes. In this paper, an empirical study on bugs in some widely-used open-source Android apps from diverse categories such as media, tools and communication were performed. Based on the findings of the empirical study, an approach for automating the testing process for detecting Android apps GUI bugs was presented. We show how the approach helped to re-discover existing bugs and find new bugs, and how it could be used to prevent certain bug categories. Our empirical study and automated testing approach have the potential to help developers increase the quality of Android apps.

2

Personal Preference Based Movie Recommendation System

Sang-Hyun You, Jeawon Park, Jaehyun Choi

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.11-18

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Recommendation systems sort out the information of user’s concerns for supporting decision-making. Today, recommendation systems have a very close relationship with our modern society. However, despite the large amount of information available due to information technological advancement, finding information specific to the user's concern is getting more difficult. In order to handle such issues, the importance of the recommendation system has become apparent. Collaborative filtering is one of the referral systems, which automatically predicts the users’ interest based on the information on preference collected from a considerable number of people. However, accuracy issues come to the fore as an insufficient amount of information collected. This paper derived a regression equation using collaborative filtering of user preference information and official movies information to solve the problems, thereby proposing a movie recommendation system. By adding user preference information to the regression equation using only objective movie information, accuracy has been increased by 20%, and the recall ratio by 9%. It has been shown that utilizing preference information increases accuracy for recommendation of movies.

3

Research on Video Analysis and Tracking Technology in Swimming Video

Ni An

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.19-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper proposes the tracking method for swimmer in the video with Kalman filtering prediction. The Kalman initiates the swimmer with feature such as the location of object and the size of its enclosing rectangle which can be got in the detection proceeding, which are used to predict the feature of the tracked simmer in subsequent frames and ascertain the scope for searching the tracked object. The results of experiments show that this method can be used to provide information for controlling cameras and this can help to track the swimmer in the next frames.

4

A Characteristic-Preserving Steganographic Method Based on Revision Identifiers

Lingyun Xiang, Caixia Sun, Niandong Liao, Weizheng Wang

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.29-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since the majority of the available steganographic schemes in OOXML format documents suffered the disadvantages of unsatisfactory anti-detection capability and security level, a characteristic-preserving steganographic method with high security is proposed in this paper. The proposed method embeds secret information by replacing the last three bytes of the values of the revision identifiers in the main document body of the OOXML format document, while preserving the normal characteristics of the document. Meanwhile, position marks are added to track the locations of the embedded information. In order to keep the internal data consistency of the document, the newly created values are added into other related parts. Experimental results show that the method not only possesses good imperceptibility and anti-detection capability, but also has high security and large embedding capacity.

5

Design of an ECDIS Checking the Status of Vessels and Marine Devices

Gyu-Hyun Kim, Jong-Wook Jang

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.39-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Large vessels are currently operating by using an ECDIS, a system enabling automatic navigation and checking marine conditions. In the past, the ECDIS was used for vessels but in these days, it has been used as a method for collecting and verifying marine information, etc. from land by using a computer, instead of taking a boat out. The ECDIS on sale is generally used by companies which operate marine workers. However, this system has caused inconvenience to marine workers, in terms of tasks, services, or operations. Marine workers move out to the sea after checking the status of the system at the office. Due to the weather such as waves and winds, marine devices are not often found on the relevant coordinates. In such a case, the workers onerously need to come back to the land and track the marine devices again. In order to solve such a problem, this thesis purposes to develop a system which can check the locations of marine devices and verify a marine chart even on the sea by using a mobile. The proposed system can integrate and support a variety of protocols of relevant devices in the system itself and check data via mobile through the data transmission and streaming functions.

6

An Simplified Reference Frame Selection Configuration Method

Ping Kuang, Jianhua Deng

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.47-58

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Reference Frame Selection (RFS), as reference frame management mechanism in High Efficiency Video Coding (HEVC), plays an important role in constantly developing video coding standard. As RFS has been improved to adapt the introduction of generalized B frame in HEVC. In this paper, a simplified coding configuration method is presented to simplified reference frame management process to cut down on encoding time. This method is applied in real time low-delay encoding configuration with specific simplified rules. Simplified method is conducted on the reference list with biggish Qualitization Parameter (QP) offset and improves coding efficiency with about 10.5% reduction on encoding time and only 0.5% negligible raise on BD-bitrate.

7

Design of a Dual-Warp Scheduler for Streaming Multi-Processors Based GP-GPU

Do-Hyun Kim, Jong Joon Park

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.59-66

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a warp scheduler is proposed for the improvement of multi-core stream processor based GP-GPU performance. The proposed warp schedulers are divided into odd and even warps, which are issued separately by applying the dual-warp issue. Furthermore, it can simultaneously process up to four instructions because each warp can issue two instructions through superscalar issue. The superscalar issue has a limitation in that it cannot simultaneously process two instructions having data dependence. To solve this limitation, the warp scheduler determines the instruction issuance by testing the issuing condition of the multi-core processor and the read/write register dependence. For scheduling algorithm, the round-robin algorithm was used. To measure the performance of multi-core stream processors, the Gaussian filter mask processing result of the GP-GPU using the proposed warp scheduler was compared with that of the multi-core CPU on various embedded platforms. The experiment results showed that the processing speed of the GP-GPU using the warp scheduler was 6-7 times faster. The GP-GPU also performed better on an image processing application.

8

Study on the Simulation and Experiment of Cantilever Beam Piezoelectric Energy Harvester

Yao Fenglin, Meng Wengjun, Zhao Jie, Yin hang

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.67-82

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Owing great to the widespread application of wireless sensor networks, supply energy for these wireless sensors proves to be a significant issue. Moreover, for the ambient vibration lies everywhere, the vibration can supply energy for the wireless sensor via energy harvester. The single cantilever beam piezoelectric energy harvester becomes the research focus for the simple structure and higher energy conversion efficiency. Due to the transcendental equation in distributed parameter model, the numerical method is become powerful complement for theoretical and experimental method. Static analysis, model analysis, harmonic response analysis and mechanical-electrical coupling analysis are simulated in ANSYS. Four aspects of the harvester has been studied in detail. Test and measurement show that Geometry and shape parameters have great affect to piezoelectric single cantilever energy harvester. In addition, the inherent characteristics of piezoelectric patch will affect enormously on the electrical characteristics

9

Sports Video Structure Analysis and Feature Extraction in Long Jump Video

Maohua Zhuang

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.83-92

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

How to help people to find their favorite sports in the massive video, in order to achieve this goal in the finite state machine (FSM) theory based on in-depth research. Combined with the actual situation of this paper, first, we determined the reasonable FSM model. Then, a fast robust global motion estimation algorithm is used to estimate the global motion of the video sequences, and the foreground is separated from the background by motion compensation. After the foreground of the video, a series of image feature extraction algorithm, which is based on the main color histogram and histogram, is used to extract the low level feature extraction. Finally, the results of the experimental operation, the performance of the algorithm, and the results of the system are presented.

10

Automatic Segmentation for Textured Object Images

Chang-Min Park, Chang-Geun Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.93-100

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we proposed an automatic segmentation method of object color images with irregular texture. Recently segmentation often used for the image retrieval and in the application. It is more important to approximate the regions than to decide precise region boundary. A color image is divided into blocks, and edge strength for each block is computed by using the modified color histogram intersection method that has been developed to differentiate object boundaries from irregular texture boundaries effectively. The edge strength is defined to have high values at the object boundaries, while it is designed to have relatively low values at the texture boundaries or in the interior of a region. The proposed method works based on small-size blocks, the color histogram of each of which is computed preliminarily once. Thus it works fast but provides rough segmentation. A hybrid color quantization method is used to select a small number of appropriately quantized colors quickly. The proposed method can be applicable for the segmentation in object based image retrieval.

11

Animation Arts Teaching Under New Media Environment

Jicheng Cong, Buqu Zeng

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.101-108

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

12

Research on the Performance for Two Kinds of Topology of Constant Current Regulator of Navigational Lighting Aid

Zhang Gang, Zhu Jianqu, Liu Zhonghao

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.109-116

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

13

A Study on 3D Panorama System Using Depth-map Generation Techniques

Jong Chan Kim, Oh Hoon Cho, Eung Kon Kim

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.117-128

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The point is a vanishing point and the lines which meet at the point are vanishing lines. Depth-map can be generated to restore a 3D space structure from the 2D images using the vanishing point. The research described in this paper compensates for the disadvantages of depth-map generation techniques that need to restore a 3D spatial structure from a 2D image. In addition, a 3D panorama system is proposed. The 3D panorama system using depth-map generation techniques creates a 3D effect in which users feel that they are standing at the shooting location and looking around. The 3D panorama system provides a free time for nearby objects and distant background in a wide area, and it creates realistic 3D images such as constant high-quality pictures. The 3D panorama system will offer the sense for the real and the immersion as it gets over the limit of 2D panorama technology and supports users with a natural navigation. The 3D panorama image using depth-map is worth noticing since it shows the possibility to use the construction of image based virtual system.

14

A Unequalven Clustering Routing Protocol in Wireless Sensor Networks

Deyu Zhang, Le Jiao, Yanjun Chen, Junping Shao

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.129-138

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

15

Measurement of the Cam Spacing on Camshaft by Binocular Vision

Yueqian Hou, Qingchang Tan, Qinghua Li, Yumei Song, Guannan Li

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.139-146

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

16

Applying Diffusion of Innovation (DOI) Theory to Mobile Learning For Quality Education

A. A. Azeta, Eweoya Ibukun

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.147-156

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Embracing of new learning services using mobile devices can enhance students’ engagement, enthusiasm, reduce cost of textbook and enhance quality of education. Studies on use of mobile devices for learning are on the increase. However, several mobile learning researches have been on adoption of mobile learning with respect to usage. In order to take advantage of potentials of mobile learning, research that addresses the adoption with respect to quality of education is essential. Diffusion of innovation is one of theories used to ascertain the level of adoption and quality of service from mobile learning. This study used the diffusion of innovation (DOI) theory to study the level of adoption and quality derived from using mobile learning in Nigeria. Statistical Package for Social Science (SPSS) was used for data analysis. The results of the findings will provide insights into m-learning usage in Nigeria and other developing countries.

17

Real-Time Tracking Algorithm for Moving Target Based on Dynamic Monitoring Video

Chaoxiang Chen, Wenshu Li, Shiping Ye, Huafeng Chen

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.157-164

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Target tracking algorithm is a key technical problem in the computer version field, and the existing algorithms are mainly based on the stationary camera platform. Therefore, a real-time tracking algorithm for moving target based on dynamic monitoring video is proposed in this article. Firstly, the feature points are screened according to the influence of the moving target on the light streams; secondly, the light stream method is adopted to estimate the global motion of the camera; finally, the motion equation of the particle filter is modified according to the global motion estimation result and meanwhile the color histogram is selected as the characteristic model of the target, thus to track the moving target. The experiment result shows that the particle filter algorithm can rapidly and accurately track the moving target during camera motion process to meet the real-time requirement, and has excellent robustness.

18

Indoor Positioning System Based on an Improved Weighted-Trilateration Algorithm with Fingerprinting Technique

Hayeon Choi, Youngkyoung Koo, Seona Lee, Sangsoo Park

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.165-176

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Location Based Services (LBS) are software algorithm systems used by internet protocol capable wireless device technologies assist and/or replace Global Positioning System (GPS) with their task of acquiring and interpreting location describing data. LBS, and the data they provide, are increasingly being used by a growing number of users. As the demand for LBS grows, increasingly there is an additional requirement for more accurate indoor location position determination. Indoor localization algorithm has always been a challenge for location describing device manufacturers. This paper proposes a solution for improving accuracy while also decreasing computational requirements. Leveraging readily obtainable, cost-effective, Bluetooth Low Energy (BLE) Beacons, the research details a modified trilateration algorithm utilizing weighted nodes coupled with emitter/receiver distance measuring improvements accomplished using transmitter emission fingerprinting techniques. The proposed algorithm is evaluated through thorough experimentations that produce a reduction in difference between the real and measured location. The results found are solely obtained through algorithmic solutions utilizing standardized transmission protocols and readily available devices technologies.

19

Design and Application of High Energy Collision Flexible Buffer

Yu Guang-bin, Guan Yan-qi, Yang Xiao-hui, Bu Jing-yuan

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.177-186

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Introduces a suitable for steep inclined shaft sports car flexible buffer design method, given the high energy collisions flexible buffer mathematical model and simulation test is conducted, designed a high energy collision flexible buffer, to solve the problem of conventional buffer buffer distance is too long, the vehicle off road and so on, through the friction between the wire rope and the buffer to absorb the energy of the sports car, and realize the effective interception of the vehicle, ensure that the vehicle has a short distance to stop the car, and ensure the safe and reliable operation of the anti-car system. To ensure the safety of coal mine rail transport is of great significance.

20

An Secure Hierarchical Key Agreement Scheme for Wireless Sensor Networks

Kefei Mao, Jie Chen, Jianwei Liu

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.187-202

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In Wireless Sensor Networks (WSN), a key agreement scheme is an essential task for secure communications. Recently, Lee and Kim proposed a hierarchical key agreement scheme for the fresh key establishment in WSN. This scheme achieves a secure session key agreement. In this paper, we analyze the security of the scheme and illustrate that their scheme is unconfident against the insider attack in practice. Moreover, it is also difficult to resist the replay attack in this scheme. Then, we proposed a novel scheme inspired by their scheme. The entities of our scheme include a Sink besides the sensor nodes, which interrupts the construction of the insider attack. Our scheme adopts the timestamp mechanism to resist replay attack, which could decrease the storing requirement of the sensor nodes. Thus, it is more practical and realistic. We illustrate that our proposal can provide stronger security than Lee and Kim’s scheme.

21

Parametric Comparison of Multicast Support for Network Mobility Management : A Qualitative Analysis

Azana Hafizah Mohd Aman, Aisha-Hassan A. Hashim, Azween Abdullah, Huda Adibah Mohd Ramli, Shayla Islam

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.203-210

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Proxy Mobile IPv6 (PMIPv6) was initially introduced to assist unicast network-based mobility. In recent years, new approaches have been introduced to provide multicast support in PMIPv6. IP multicast is an imperative mechanism for internet video provision. As the usage of internet data traffic remains to develop rapidly, there is a need to optimize and improve the performance of multicast service. Issues such as large overhead, high packet loss rate, single point of failure, service disruption time, handover latency, and non-route optimization needs to be tackled efficiently. To provide multicast services in PMIPv6, route optimization, global mobility, load balancing and context transfer approaches have been introduced. The foremost aim of this paper is to study and analyze these methods via qualitative analysis. This is to focus the advantages and the limitations of the current approaches.

22

Research on Sound Source Localization for Device Fault Diagnosis

Liang Zhang, Tiejun Li, Yinxue Zong, Yang Tan

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.211-220

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A sound source localization method is presented herein around the utilization with the sound signal for device fault diagnosis. Firstly, Butterworth wavelet and its filter banks were designed aimed at the background noise separation in the industrial environment, it is proved that the Butterworth wavelet filter can extract the weak fault features in source signals without frequency aliasing phenomenon. Then the algorithms of sound source localization was studied in depth, the generalized cross-correlation(GCC) based time delay estimation(TDE) was presented. Finally the coordinates of sound source location was obtained in the quaternion microphone array model. The experiment results show that in the industrial environment, the error value of positioning accuracy is less than 4cm within an appropriate distance, it can meet the needs of practical application, meanwhile the reliability and the real-time performance is satisfactory.

23

This paper designed and analyzed the communication protocol for the data communication between the IOT device and the middleware server of the IOT based Cold Chain Monitoring System. In this regard, we have referenced the CoAP Protocol Model of IETF CoRE WG, and analyzed and designed the process status flow, data flow and frame format of the IOT device (IOTD) and the middleware server. In order to test the effectiveness of the proposed Cold Chain Communication Protocol, we have produced the Zigbee, Bluetooth and wifi module mounted gateway and the temperature, humidity sensor. After sending the temperature data from the IOTD to the middleware server, we analyzed the received data from the middleware server. As the result, we were able to interpretate the data sent from the IOTD, and identify that in using these data the cold chain data such as the temperature, humidity, and battery remains data can be collected in real time.

24

This study examined the effect of the individual conformity-interpersonal value on guanxi building behavior by focusing on the mediating role of mental accounting non-fungibility effect and the moderating role of frustration. The results of analyzing 291 cases from five provinces in the People’s Republic of China showed that conformity–interpersonal value was positively related to guanxi building behavior. In addition, non-fungibility of mental accounting mediated the main effect of conformity–interpersonal value on guanxi building behavior, while frustration moderated the negative relationship between conformity-interpersonal value and mental accounting non-fungibility effect such that the relationship was stronger among low frustration individuals than among high ones.

25

A Content-Based Approach to Recommend TV Programs Enhanced with Delayering Tagging

Fulian Yin, Xingyi Pan, Huixin Liu, Jianping Chai

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.243-254

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In response to explore how to extract the recommended items' features, a method is put forward called a Content-based TV Program Recommendation Approach Enhanced with Delayering Tagging. The Content-based approach is optimized to recommend TV programs and improved the way to extract the recommended items' features. Besides, the existing way of using supervised method to build user modeling is replaced with an unsupervised method using delayering tagging to show recommended TV program's content features and set up user preference model. After compared with Latent Factor Model and Collaborative Filtering recommendation algorithm with the same experimental data, the proposed algorithm in this paper increased the accuracy of 2.67\%, coverage rate of 3.02\% and 3.2\% of the Feature 1 value and achieved good recommendation results compared to the Latent Factor Model which revealed the best effect of recommendation.

26

The Multimedia Metadata Interoperability using MOXMDR+

Ho-Kyun Park, Seok-Jae Moon

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.255-264

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper suggested a model of MOXMDR+(Multimedia Ontology based on XMDR+) for interoperability of multimedia contents. In this paper, an XMDR-DAI-based multimedia metadata is defined to describe the application. The model was composed according to rules of ontology concept in the structure of metadata schema like as MDS(Multimedia Description Schema) of MPEG-7. Based on the concept of ontology, the association of multimedia contents data was expanded to enable semantic search.

27

The Noise Monitoring System and Automatic Correction Algorithm

Zeng Huapu, Li Yuting, Xu Huiyu, Pu Yunming, Qiao feng, Liang jun

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.265-276

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

For the improvement of living environment, there are more needs of the real time and online automatic noise monitoring system installed in many urban areas. In this project, the principle of noise audio frequency processing and coding algorithm was researched, including Discrete Cosine Transform and Wavelet Transform. The noise monitoring system solved the synchronous problem between the audio data and noise decibel, the special storage format separated the audio data which can be located in probability, and the audio data across segments to be played continually. The design of double-layer structure and isolating solved the problem of heat dissipating, waterproof and dustproof. In the experimental testing of the noise monitoring system, the noise decibel was affected by temperature and differential pressure, for improving its precision, the linear regression model is applied in the calculation of noise decibel. The least estimate method was used to calculate the residual for the automatic correction of the noise monitoring, and increase the accuracy of noise monitoring.

28

Collaborative filtering recommendation is one of the most effective recommending techniques, which provide customers with suggestions according to their interests. However, neighborhood based collaborative filtering methods confront great challenges of data sparsity and lack of accessorial information in the context of big data. To address these problems, we propose a hybrid model combining tag information and neighborhood based collaborative filtering. A folksonomy network model based on tag information is proposed to analyze the tag relevance between different items. And tag relevance is incorporated into rating prediction of neighborhood based collaborative filtering for improving the recommendation accuracy. Experiments on MovieLens and Netflix datasets are carried out to evaluate the performance of our method. The results show that our method outperforms other methods and can improve recommending quality effectively.

29

Based on real situations of supply chain network among enterprise alliances, this paper takes certain factors in every round of supply chain into consideration to establish robust model of supply chain network design. Before that, the strategy “decomposition- coordination” is adopted to get solutions optimizing supply chain system, putting focus on the analysis of supplier selection cost and decision-making cost of supply chain facilities, which is integrated and coordinated through activity-based costing. After the model establishment, examples are used to illustrate practicability and effectiveness of the model and algorithm.

30

Sixth Sense Junior

Chetan Arora, Hriday Goyal, Nikhil Arora, Gaurav Verma

보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.11 No.9 2016.09 pp.297-306

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The Research paper deals with the several facet of image processing like color detection and some applications of it. It will enable you to make gestures with the help of RGBY colors. The colors are detected on the basis of a property named centroid. On the basis of the coordinates of the centroid, apply distance algorithm and get the distance. By varying the distance between the fingers, different gestures can be made which can perform various operations of today’s digital world and also be applied to the industries.

 
1 2
페이지 저장