data
dict
{ "proceeding": { "id": "1tnWwqMuCzu", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tnXbsPeHbG", "doi": "10.1109/VRW52623.2021.00197", "title": "Myopia in Head-Worn Virtual Reality", "normalizedTitle": "Myopia in Head-Worn Virtual Reality", "abstract": "In this work, we investigate the influence of myopia on the perceived visual acuity (VA) in head-worn virtual reality (VR). Factors such as display resolution or vision capabilities of users influence the VA in VR. We simulated eyesight tests in VR and on a desktop screen and conducted a user study comparing VA measurements of participants with normal sight and participants with myopia. Surprisingly, our results suggest that people with severe myopia can see better in VR than in the real world, while the VA of people with normal or corrected sight or mild myopia is reduced in VR.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we investigate the influence of myopia on the perceived visual acuity (VA) in head-worn virtual reality (VR). Factors such as display resolution or vision capabilities of users influence the VA in VR. We simulated eyesight tests in VR and on a desktop screen and conducted a user study comparing VA measurements of participants with normal sight and participants with myopia. Surprisingly, our results suggest that people with severe myopia can see better in VR than in the real world, while the VA of people with normal or corrected sight or mild myopia is reduced in VR.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we investigate the influence of myopia on the perceived visual acuity (VA) in head-worn virtual reality (VR). Factors such as display resolution or vision capabilities of users influence the VA in VR. We simulated eyesight tests in VR and on a desktop screen and conducted a user study comparing VA measurements of participants with normal sight and participants with myopia. Surprisingly, our results suggest that people with severe myopia can see better in VR than in the real world, while the VA of people with normal or corrected sight or mild myopia is reduced in VR.", "fno": "405700a629", "keywords": [ "Eye", "Virtual Reality", "Vision Defects", "Display Resolution", "VR", "Normal Sight", "Severe Myopia", "Corrected Sight", "Head Worn Virtual Reality", "Perceived Visual Acuity", "Visualization", "Three Dimensional Displays", "Atmospheric Measurements", "Conferences", "Virtual Reality", "User Interfaces", "Particle Measurements", "Computing Methodologies", "Computer Graphics", "Graphics Systems And Interfaces", "Perception", "Virtual Reality" ], "authors": [ { "affiliation": "TU Wien", "fullName": "Lara Panfili", "givenName": "Lara", "surname": "Panfili", "__typename": "ArticleAuthorType" }, { "affiliation": "TU Wien", "fullName": "Michael Wimmer", "givenName": "Michael", "surname": "Wimmer", "__typename": "ArticleAuthorType" }, { "affiliation": "VRVis Forschungs-GmbH", "fullName": "Katharina Krösl", "givenName": "Katharina", "surname": "Krösl", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "629-630", "year": "2021", "issn": null, "isbn": "978-1-6654-4057-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1tnXbliA9lC", "name": "pvrw202140570-09419264s1-mm_405700a629.zip", "size": "13.6 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvrw202140570-09419264s1-mm_405700a629.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "405700a627", "articleId": "1tnXhk9NbLG", "__typename": "AdjacentArticleType" }, "next": { "fno": "405700a631", "articleId": "1tnXHy2qExi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892317", "title": "A preliminary study of users' experiences of meditation in virtual reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892317/12OmNApcufx", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ngmast/2016/0949/0/07801465", "title": "Immersive Virtual Reality as a Supplement in the Rehabilitation Program of Post-Stroke Patients", "doi": null, "abstractUrl": "/proceedings-article/ngmast/2016/07801465/12OmNrMZpyR", "parentPublication": { "id": "proceedings/ngmast/2016/0949/0", "title": "2016 10th International Conference on Next-Generation Mobile Applications, Security and Technologies (NGMAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892288", "title": "The impact of transitions on user experience in virtual reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892288/12OmNzUPptg", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446490", "title": "Water Flow Measurement Technology Assessing Spatial User Interaction in an Underwater Immersive Virtual Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446490/13bd1fKQxqS", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446488", "title": "Investigating the Reason for Increased Postural Instability in Virtual Reality for Persons with Balance Impairments", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446488/13bd1gJ1v0N", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/var4good/2018/5977/0/08576881", "title": "Transformative Experiences Become More Accessible Through Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/var4good/2018/08576881/17D45VTRoxP", "parentPublication": { "id": "proceedings/var4good/2018/5977/0", "title": "2018 IEEE Workshop on Augmented and Virtual Realities for Good (VAR4Good)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797858", "title": "Immersive EEG: Evaluating Electroencephalography in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797858/1cJ0JWkSE3m", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798158", "title": "PhantomLegs: Reducing Virtual Reality Sickness Using Head-Worn Haptic Devices", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798158/1cJ16zT3GdW", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a005", "title": "An Image-Based Method for Measuring Strabismus in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a005/1pBMkJ1GBSU", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2021/3225/0/322500a160", "title": "Affective State Classification in Virtual Reality Environments Using Electrocardiogram and Respiration Signals", "doi": null, "abstractUrl": "/proceedings-article/aivr/2021/322500a160/1zxLvYxcT2U", "parentPublication": { "id": "proceedings/aivr/2021/3225/0", "title": "2021 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1zxLs2qb1yU", "title": "2021 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "acronym": "aivr", "groupId": "1830004", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1zxLvYxcT2U", "doi": "10.1109/AIVR52153.2021.00037", "title": "Affective State Classification in Virtual Reality Environments Using Electrocardiogram and Respiration Signals", "normalizedTitle": "Affective State Classification in Virtual Reality Environments Using Electrocardiogram and Respiration Signals", "abstract": "Affective States are psycho-physiological constructs that are influenced by stimuli, interactions, and thoughts. However, understanding and classifying affective states are challenging as each individual perceives a situation differently. Currently, there exist picture and video databases for eliciting and classifying affective states. The ability of virtual reality (VR) environments to immerse a user in simulated real-world scenarios allows eliciting emotions more objectively. However, there does not exist a publicly available validated database utilizing VR environments to induce affective states. To address this gap our research focused on validating VR environments and creating a database for emotional classification. In this study, we utilized two commercially available VR applications (Guided Meditation VR&#x2122; and Richie&#x0027;s Plank Experience<sup>&#x2122;</sup>) to induce a calm state and acute stress among participants. Additionally, to create a novel validated multimodal dataset for affective state classification we collected both subjective and objective data. Subjective measures included valence and arousal collected using validated tools presented in a VR application environment developed by our team. Electrocardiogram (ECG) and Respiration (RR) signals were collected as objective data to extract the Heart Rate Variability and Respiration Rate Variability features from 25 participants (15 M, 10 F, Mean = 22.28 &#x00B1; 4.92). These features were later used to train two machine learning models for affective state recognition. After validating the efficacy of the VR environments to elicit the desired affective state using the subjective measures, a logistic regression (LR) and a support vector machine (SVM) with a linear kernel algorithm were developed. On comparing the two machine learning models, the LR performed better than the SVM and achieved 93.8&#x0025;, 96.2&#x0025;, 93.8&#x0025; leave one subject out cross-validation accuracy, precision and recall, respectively. The VR application application and both subjective and objective data collected in this study are publicly available.", "abstracts": [ { "abstractType": "Regular", "content": "Affective States are psycho-physiological constructs that are influenced by stimuli, interactions, and thoughts. However, understanding and classifying affective states are challenging as each individual perceives a situation differently. Currently, there exist picture and video databases for eliciting and classifying affective states. The ability of virtual reality (VR) environments to immerse a user in simulated real-world scenarios allows eliciting emotions more objectively. However, there does not exist a publicly available validated database utilizing VR environments to induce affective states. To address this gap our research focused on validating VR environments and creating a database for emotional classification. In this study, we utilized two commercially available VR applications (Guided Meditation VR&#x2122; and Richie&#x0027;s Plank Experience<sup>&#x2122;</sup>) to induce a calm state and acute stress among participants. Additionally, to create a novel validated multimodal dataset for affective state classification we collected both subjective and objective data. Subjective measures included valence and arousal collected using validated tools presented in a VR application environment developed by our team. Electrocardiogram (ECG) and Respiration (RR) signals were collected as objective data to extract the Heart Rate Variability and Respiration Rate Variability features from 25 participants (15 M, 10 F, Mean = 22.28 &#x00B1; 4.92). These features were later used to train two machine learning models for affective state recognition. After validating the efficacy of the VR environments to elicit the desired affective state using the subjective measures, a logistic regression (LR) and a support vector machine (SVM) with a linear kernel algorithm were developed. On comparing the two machine learning models, the LR performed better than the SVM and achieved 93.8&#x0025;, 96.2&#x0025;, 93.8&#x0025; leave one subject out cross-validation accuracy, precision and recall, respectively. The VR application application and both subjective and objective data collected in this study are publicly available.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Affective States are psycho-physiological constructs that are influenced by stimuli, interactions, and thoughts. However, understanding and classifying affective states are challenging as each individual perceives a situation differently. Currently, there exist picture and video databases for eliciting and classifying affective states. The ability of virtual reality (VR) environments to immerse a user in simulated real-world scenarios allows eliciting emotions more objectively. However, there does not exist a publicly available validated database utilizing VR environments to induce affective states. To address this gap our research focused on validating VR environments and creating a database for emotional classification. In this study, we utilized two commercially available VR applications (Guided Meditation VR™ and Richie's Plank Experience™) to induce a calm state and acute stress among participants. Additionally, to create a novel validated multimodal dataset for affective state classification we collected both subjective and objective data. Subjective measures included valence and arousal collected using validated tools presented in a VR application environment developed by our team. Electrocardiogram (ECG) and Respiration (RR) signals were collected as objective data to extract the Heart Rate Variability and Respiration Rate Variability features from 25 participants (15 M, 10 F, Mean = 22.28 ± 4.92). These features were later used to train two machine learning models for affective state recognition. After validating the efficacy of the VR environments to elicit the desired affective state using the subjective measures, a logistic regression (LR) and a support vector machine (SVM) with a linear kernel algorithm were developed. On comparing the two machine learning models, the LR performed better than the SVM and achieved 93.8%, 96.2%, 93.8% leave one subject out cross-validation accuracy, precision and recall, respectively. The VR application application and both subjective and objective data collected in this study are publicly available.", "fno": "322500a160", "keywords": [ "Affective Computing", "Electrocardiography", "Emotion Recognition", "Feature Extraction", "Learning Artificial Intelligence", "Medical Signal Processing", "Pattern Classification", "Pneumodynamics", "Psychology", "Regression Analysis", "Support Vector Machines", "Virtual Reality", "Emotional Classification", "Calm State", "Acute Stress", "Affective State Classification", "VR Application Environment", "Respiration Signals", "Respiration Rate Variability Features", "Affective State Recognition", "Virtual Reality Environments", "Video Databases", "Electrocardiogram Signals", "Guided Meditation VR", "Richies Plank Experience", "Logistic Regression", "Support Vector Machine", "LR", "SVM", "Linear Kernel Algorithm", "Support Vector Machines", "Solid Modeling", "Databases", "Atmospheric Measurements", "Machine Learning", "Virtual Reality", "Particle Measurements", "Affective Computing", "Biosignals", "Machine Learning", "Stress Database" ], "authors": [ { "affiliation": "Gianforte School of Computing Montana State University,Bozeman,USA", "fullName": "Apostolos Kalatzis", "givenName": "Apostolos", "surname": "Kalatzis", "__typename": "ArticleAuthorType" }, { "affiliation": "Gianforte School of Computing Montana State University,Bozeman,USA", "fullName": "Laura Stanley", "givenName": "Laura", "surname": "Stanley", "__typename": "ArticleAuthorType" }, { "affiliation": "Clemson University,Dept. of Industrial Engineering,Clemson,USA", "fullName": "Vishnunarayan Girishan Prabhu", "givenName": "Vishnunarayan Girishan", "surname": "Prabhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "aivr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "160-167", "year": "2021", "issn": null, "isbn": "978-1-6654-3225-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "322500a154", "articleId": "1zxLy64RGiA", "__typename": "AdjacentArticleType" }, "next": { "fno": "322500a168", "articleId": "1zxLuc7wT4Y", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/acii/2015/9953/0/07344696", "title": "Gestural and Postural Reactions to Stressful Event: Design of a Haptic Stressful Stimulus", "doi": null, "abstractUrl": "/proceedings-article/acii/2015/07344696/12OmNqBtiOD", "parentPublication": { "id": "proceedings/acii/2015/9953/0", "title": "2015 International Conference on Affective Computing and Intelligent Interaction (ACII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836496", "title": "Augmented Cues Facilitate Learning Transfer from Virtual to Real Environments", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836496/12OmNrF2DIl", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223346", "title": "An evaluation of virtual human appearance fidelity on user's positive and negative affect in human-virtual human interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223346/12OmNvjyxwr", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446269", "title": "A Study of Cybersickness and Sensory Conflict Theory Using a Motion-Coupled Virtual Reality System", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446269/13bd1eTtWYf", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom-workshops/2022/1647/0/09767281", "title": "An Exploratory Analysis of Interactive VR-Based Framework for Multi-Componential Analysis of Emotion", "doi": null, "abstractUrl": "/proceedings-article/percom-workshops/2022/09767281/1Df82pGW23e", "parentPublication": { "id": "proceedings/percom-workshops/2022/1647/0", "title": "2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09873958", "title": "Characterizing Physiological Responses to Fear, Frustration, and Insight in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/11/09873958/1GjwGGW9cSA", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/5555/01/09944083", "title": "Interaction of Cognitive and Affective Load Within a Virtual City", "doi": null, "abstractUrl": "/journal/ta/5555/01/09944083/1Ia7an3Rpks", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a311", "title": "Affective Virtual Reality System (AVRS): Design and Ratings of Affective VR Scenes", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a311/1ap5C3hrD6o", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ta/2023/01/09229513", "title": "Estimating Affective Taste Experience Using Combined Implicit Behavioral and Neurophysiological Measures", "doi": null, "abstractUrl": "/journal/ta/2023/01/09229513/1o3nfbzpzhe", "parentPublication": { "id": "trans/ta", "title": "IEEE Transactions on Affective Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a387", "title": "Virtual reality sickness detection: an approach based on physiological signals and machine learning", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a387/1pysy0d2Nck", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqyUUJ8", "title": "2014 IEEE International Conference On Cluster Computing (CLUSTER)", "acronym": "cluster", "groupId": "1000095", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNqzu6Ro", "doi": "10.1109/CLUSTER.2014.6968779", "title": "Applying OpenMP-based parallel implementations of NSGA-II and SPEA2 to study phylogenetic relationships", "normalizedTitle": "Applying OpenMP-based parallel implementations of NSGA-II and SPEA2 to study phylogenetic relationships", "abstract": "Throughout the years, biological processing demands have been addressed by relying on the design of algorithmic approaches for parallel architectures. By taking advantage of multicore processor systems, we can deal with the main sources of complexity which explain the NP-hard nature of multiple problems in computational biology. In this work, we address the inference of phylogenetic topologies by using two multiobjective metaheuristics: Fast Non-Dominated Sorting Genetic Algorithm and Strength Pareto Evolutionary Algorithm 2. The additional complexity introduced by the multiobjective formulation of the problem motivates that parallel designs of these algorithms must be undertaken. For this purpose, OpenMP-based implementations of these two metaheuristics are applied. To evaluate the performance of these approaches, a comparative study has been conducted by performing experimentation on four nucleotide data sets. Our experiments suggest the relevance of these parallel algorithmic designs, improving the phylogenetic results reported by other multiobjective tools in reduced execution times.", "abstracts": [ { "abstractType": "Regular", "content": "Throughout the years, biological processing demands have been addressed by relying on the design of algorithmic approaches for parallel architectures. By taking advantage of multicore processor systems, we can deal with the main sources of complexity which explain the NP-hard nature of multiple problems in computational biology. In this work, we address the inference of phylogenetic topologies by using two multiobjective metaheuristics: Fast Non-Dominated Sorting Genetic Algorithm and Strength Pareto Evolutionary Algorithm 2. The additional complexity introduced by the multiobjective formulation of the problem motivates that parallel designs of these algorithms must be undertaken. For this purpose, OpenMP-based implementations of these two metaheuristics are applied. To evaluate the performance of these approaches, a comparative study has been conducted by performing experimentation on four nucleotide data sets. Our experiments suggest the relevance of these parallel algorithmic designs, improving the phylogenetic results reported by other multiobjective tools in reduced execution times.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Throughout the years, biological processing demands have been addressed by relying on the design of algorithmic approaches for parallel architectures. By taking advantage of multicore processor systems, we can deal with the main sources of complexity which explain the NP-hard nature of multiple problems in computational biology. In this work, we address the inference of phylogenetic topologies by using two multiobjective metaheuristics: Fast Non-Dominated Sorting Genetic Algorithm and Strength Pareto Evolutionary Algorithm 2. The additional complexity introduced by the multiobjective formulation of the problem motivates that parallel designs of these algorithms must be undertaken. For this purpose, OpenMP-based implementations of these two metaheuristics are applied. To evaluate the performance of these approaches, a comparative study has been conducted by performing experimentation on four nucleotide data sets. Our experiments suggest the relevance of these parallel algorithmic designs, improving the phylogenetic results reported by other multiobjective tools in reduced execution times.", "fno": "06968779", "keywords": [ "Phylogeny", "Sociology", "Statistics", "Topology", "Evolutionary Computation", "Inference Algorithms", "Phylogeny Reconstruction", "Multiobjective Optimization", "Evolutionary Computation", "Parallel Computing" ], "authors": [ { "affiliation": "Dept. of Technologies of Computers and Communications, University of Extremadura, Cáceres, Spain", "fullName": "Sergio Santander-Jimenez", "givenName": "Sergio", "surname": "Santander-Jimenez", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Technologies of Computers and Communications, University of Extremadura, Cáceres, Spain", "fullName": "Miguel A. Vega-Rodriguez", "givenName": "Miguel A.", "surname": "Vega-Rodriguez", "__typename": "ArticleAuthorType" } ], "idPrefix": "cluster", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-09-01T00:00:00", "pubType": "proceedings", "pages": "305-313", "year": "2014", "issn": null, "isbn": "978-1-4799-5548-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06968778", "articleId": "12OmNvpw7lQ", "__typename": "AdjacentArticleType" }, "next": { "fno": "06968780", "articleId": "12OmNzBOhMv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/e-science/2011/2163/0/06123260", "title": "Optimizing Phylogenetic Analysis Using SciHmm Cloud-based Scientific Workflow", "doi": null, "abstractUrl": "/proceedings-article/e-science/2011/06123260/12OmNBVIUyv", "parentPublication": { "id": "proceedings/e-science/2011/2163/0", "title": "2011 IEEE 7th International Conference on E-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccabs/2016/4199/0/07802772", "title": "Fast algorithms for computing phylogenetic divergence time", "doi": null, "abstractUrl": "/proceedings-article/iccabs/2016/07802772/12OmNvBIROH", "parentPublication": { "id": "proceedings/iccabs/2016/4199/0", "title": "2016 IEEE 6th International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2018/02/07423752", "title": "Autumn Algorithm—Computation of Hybridization Networks for Realistic Phylogenetic Trees", "doi": null, "abstractUrl": "/journal/tb/2018/02/07423752/13rRUIM2VAk", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2015/06/06819075", "title": "Parallel Multiobjective Metaheuristics for Inferring Phylogenies on Multicore Clusters", "doi": null, "abstractUrl": "/journal/td/2015/06/06819075/13rRUxASupr", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2012/04/06193091", "title": "Refining Regulatory Networks through Phylogenetic Transfer of Information", "doi": null, "abstractUrl": "/journal/tb/2012/04/06193091/13rRUxNEqOf", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2017/07/07801038", "title": "Asynchronous Non-Generational Model to Parallelize Metaheuristics: A Bioinformatics Case Study", "doi": null, "abstractUrl": "/journal/td/2017/07/07801038/13rRUxlgxT6", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2019/01/08409336", "title": "Comparative Analysis of Intra-Algorithm Parallel Multiobjective Evolutionary Algorithms: Taxonomy Implications on Bioinformatics Scenarios", "doi": null, "abstractUrl": "/journal/td/2019/01/08409336/17D45WrVge9", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse-euc/2017/3220/1/08005779", "title": "A Survey of Multiobjective Evolutionary Algorithms", "doi": null, "abstractUrl": "/proceedings-article/cse-euc/2017/08005779/17D45XoXP77", "parentPublication": { "id": "proceedings/cse-euc/2017/3220/1", "title": "2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020454", "title": "Inferring Phylogenetic Relationships using the Smith-Waterman Algorithm and Hierarchical Clustering", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020454/1KfRP1IraEw", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/01/08868219", "title": "Consensus of All Solutions for Intractable Phylogenetic Tree Inference", "doi": null, "abstractUrl": "/journal/tb/2021/01/08868219/1e7BUc5cU92", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBBhN8U", "title": "2012 45th Hawaii International Conference on System Sciences", "acronym": "hicss", "groupId": "1000730", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNwtn3vt", "doi": "10.1109/HICSS.2012.199", "title": "Designing for Distributed Scientific Collaboration: A Case Study in an Animal Health Laboratory", "normalizedTitle": "Designing for Distributed Scientific Collaboration: A Case Study in an Animal Health Laboratory", "abstract": "We have been exploring the design of an advanced collaboration platform to support scientists in a national animal health laboratory to work collaboratively across a physical containment barrier. This paper describes the design considerations based on the findings from a field study of the collaboration processes in this particular environment. We emphasize the need of providing flexible support for various information sharing practices. The major component of the platform -- a collaboration environment which integrates life-size video conferencing and a large shared digital workspace - has been under routine use. Our preliminary results from a user study of the distributed group meetings supported by the platform have shown the value of high quality audio-video communication in combination with the feature of allowing access and simultaneously sharing multiple data resources.", "abstracts": [ { "abstractType": "Regular", "content": "We have been exploring the design of an advanced collaboration platform to support scientists in a national animal health laboratory to work collaboratively across a physical containment barrier. This paper describes the design considerations based on the findings from a field study of the collaboration processes in this particular environment. We emphasize the need of providing flexible support for various information sharing practices. The major component of the platform -- a collaboration environment which integrates life-size video conferencing and a large shared digital workspace - has been under routine use. Our preliminary results from a user study of the distributed group meetings supported by the platform have shown the value of high quality audio-video communication in combination with the feature of allowing access and simultaneously sharing multiple data resources.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We have been exploring the design of an advanced collaboration platform to support scientists in a national animal health laboratory to work collaboratively across a physical containment barrier. This paper describes the design considerations based on the findings from a field study of the collaboration processes in this particular environment. We emphasize the need of providing flexible support for various information sharing practices. The major component of the platform -- a collaboration environment which integrates life-size video conferencing and a large shared digital workspace - has been under routine use. Our preliminary results from a user study of the distributed group meetings supported by the platform have shown the value of high quality audio-video communication in combination with the feature of allowing access and simultaneously sharing multiple data resources.", "fno": "4525a373", "keywords": [ "Distributed Teams", "Scientific Collaboration", "Human Work Interaction Design" ], "authors": [ { "affiliation": null, "fullName": "Jane Li", "givenName": "Jane", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Christian Müller-Tomfelde", "givenName": "Christian", "surname": "Müller-Tomfelde", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Toni Robertson", "givenName": "Toni", "surname": "Robertson", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "2012-01-01T00:00:00", "pubType": "proceedings", "pages": "373-381", "year": "2012", "issn": null, "isbn": "978-0-7695-4525-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4525a363", "articleId": "12OmNANTAtA", "__typename": "AdjacentArticleType" }, "next": { "fno": "4525a382", "articleId": "12OmNzdGnwK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mvhi/2010/4009/0/4009a692", "title": "A Study of Web-Based Scientific Research Collaboration System", "doi": null, "abstractUrl": "/proceedings-article/mvhi/2010/4009a692/12OmNAtK4h7", "parentPublication": { "id": "proceedings/mvhi/2010/4009/0", "title": "Machine Vision and Human-machine Interface, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/colcom/2006/0428/0/04207560", "title": "Relevance-Based Context Sharing Through Interaction Patterns", "doi": null, "abstractUrl": "/proceedings-article/colcom/2006/04207560/12OmNCmGNXi", "parentPublication": { "id": "proceedings/colcom/2006/0428/0", "title": "International Conference on Collaborative Computing: Networking, Applications and Worksharing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cts/2016/2300/0/07871042", "title": "Collaboration in Computer Vision Using Scientific Workflows", "doi": null, "abstractUrl": "/proceedings-article/cts/2016/07871042/12OmNrIJqsx", "parentPublication": { "id": "proceedings/cts/2016/2300/0", "title": "2016 International Conference on Collaboration Technologies and Systems (CTS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2010/4128/0/4128a575", "title": "Confucius: A Scientific Collaboration System Using Collaborative Scientific Workflows", "doi": null, "abstractUrl": "/proceedings-article/icws/2010/4128a575/12OmNvA1hmO", "parentPublication": { "id": "proceedings/icws/2010/4128/0", "title": "2010 IEEE International Conference on Web Services", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2016/0662/0/0662a437", "title": "A SaaS Framework for Transdisciplinary Collaboration", "doi": null, "abstractUrl": "/proceedings-article/icsc/2016/0662a437/12OmNvjgWrs", "parentPublication": { "id": "proceedings/icsc/2016/0662/0", "title": "2016 IEEE Tenth International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2008/3167/0/3167a809", "title": "Supporting Members of a Learning Community Using Interaction Analysis Tools: The Example of the Kaleidoscope NoE Scientific Network", "doi": null, "abstractUrl": "/proceedings-article/icalt/2008/3167a809/12OmNx5pj3A", "parentPublication": { "id": "proceedings/icalt/2008/3167/0", "title": "IEEE International Conference on Advanced Learning Technologies (ICALT 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscst/2005/2387/0/01553336", "title": "The essential ingredients of collaboration", "doi": null, "abstractUrl": "/proceedings-article/iscst/2005/01553336/12OmNxZ2GkG", "parentPublication": { "id": "proceedings/iscst/2005/2387/0", "title": "2005 International Symposium on Collaborative Technologies and Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2006/2734/0/04031112", "title": "Designing a Multipurpose Virtual Laboratory to Support Communities of Practice in Physics", "doi": null, "abstractUrl": "/proceedings-article/e-science/2006/04031112/12OmNyYDDzC", "parentPublication": { "id": "proceedings/e-science/2006/2734/0", "title": "2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2011/06/mex2011060072", "title": "Next-Generation Team-Science Platform for Scientific Collaboration", "doi": null, "abstractUrl": "/magazine/ex/2011/06/mex2011060072/13rRUx0xPNf", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798024", "title": "Head Pointer or Eye Gaze: Which Helps More in MR Remote Collaboration?", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798024/1cJ0MmguvG8", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvNZWW", "title": "2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)", "acronym": "smartcity", "groupId": "1812824", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyaGeKY", "doi": "10.1109/SmartCity.2015.164", "title": "SoTree: An Automated Phylogeny Assembly Tool for Ecologists from Big Tree", "normalizedTitle": "SoTree: An Automated Phylogeny Assembly Tool for Ecologists from Big Tree", "abstract": "Entire areas of study, such as community phylogenetics and comparative analysis, require detailed phylogenetic, as well as ecological information. China has 31,362 species of vascular plants belonging to 3,328 genera and 312 families, which is ranked in the top six megadiverse countries of the world. along with the big tree of vascular plants in China has been completed recently, SoTree, an automated phylogeny assembly tool is being implemented for ecologists. This paper presents SoTree to the big tree of vascular plants in China for ecologists to generate a phylogeny by search species from an excellent genus-level reference phylogeny on the basis of taxonomy. Meanwhile, the algorithm and solution of SoTree is also described which is based on several steps including parsing, reconstructing and storing of the Basic big phylogenetic tree, standardization of species sub-list, retrieving each node element in the chain, construction of group relation of node elements, calculation weight of each element, assembly of output phylogenetic tree and visualization of this phylogenetic tree in a web interactive environment. SoTree is an online phylogenetic query tool where users submit a list of taxa (e.g. from an ecological community), with genus and species names, get a phylogenetic hypothesis for the relationships among taxa and then can do visualization for trees (phylogenetic tree, time tree or both). Several input ways can be used and several output formats for tree can be selected, while any name will be marked at the accepted name or synonym according to Flora of China (FOC). Therfore, Ecologists can get accurate tree data and save a lot of time and effort. Currently, the source databases cover vascular plants. SoTree is prepared at the URL: http://www.darwintree.cn/flora/index.shtml.", "abstracts": [ { "abstractType": "Regular", "content": "Entire areas of study, such as community phylogenetics and comparative analysis, require detailed phylogenetic, as well as ecological information. China has 31,362 species of vascular plants belonging to 3,328 genera and 312 families, which is ranked in the top six megadiverse countries of the world. along with the big tree of vascular plants in China has been completed recently, SoTree, an automated phylogeny assembly tool is being implemented for ecologists. This paper presents SoTree to the big tree of vascular plants in China for ecologists to generate a phylogeny by search species from an excellent genus-level reference phylogeny on the basis of taxonomy. Meanwhile, the algorithm and solution of SoTree is also described which is based on several steps including parsing, reconstructing and storing of the Basic big phylogenetic tree, standardization of species sub-list, retrieving each node element in the chain, construction of group relation of node elements, calculation weight of each element, assembly of output phylogenetic tree and visualization of this phylogenetic tree in a web interactive environment. SoTree is an online phylogenetic query tool where users submit a list of taxa (e.g. from an ecological community), with genus and species names, get a phylogenetic hypothesis for the relationships among taxa and then can do visualization for trees (phylogenetic tree, time tree or both). Several input ways can be used and several output formats for tree can be selected, while any name will be marked at the accepted name or synonym according to Flora of China (FOC). Therfore, Ecologists can get accurate tree data and save a lot of time and effort. Currently, the source databases cover vascular plants. SoTree is prepared at the URL: http://www.darwintree.cn/flora/index.shtml.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Entire areas of study, such as community phylogenetics and comparative analysis, require detailed phylogenetic, as well as ecological information. China has 31,362 species of vascular plants belonging to 3,328 genera and 312 families, which is ranked in the top six megadiverse countries of the world. along with the big tree of vascular plants in China has been completed recently, SoTree, an automated phylogeny assembly tool is being implemented for ecologists. This paper presents SoTree to the big tree of vascular plants in China for ecologists to generate a phylogeny by search species from an excellent genus-level reference phylogeny on the basis of taxonomy. Meanwhile, the algorithm and solution of SoTree is also described which is based on several steps including parsing, reconstructing and storing of the Basic big phylogenetic tree, standardization of species sub-list, retrieving each node element in the chain, construction of group relation of node elements, calculation weight of each element, assembly of output phylogenetic tree and visualization of this phylogenetic tree in a web interactive environment. SoTree is an online phylogenetic query tool where users submit a list of taxa (e.g. from an ecological community), with genus and species names, get a phylogenetic hypothesis for the relationships among taxa and then can do visualization for trees (phylogenetic tree, time tree or both). Several input ways can be used and several output formats for tree can be selected, while any name will be marked at the accepted name or synonym according to Flora of China (FOC). Therfore, Ecologists can get accurate tree data and save a lot of time and effort. Currently, the source databases cover vascular plants. SoTree is prepared at the URL: http://www.darwintree.cn/flora/index.shtml.", "fno": "1893a792", "keywords": [ "Phylogeny", "Vegetation", "Standardization", "Databases", "Proteins", "Surfaces", "Taxonomy", "Mong DB", "So Tree", "Phylogenetics", "Ecologists", "Comparative Analysis", "Phylogeny Construction" ], "authors": [ { "affiliation": null, "fullName": "Zhen Meng", "givenName": "Zhen", "surname": "Meng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianhui Li", "givenName": "Jianhui", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tuo Yang", "givenName": "Tuo", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Li Lin", "givenName": "Li", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhiduan Chen", "givenName": "Zhiduan", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "smartcity", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "792-797", "year": "2015", "issn": null, "isbn": "978-1-5090-1893-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "1893a786", "articleId": "12OmNy5hRbh", "__typename": "AdjacentArticleType" }, "next": { "fno": "1893a798", "articleId": "12OmNASray3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icica/2014/3966/0/3966a006", "title": "Phylogeny Visualization Using Ontology Approach", "doi": null, "abstractUrl": "/proceedings-article/icica/2014/3966a006/12OmNB9bveM", "parentPublication": { "id": "proceedings/icica/2014/3966/0", "title": "2014 International Conference on Intelligent Computing Applications (ICICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2010/8306/0/05706545", "title": "MiRNAs as promising phylogenetic markers for inferring deep metazoan phylogeny and in support of Olfactores hypothesis", "doi": null, "abstractUrl": "/proceedings-article/bibm/2010/05706545/12OmNwBT1oQ", "parentPublication": { "id": "proceedings/bibm/2010/8306/0", "title": "2010 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/superc/1995/816/0/01383161", "title": "Parallelizing the Phylogeny Problem", "doi": null, "abstractUrl": "/proceedings-article/superc/1995/01383161/12OmNym2c8C", "parentPublication": { "id": "proceedings/superc/1995/816/0", "title": "IEEE/ACM SC95 Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2017/1324/0/132401a260", "title": "Whole Genome Phylogenetic Tree Reconstruction Using Colored de Bruijn Graphs", "doi": null, "abstractUrl": "/proceedings-article/bibe/2017/132401a260/12OmNyq0zMR", "parentPublication": { "id": "proceedings/bibe/2017/1324/0", "title": "2017 IEEE 17th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2013/03/ttb2013030576", "title": "Accuracy Guarantees for Phylogeny Reconstruction Algorithms Based on Balanced Minimum Evolution", "doi": null, "abstractUrl": "/journal/tb/2013/03/ttb2013030576/13rRUEgarzV", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2014/02/06755453", "title": "Distance-Based Phylogenetic Methods Around a Polytomy", "doi": null, "abstractUrl": "/journal/tb/2014/02/06755453/13rRUx0xQ6C", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2015/02/06917051", "title": "Data Requirement for Phylogenetic Inference from Multiple Loci: A New Distance Method", "doi": null, "abstractUrl": "/journal/tb/2015/02/06917051/13rRUy2YLWO", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669509", "title": "TopoPhy-CNN: Integrating Topological Information of Phylogenetic Tree for Host Phenotype Prediction From Metagenomic Data", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669509/1A9Wt8O9we4", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sc/1995/2568/0/01383161", "title": "Parallelizing the Phylogeny Problem", "doi": null, "abstractUrl": "/proceedings-article/sc/1995/01383161/1D884x3hm0w", "parentPublication": { "id": "proceedings/sc/1995/2568/0", "title": "SC Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tb/2021/01/09093990", "title": "Using Constrained-<sc>INC</sc> for Large-Scale Gene Tree and Species Tree Estimation", "doi": null, "abstractUrl": "/journal/tb/2021/01/09093990/1jP8tj9B2Uw", "parentPublication": { "id": "trans/tb", "title": "IEEE/ACM Transactions on Computational Biology and Bioinformatics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKipK", "title": "2017 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vlhcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "17D45Xq6dA0", "doi": "10.1109/VLHCC.2017.8103461", "title": "Gender HCl and microsoft: Highlights from a longitudinal study", "normalizedTitle": "Gender HCl and microsoft: Highlights from a longitudinal study", "abstract": "Research has emerged over the past decade showing gender biases in software. Although a few methods and prototype systems have emerged to help address this issue, none have been reported to have an impact on the people who actually build software. In this paper, we summarize a few highlights from a year-long field study investigating how Gender HCI methods to address gender biases in software can make impacts on a large software company.", "abstracts": [ { "abstractType": "Regular", "content": "Research has emerged over the past decade showing gender biases in software. Although a few methods and prototype systems have emerged to help address this issue, none have been reported to have an impact on the people who actually build software. In this paper, we summarize a few highlights from a year-long field study investigating how Gender HCI methods to address gender biases in software can make impacts on a large software company.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Research has emerged over the past decade showing gender biases in software. Although a few methods and prototype systems have emerged to help address this issue, none have been reported to have an impact on the people who actually build software. In this paper, we summarize a few highlights from a year-long field study investigating how Gender HCI methods to address gender biases in software can make impacts on a large software company.", "fno": "08103461", "keywords": [ "Software", "Human Computer Interaction", "Companies", "Problem Solving", "Visualization", "Collaboration", "Lead", "Gender Mag", "Developing Gender Inclusive Software" ], "authors": [ { "affiliation": "Oregon State University, Corvallis, Oregon, USA", "fullName": "Margaret Burnett", "givenName": "Margaret", "surname": "Burnett", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft, Redmond, Washington, USA", "fullName": "Robin Counts", "givenName": "Robin", "surname": "Counts", "__typename": "ArticleAuthorType" }, { "affiliation": "Microsoft, Redmond, Washington, USA", "fullName": "Ronette Lawrence", "givenName": "Ronette", "surname": "Lawrence", "__typename": "ArticleAuthorType" }, { "affiliation": "Hitachi Consulting, Seattle, Washington, USA", "fullName": "Hannah Hanson", "givenName": "Hannah", "surname": "Hanson", "__typename": "ArticleAuthorType" } ], "idPrefix": "vlhcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "139-143", "year": "2017", "issn": "1943-6106", "isbn": "978-1-5386-0443-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08103460", "articleId": "17D45X0yjSy", "__typename": "AdjacentArticleType" }, "next": { "fno": "08103462", "articleId": "17D45WwsQ8G", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sedc/1994/5870/0/00475356", "title": "Gender and other social issues", "doi": null, "abstractUrl": "/proceedings-article/sedc/1994/00475356/12OmNxEBzdn", "parentPublication": { "id": "proceedings/sedc/1994/5870/0", "title": "Proceedings Software Education Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ge/2018/5738/0/573801a021", "title": "Gender in Open Source Software: What the Tools Tell", "doi": null, "abstractUrl": "/proceedings-article/ge/2018/573801a021/13l5NXTR1sx", "parentPublication": { "id": "proceedings/ge/2018/5738/0", "title": "2018 IEEE/ACM 1st International Workshop on Gender Equality in Software Engineering (GE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2006/11/ry097", "title": "Gender HCI: What About the Software?", "doi": null, "abstractUrl": "/magazine/co/2006/11/ry097/13rRUzpzeIw", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vlhcc/2018/4235/0/08506505", "title": "The GenderMag Recorder's Assistant", "doi": null, "abstractUrl": "/proceedings-article/vlhcc/2018/08506505/17D45WLdYR0", "parentPublication": { "id": "proceedings/vlhcc/2018/4235/0", "title": "2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2021/0969/0/09686825", "title": "A comparative study on the importance of each face part in facial gender recognition via convolutional neural networks", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2021/09686825/1AsbbFFQkHS", "parentPublication": { "id": "proceedings/aiccsa/2021/0969/0", "title": "2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seis/2022/9594/0/959400a001", "title": "A New Approach Towards Ensuring Gender Inclusive SE Job Advertisements", "doi": null, "abstractUrl": "/proceedings-article/icse-seis/2022/959400a001/1EmrgmV2yGc", "parentPublication": { "id": "proceedings/icse-seis/2022/9594/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-seis/2019/1762/0/176200a001", "title": "Implicit Gender Biases in Professional Software Development: An Empirical Study", "doi": null, "abstractUrl": "/proceedings-article/icse-seis/2019/176200a001/1cJ1whnIIRa", "parentPublication": { "id": "proceedings/icse-seis/2019/1762/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/re/2019/3912/0/391200a165", "title": "Analysing Gender Differences in Building Social Goal Models: A Quasi-Experiment", "doi": null, "abstractUrl": "/proceedings-article/re/2019/391200a165/1fHlutyzG3S", "parentPublication": { "id": "proceedings/re/2019/3912/0", "title": "2019 IEEE 27th International Requirements Engineering Conference (RE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2022/01/09055190", "title": "How Gender-Biased Tools Shape Newcomer Experiences in OSS Projects", "doi": null, "abstractUrl": "/journal/ts/2022/01/09055190/1iHrqcrSwco", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichci/2020/2316/0/231600a134", "title": "Gender recognition based on face image", "doi": null, "abstractUrl": "/proceedings-article/ichci/2020/231600a134/1tuAb8zJvsQ", "parentPublication": { "id": "proceedings/ichci/2020/2316/0", "title": "2020 International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvAiSpZ", "title": "2015 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNyvY9ys", "doi": "10.1109/VR.2015.7223402", "title": "Collaborative telepresence workspaces for space operation and science", "normalizedTitle": "Collaborative telepresence workspaces for space operation and science", "abstract": "We introduce the collaborative telepresence workspaces for SPACE operation and science that are under development in the European research project CROSS DRIVE. The vision is to give space mission controllers and scientists the impression of “beaming” to the surface of Mars, along with simulations of the environment and equipment, to step out together where a robot has or may move. We briefly overview the design and describe the state of the demonstrator. The contribution of the publication is to give an example of how collaborative Virtual Reality research is being taken up in space science.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce the collaborative telepresence workspaces for SPACE operation and science that are under development in the European research project CROSS DRIVE. The vision is to give space mission controllers and scientists the impression of “beaming” to the surface of Mars, along with simulations of the environment and equipment, to step out together where a robot has or may move. We briefly overview the design and describe the state of the demonstrator. The contribution of the publication is to give an example of how collaborative Virtual Reality research is being taken up in space science.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce the collaborative telepresence workspaces for SPACE operation and science that are under development in the European research project CROSS DRIVE. The vision is to give space mission controllers and scientists the impression of “beaming” to the surface of Mars, along with simulations of the environment and equipment, to step out together where a robot has or may move. We briefly overview the design and describe the state of the demonstrator. The contribution of the publication is to give an example of how collaborative Virtual Reality research is being taken up in space science.", "fno": "07223402", "keywords": [ "Mars", "Collaboration", "Avatars", "Three Dimensional Displays", "Data Visualization", "Aerospace Electronics", "Video Based Reconstruction", "Virtual Environments", "Virtual Reality", "Terrain Visualization", "Space Missions", "Collaborative Immersive Virtual Environments", "Telepresence", "Avatar" ], "authors": [ { "affiliation": "University of Salford. Salford, M5 4WT, UK", "fullName": "David J. Roberts", "givenName": "David J.", "surname": "Roberts", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Salford. Salford, M5 4WT, UK", "fullName": "Arturo S. Garcia", "givenName": "Arturo S.", "surname": "Garcia", "__typename": "ArticleAuthorType" }, { "affiliation": "German Aerospace Center (DLR), Lilienthalplatz 7, 38108 Braunschweig, Germany", "fullName": "Janki Dodiya", "givenName": "Janki", "surname": "Dodiya", "__typename": "ArticleAuthorType" }, { "affiliation": "German Aerospace Center (DLR), Lilienthalplatz 7, 38108 Braunschweig, Germany", "fullName": "Robin Wolff", "givenName": "Robin", "surname": "Wolff", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Salford. Salford, M5 4WT, UK", "fullName": "Allen J. Fairchild", "givenName": "Allen J.", "surname": "Fairchild", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Salford. Salford, M5 4WT, UK", "fullName": "Terrence Fernando", "givenName": "Terrence", "surname": "Fernando", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-03-01T00:00:00", "pubType": "proceedings", "pages": "275-276", "year": "2015", "issn": null, "isbn": "978-1-4799-1727-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07223401", "articleId": "12OmNrkBwoD", "__typename": "AdjacentArticleType" }, "next": { "fno": "07223403", "articleId": "12OmNrkjVjX", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic3/2015/7947/0/07346714", "title": "Collaborative teaching in large classes of computer science courses", "doi": null, "abstractUrl": "/proceedings-article/ic3/2015/07346714/12OmNrAv3CX", "parentPublication": { "id": "proceedings/ic3/2015/7947/0", "title": "2015 Eighth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/coginf/2010/8042/0/05599837", "title": "3D Symbiotic space for agent-aided collaborative work", "doi": null, "abstractUrl": "/proceedings-article/coginf/2010/05599837/12OmNrJ11wQ", "parentPublication": { "id": "proceedings/coginf/2010/8042/0", "title": "2010 9th IEEE International Conference on Cognitive Informatics (ICCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2017/5812/0/08056613", "title": "An immersive virtual environment for collaborative geovisualization", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2017/08056613/12OmNvCi45l", "parentPublication": { "id": "proceedings/vs-games/2017/5812/0", "title": "2017 9th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccgrid/2011/4395/0/4395a554", "title": "Open Social Based Collaborative Science Gateways", "doi": null, "abstractUrl": "/proceedings-article/ccgrid/2011/4395a554/12OmNwJPMUU", "parentPublication": { "id": "proceedings/ccgrid/2011/4395/0", "title": "Cluster Computing and the Grid, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2005/2392/0/23920155", "title": "Attributed Graph Visualization of Collaborative Workspaces", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2005/23920155/12OmNwtn3Cu", "parentPublication": { "id": "proceedings/cgiv/2005/2392/0", "title": "International Conference on Computer Graphics, Imaging and Visualization (CGIV'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2013/2240/0/06785842", "title": "Structural and collaborative properties of team science networks", "doi": null, "abstractUrl": "/proceedings-article/asonam/2013/06785842/12OmNylsZUf", "parentPublication": { "id": "proceedings/asonam/2013/2240/0", "title": "2013 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2012/06/mcg2012060010", "title": "Beaming: An Asymmetric Telepresence System", "doi": null, "abstractUrl": "/magazine/cg/2012/06/mcg2012060010/13rRUygT7Ap", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/11/09873991", "title": "Predict-and-Drive: Avatar Motion Adaption in Room-Scale Augmented Reality Telepresence with Heterogeneous Spaces", "doi": null, "abstractUrl": "/journal/tg/2022/11/09873991/1GjwGcGrRmg", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fie/2022/6244/0/09962487", "title": "ZORQ: A Gamification Framework for Computer Science Education", "doi": null, "abstractUrl": "/proceedings-article/fie/2022/09962487/1IHnVU8uwda", "parentPublication": { "id": "proceedings/fie/2022/6244/0", "title": "2022 IEEE Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a615", "title": "A Shared Interactive Space in Mixed Reality for Collaborative Digital Tower Operations", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a615/1J7W9HboPmg", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwLOYSt", "title": "2008 IEEE International Conference on Software Maintenance", "acronym": "fosm", "groupId": "1002482", "volume": "0", "displayVolume": "0", "year": "2008", "__typename": "ProceedingType" }, "article": { "id": "12OmNzX6cqO", "doi": "10.1109/FOSM.2008.4659257", "title": "Remixing visualization to support collaboration in software maintenance", "normalizedTitle": "Remixing visualization to support collaboration in software maintenance", "abstract": "We propose that collaborative software visualization can improve team software maintenance. We first review how visualization can support software maintenance from the perspectives of system understanding, process understanding and software evolution. From this, we conclude that visualization tools are rarely designed to provide explicit support for collaborative authoring and sharing of views. We then provide an overview of research from a computer supported cooperative work perspective, and propose that this research should be applied to software visualization. We explore the opportunities and challenges this research focus presents and conclude that more attention paid to the social aspects of software visualization should improve both individual and team processes in software maintenance.", "abstracts": [ { "abstractType": "Regular", "content": "We propose that collaborative software visualization can improve team software maintenance. We first review how visualization can support software maintenance from the perspectives of system understanding, process understanding and software evolution. From this, we conclude that visualization tools are rarely designed to provide explicit support for collaborative authoring and sharing of views. We then provide an overview of research from a computer supported cooperative work perspective, and propose that this research should be applied to software visualization. We explore the opportunities and challenges this research focus presents and conclude that more attention paid to the social aspects of software visualization should improve both individual and team processes in software maintenance.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose that collaborative software visualization can improve team software maintenance. We first review how visualization can support software maintenance from the perspectives of system understanding, process understanding and software evolution. From this, we conclude that visualization tools are rarely designed to provide explicit support for collaborative authoring and sharing of views. We then provide an overview of research from a computer supported cooperative work perspective, and propose that this research should be applied to software visualization. We explore the opportunities and challenges this research focus presents and conclude that more attention paid to the social aspects of software visualization should improve both individual and team processes in software maintenance.", "fno": "04659257", "keywords": [ "Authoring Systems", "Data Visualisation", "Groupware", "Software Maintenance", "Remixing Visualization", "Support Collaboration", "Collaborative Software Visualization", "Team Software Maintenance", "Software Evolution", "Collaborative Authoring", "Computer Supported Cooperative Work", "Visualization", "Collaboration", "Software Maintenance", "Software", "Evolution Biology", "Collaborative Work", "Maintenance Engineering" ], "authors": [ { "affiliation": "Department of Computer Science, University of Victoria, Canada", "fullName": "Margaret-Anne Storey", "givenName": "Margaret-Anne", "surname": "Storey", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Victoria, Canada", "fullName": "Chris Bennett", "givenName": "Chris", "surname": "Bennett", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Victoria, Canada", "fullName": "R. Ian Bull", "givenName": "R. Ian", "surname": "Bull", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, University of Victoria, Canada", "fullName": "Daniel M. German", "givenName": "Daniel M.", "surname": "German", "__typename": "ArticleAuthorType" } ], "idPrefix": "fosm", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2008-09-01T00:00:00", "pubType": "proceedings", "pages": "", "year": "2008", "issn": null, "isbn": "978-1-4244-2654-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04659256", "articleId": "12OmNxveNKj", "__typename": "AdjacentArticleType" }, "next": { "fno": "04659258", "articleId": "12OmNxxdZMB", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/quatic/2010/4241/0/4241a352", "title": "Studying Supply and Demand of Software Maintenance and Evolution Services", "doi": null, "abstractUrl": "/proceedings-article/quatic/2010/4241a352/12OmNAnMuIo", "parentPublication": { "id": "proceedings/quatic/2010/4241/0", "title": "2010 Seventh International Conference on the Quality of Information and Communications Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/quatic/2010/4241/0/4241a325", "title": "Visualization of Multithreaded Behavior to Facilitate Maintenance of Complex Software Systems", "doi": null, "abstractUrl": "/proceedings-article/quatic/2010/4241a325/12OmNAu1Flh", "parentPublication": { "id": "proceedings/quatic/2010/4241/0", "title": "2010 Seventh International Conference on the Quality of Information and Communications Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ecbs/1996/7355/0/73550134", "title": "Software Maintenance versus Software Evolution: An Approach to Software Systems Evolution", "doi": null, "abstractUrl": "/proceedings-article/ecbs/1996/73550134/12OmNBEGYLr", "parentPublication": { "id": "proceedings/ecbs/1996/7355/0", "title": "Engineering of Computer-Based Systems, IEEE International Conference on the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csmr-wcre/2014/3752/0/06747159", "title": "Using biology and ecology as inspiration for software maintenance? (Keynote abstract)", "doi": null, "abstractUrl": "/proceedings-article/csmr-wcre/2014/06747159/12OmNrkT7Fh", "parentPublication": { "id": "proceedings/csmr-wcre/2014/3752/0", "title": "2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsm/2008/2613/0/04658091", "title": "1st workshop on maintenance and evolution of FLOSS (MEFLOSS)", "doi": null, "abstractUrl": "/proceedings-article/icsm/2008/04658091/12OmNwwuDXC", "parentPublication": { "id": "proceedings/icsm/2008/2613/0", "title": "2008 IEEE International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fosm/2008/2654/0/04659256", "title": "The past, present, and future of software evolution", "doi": null, "abstractUrl": "/proceedings-article/fosm/2008/04659256/12OmNxveNKj", "parentPublication": { "id": "proceedings/fosm/2008/2654/0", "title": "2008 IEEE International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fosm/2008/2654/0/04659258", "title": "Systems of Systems: New challenges for maintenance and evolution", "doi": null, "abstractUrl": "/proceedings-article/fosm/2008/04659258/12OmNxxdZMB", "parentPublication": { "id": "proceedings/fosm/2008/2654/0", "title": "2008 IEEE International Conference on Software Maintenance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icime/2009/3595/0/3595a047", "title": "Empirical Analysis of Team and Application Size on Software Maintenance and Support Activities", "doi": null, "abstractUrl": "/proceedings-article/icime/2009/3595a047/12OmNzXnNr2", "parentPublication": { "id": "proceedings/icime/2009/3595/0", "title": "Information Management and Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/1987/03/01702217", "title": "Understanding Software Maintenance Work", "doi": null, "abstractUrl": "/journal/ts/1987/03/01702217/13rRUEgarul", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2023/04/09953033", "title": "How Much Does Software Complexity Matter for Maintenance Productivity? The Link Between Team Instability and Diversity", "doi": null, "abstractUrl": "/journal/ts/2023/04/09953033/1Ik4KkexTOM", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kaMxDONP0Y", "title": "2020 IEEE 36th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kaMxWASNry", "doi": "10.1109/ICDE48307.2020.00105", "title": "Turbocharging Geospatial Visualization Dashboards via a Materialized Sampling Cube Approach", "normalizedTitle": "Turbocharging Geospatial Visualization Dashboards via a Materialized Sampling Cube Approach", "abstract": "In this paper, we present a middleware framework that runs on top of a SQL data system with the purpose of increasing the interactivity of geospatial visualization dashboards. The proposed system adopts a sampling cube approach that stores pre-materialized spatial samples and allows users to define their own accuracy loss function such that the produced samples can be used for various user-defined visualization tasks. The system ensures that the difference between the sample fed into the visualization dashboard and the raw query answer never exceeds the user-specified loss threshold. To reduce the number of cells in the sampling cube and hence mitigate the initialization time and memory utilization, the system employs two main strategies: (1) a partially materialized cube to only materialize local samples of those queries for which the global sample (the sample drawn from the entire dataset) exceeds the required accuracy loss threshold. (2) a sample selection technique that finds similarities between different local samples and only persists a few representative samples. Based on the extensive experimental evaluation, Tabula can bring down the total data-to-visualization time (including both data-system and visualization times) of a heat map generated over 700 million taxi rides to 600 milliseconds with 250 meters user-defined accuracy loss. Besides, Tabula costs up to two orders of magnitude less memory footprint (e.g., only 800 MB for the running example) and one order of magnitude less initialization time than the fully materialized sampling cube.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a middleware framework that runs on top of a SQL data system with the purpose of increasing the interactivity of geospatial visualization dashboards. The proposed system adopts a sampling cube approach that stores pre-materialized spatial samples and allows users to define their own accuracy loss function such that the produced samples can be used for various user-defined visualization tasks. The system ensures that the difference between the sample fed into the visualization dashboard and the raw query answer never exceeds the user-specified loss threshold. To reduce the number of cells in the sampling cube and hence mitigate the initialization time and memory utilization, the system employs two main strategies: (1) a partially materialized cube to only materialize local samples of those queries for which the global sample (the sample drawn from the entire dataset) exceeds the required accuracy loss threshold. (2) a sample selection technique that finds similarities between different local samples and only persists a few representative samples. Based on the extensive experimental evaluation, Tabula can bring down the total data-to-visualization time (including both data-system and visualization times) of a heat map generated over 700 million taxi rides to 600 milliseconds with 250 meters user-defined accuracy loss. Besides, Tabula costs up to two orders of magnitude less memory footprint (e.g., only 800 MB for the running example) and one order of magnitude less initialization time than the fully materialized sampling cube.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a middleware framework that runs on top of a SQL data system with the purpose of increasing the interactivity of geospatial visualization dashboards. The proposed system adopts a sampling cube approach that stores pre-materialized spatial samples and allows users to define their own accuracy loss function such that the produced samples can be used for various user-defined visualization tasks. The system ensures that the difference between the sample fed into the visualization dashboard and the raw query answer never exceeds the user-specified loss threshold. To reduce the number of cells in the sampling cube and hence mitigate the initialization time and memory utilization, the system employs two main strategies: (1) a partially materialized cube to only materialize local samples of those queries for which the global sample (the sample drawn from the entire dataset) exceeds the required accuracy loss threshold. (2) a sample selection technique that finds similarities between different local samples and only persists a few representative samples. Based on the extensive experimental evaluation, Tabula can bring down the total data-to-visualization time (including both data-system and visualization times) of a heat map generated over 700 million taxi rides to 600 milliseconds with 250 meters user-defined accuracy loss. Besides, Tabula costs up to two orders of magnitude less memory footprint (e.g., only 800 MB for the running example) and one order of magnitude less initialization time than the fully materialized sampling cube.", "fno": "09101642", "keywords": [ "Data Analysis", "Data Visualisation", "Geographic Information Systems", "Middleware", "Query Processing", "Sampling Methods", "SQL", "Geospatial Visualization Dashboards", "Materialized Sampling Cube Approach", "Middleware Framework", "SQL Data System", "Accuracy Loss Function", "User Defined Visualization Tasks", "Query Answer", "Loss Threshold", "Sample Selection Technique", "Data Visualization", "Data Systems", "Public Transportation", "Heating Systems", "Loss Measurement", "Geospatial Analysis", "Task Analysis" ], "authors": [ { "affiliation": "Arizona State University,Tempe,AZ", "fullName": "Jia Yu", "givenName": "Jia", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Arizona State University,Tempe,AZ", "fullName": "Mohamed Sarwat", "givenName": "Mohamed", "surname": "Sarwat", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-04-01T00:00:00", "pubType": "proceedings", "pages": "1165-1176", "year": "2020", "issn": null, "isbn": "978-1-7281-2903-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09101896", "articleId": "1kaMHYhfE2c", "__typename": "AdjacentArticleType" }, "next": { "fno": "09101860", "articleId": "1kaMHm1nt96", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/skg/2005/2534/0/04125806", "title": "Effective Maintenance of Materialized Views in Peer Data Management Systems", "doi": null, "abstractUrl": "/proceedings-article/skg/2005/04125806/12OmNAMbZI4", "parentPublication": { "id": "proceedings/skg/2005/2534/0", "title": "Semantics, Knowledge and Grid, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/1992/2545/0/00213145", "title": "Maintenance of materialized views of sampling queries", "doi": null, "abstractUrl": "/proceedings-article/icde/1992/00213145/12OmNwKoZgi", "parentPublication": { "id": "proceedings/icde/1992/2545/0", "title": "1992 Eighth International Conference on Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit/2005/2432/0/24320093", "title": "The mining of fuzzy gradient in the case of materialized cube", "doi": null, "abstractUrl": "/proceedings-article/cit/2005/24320093/12OmNx2QUNl", "parentPublication": { "id": "proceedings/cit/2005/2432/0", "title": "The Fifth International Conference on Computer and Information Technology CIT 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2014/4274/0/4274b143", "title": "Real-time Dynamic Visualization Techniques for Massive Geospatial Data", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2014/4274b143/12OmNx6g6fk", "parentPublication": { "id": "proceedings/icdmw/2014/4274/0", "title": "2014 IEEE International Conference on Data Mining Workshop (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2014/5666/0/07004495", "title": "An open source framework to add spatial extent and geospatial visibility to Big Data", "doi": null, "abstractUrl": "/proceedings-article/big-data/2014/07004495/12OmNxXUhQX", "parentPublication": { "id": "proceedings/big-data/2014/5666/0", "title": "2014 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2008/03/ttk2008030337", "title": "Materialized Sample Views for Database Approximation", "doi": null, "abstractUrl": "/journal/tk/2008/03/ttk2008030337/13rRUxYrbUZ", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2018/6420/0/642000b420", "title": "Cube Padding for Weakly-Supervised Saliency Prediction in 360° Videos", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2018/642000b420/17D45WB0qcO", "parentPublication": { "id": "proceedings/cvpr/2018/6420/0", "title": "2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/09936693", "title": "Contrastive Learning for Robust Android Malware Familial Classification", "doi": null, "abstractUrl": "/journal/tq/5555/01/09936693/1I05Dr814iY", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2019/7474/0/747400b992", "title": "GeoSparkViz in Action: A Data System with Built-in Support for Geospatial Visualization", "doi": null, "abstractUrl": "/proceedings-article/icde/2019/747400b992/1aDT1gJkN1e", "parentPublication": { "id": "proceedings/icde/2019/7474/0", "title": "2019 IEEE 35th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400c361", "title": "VTGeo: A Visualization Tool for Geospatial Data", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400c361/1tzz9WNDCxi", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa5Tm", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "acronym": "ictai", "groupId": "1000763", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNvkpl0k", "doi": "10.1109/ICTAI.2017.00107", "title": "Erasure Detection and Recognition on Children's Manuscript Essays", "normalizedTitle": "Erasure Detection and Recognition on Children's Manuscript Essays", "abstract": "In this paper, we present a machine learning approach to classify erasures in children's manuscript essays. We aim at highlighting challenges faced by children through their learning process, specifically when it comes to their subjective ability of converting thoughts into written text. The image processing software receives an entire scanned essay as input, then it segments each word. Afterwards, a classifier decides whether each word is \"clean\" or if it corresponds to an \"erasure\". We evaluate several Machine Learning (ML) techniques, including Support Vector Machine (SVM), boosted and bagged decision trees, k-nearest neighbor, Naive Bayes, discriminant analysis,logistic regression, and deep neural networks. To this end, manuscript essays containing erasures were scanned, each word(with and without erasure) was segmented, and were separated into two classes, providing knowledge to the system for the identification of new samples. Due to the difference between image dimensions, it was necessary to use features capable of describing the image independently of it corresponding to a letter or a word, or character dimension used by different children during writing. To solve this problem, we identify strokes directions, usually consisting of parallel lines. The obtained results show that the image descriptors when used alone achieve maximum accuracy limits of the order of 90%, but combined with the others, they exceed 98% accuracy. Compared to other used classifiers, SVM with Gaussian kernel produced higher accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we present a machine learning approach to classify erasures in children's manuscript essays. We aim at highlighting challenges faced by children through their learning process, specifically when it comes to their subjective ability of converting thoughts into written text. The image processing software receives an entire scanned essay as input, then it segments each word. Afterwards, a classifier decides whether each word is \"clean\" or if it corresponds to an \"erasure\". We evaluate several Machine Learning (ML) techniques, including Support Vector Machine (SVM), boosted and bagged decision trees, k-nearest neighbor, Naive Bayes, discriminant analysis,logistic regression, and deep neural networks. To this end, manuscript essays containing erasures were scanned, each word(with and without erasure) was segmented, and were separated into two classes, providing knowledge to the system for the identification of new samples. Due to the difference between image dimensions, it was necessary to use features capable of describing the image independently of it corresponding to a letter or a word, or character dimension used by different children during writing. To solve this problem, we identify strokes directions, usually consisting of parallel lines. The obtained results show that the image descriptors when used alone achieve maximum accuracy limits of the order of 90%, but combined with the others, they exceed 98% accuracy. Compared to other used classifiers, SVM with Gaussian kernel produced higher accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we present a machine learning approach to classify erasures in children's manuscript essays. We aim at highlighting challenges faced by children through their learning process, specifically when it comes to their subjective ability of converting thoughts into written text. The image processing software receives an entire scanned essay as input, then it segments each word. Afterwards, a classifier decides whether each word is \"clean\" or if it corresponds to an \"erasure\". We evaluate several Machine Learning (ML) techniques, including Support Vector Machine (SVM), boosted and bagged decision trees, k-nearest neighbor, Naive Bayes, discriminant analysis,logistic regression, and deep neural networks. To this end, manuscript essays containing erasures were scanned, each word(with and without erasure) was segmented, and were separated into two classes, providing knowledge to the system for the identification of new samples. Due to the difference between image dimensions, it was necessary to use features capable of describing the image independently of it corresponding to a letter or a word, or character dimension used by different children during writing. To solve this problem, we identify strokes directions, usually consisting of parallel lines. The obtained results show that the image descriptors when used alone achieve maximum accuracy limits of the order of 90%, but combined with the others, they exceed 98% accuracy. Compared to other used classifiers, SVM with Gaussian kernel produced higher accuracy.", "fno": "387601a670", "keywords": [ "Bayes Methods", "Decision Trees", "Document Image Processing", "Image Classification", "Image Segmentation", "Nearest Neighbour Methods", "Neural Nets", "Object Detection", "Regression Analysis", "Support Vector Machines", "Text Analysis", "Deep Neural Networks", "Discriminant Analysis", "Naive Bayes", "K Nearest Neighbor", "Boosted Decision Trees", "Word Segmentation", "Written Text", "Machine Learning", "Erasure Classification", "Children Manuscript Essays", "Erasure Recognition", "Erasure Detection", "Image Descriptors", "Image Dimensions", "Logistic Regression", "Bagged Decision Trees", "Support Vector Machine", "Classifier", "Image Processing Software", "Learning Process", "Databases", "Support Vector Machines", "Image Edge Detection", "Feature Extraction", "Writing", "Histograms", "Image Segmentation", "Image Processing", "Linguistics", "Erasures", "Classification" ], "authors": [ { "affiliation": null, "fullName": "Marcos Tenório", "givenName": "Marcos", "surname": "Tenório", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Evandro Costa", "givenName": "Evandro", "surname": "Costa", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tiago Vieira", "givenName": "Tiago", "surname": "Vieira", "__typename": "ArticleAuthorType" } ], "idPrefix": "ictai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-11-01T00:00:00", "pubType": "proceedings", "pages": "670-676", "year": "2017", "issn": "2375-0197", "isbn": "978-1-5386-3876-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "387601a663", "articleId": "12OmNz3bdPM", "__typename": "AdjacentArticleType" }, "next": { "fno": "387601a677", "articleId": "12OmNAYoKtA", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icfhr/2014/4335/0/06980990", "title": "An Historical Handwritten Arabic Dataset for Segmentation-Free Word Spotting - HADARA80P", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2014/06980990/12OmNqI04E8", "parentPublication": { "id": "proceedings/icfhr/2014/4335/0", "title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccea/2010/6079/1/05445836", "title": "Contrast Based Enhancement of Palm-Leaf Manuscript Images", "doi": null, "abstractUrl": "/proceedings-article/iccea/2010/05445836/12OmNqJHFs4", "parentPublication": { "id": "proceedings/iccea/2010/6079/1", "title": "2010 Second International Conference on Computer Engineering and Applications (ICCEA 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2014/5209/0/5209c978", "title": "Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture", "doi": null, "abstractUrl": "/proceedings-article/icpr/2014/5209c978/12OmNvSbBmD", "parentPublication": { "id": "proceedings/icpr/2014/5209/0", "title": "2014 22nd International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2005/2420/0/24200528", "title": "Classification Models for Historical Manuscript Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdar/2005/24200528/12OmNxw5BoU", "parentPublication": { "id": "proceedings/icdar/2005/2420/0", "title": "Eighth International Conference on Document Analysis and Recognition (ICDAR'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2017/3586/1/3586a796", "title": "The Handwritten Sundanese Palm Leaf Manuscript Dataset from 15th Century", "doi": null, "abstractUrl": "/proceedings-article/icdar/2017/3586a796/12OmNzaQova", "parentPublication": { "id": "proceedings/icdar/2017/3586/1", "title": "2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2014/4335/0/06981109", "title": "Document Writer Analysis with Rejection for Historical Arabic Manuscripts", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2014/06981109/12OmNzxPTGA", "parentPublication": { "id": "proceedings/icfhr/2014/4335/0", "title": "2014 14th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/si/2017/08/07889015", "title": "Mitigating Stuck Cell Failures in MLC NAND Flash Memory via Inferred Erasure Decoding", "doi": null, "abstractUrl": "/journal/si/2017/08/07889015/13rRUwInvGS", "parentPublication": { "id": "trans/si", "title": "IEEE Transactions on Very Large Scale Integration (VLSI) Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2018/9355/0/935500a235", "title": "Historical Manuscript Dating using Textural Measures", "doi": null, "abstractUrl": "/proceedings-article/fit/2018/935500a235/17D45WLdYRm", "parentPublication": { "id": "proceedings/fit/2018/9355/0", "title": "2018 International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a297", "title": "Training Schemes for the Transliteration of the Balinese Script Into the Latin Script on Palm Leaf Manuscript Images", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a297/17D45XlyDuA", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1997/7761/0/00582088", "title": "Intraframe low bit rate video coding robust to packet erasure", "doi": null, "abstractUrl": "/proceedings-article/dcc/1997/00582088/1dIKJa4Oexq", "parentPublication": { "id": "proceedings/dcc/1997/7761/0", "title": "Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAsTgXa", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "acronym": "icalt", "groupId": "1000009", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNxEByYF", "doi": "10.1109/ICALT.2017.15", "title": "A Digital Tool for Argumentation Construction that Assists Users in Writing Argumentative Essays", "normalizedTitle": "A Digital Tool for Argumentation Construction that Assists Users in Writing Argumentative Essays", "abstract": "This study aims to improve students' argumentative capability and enable them to produce better argumentative essays. The \"digital argument-map writing system\" was designed for this study to help students build a complete structure of argumentation step by step so they can produce better argumentative essays with the structure as a thinking frame. We conducted an experiment to the students in an elementary school in New Taipei City for one semester. The experimental result showed that the system provided by this study could improve the students' argumentative capability. From the result of regression analysis, we found that the students using the digital argument-map writing system had a more thorough thinking on the forming of argumentation. Their evidence accords with their reasons and their reasons accord with their claims. The argumentation in their argumentative essays is thus highly connective and more integrated.", "abstracts": [ { "abstractType": "Regular", "content": "This study aims to improve students' argumentative capability and enable them to produce better argumentative essays. The \"digital argument-map writing system\" was designed for this study to help students build a complete structure of argumentation step by step so they can produce better argumentative essays with the structure as a thinking frame. We conducted an experiment to the students in an elementary school in New Taipei City for one semester. The experimental result showed that the system provided by this study could improve the students' argumentative capability. From the result of regression analysis, we found that the students using the digital argument-map writing system had a more thorough thinking on the forming of argumentation. Their evidence accords with their reasons and their reasons accord with their claims. The argumentation in their argumentative essays is thus highly connective and more integrated.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This study aims to improve students' argumentative capability and enable them to produce better argumentative essays. The \"digital argument-map writing system\" was designed for this study to help students build a complete structure of argumentation step by step so they can produce better argumentative essays with the structure as a thinking frame. We conducted an experiment to the students in an elementary school in New Taipei City for one semester. The experimental result showed that the system provided by this study could improve the students' argumentative capability. From the result of regression analysis, we found that the students using the digital argument-map writing system had a more thorough thinking on the forming of argumentation. Their evidence accords with their reasons and their reasons accord with their claims. The argumentation in their argumentative essays is thus highly connective and more integrated.", "fno": "3870a411", "keywords": [ "Writing", "Training", "Correlation", "Cognition", "Reflection", "Tools", "Component", "Argumentation", "Argument Map", "Argumentative Essay" ], "authors": [ { "affiliation": null, "fullName": "Yu-Fang Liu", "givenName": "Yu-Fang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Cheng-Yu Fan", "givenName": "Cheng-Yu", "surname": "Fan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yun-Hsuan Chang", "givenName": "Yun-Hsuan", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gwo-Dong Chen", "givenName": "Gwo-Dong", "surname": "Chen", "__typename": "ArticleAuthorType" } ], "idPrefix": "icalt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "411-413", "year": "2017", "issn": "2161-377X", "isbn": "978-1-5386-3870-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3870a406", "articleId": "12OmNvqmUNB", "__typename": "AdjacentArticleType" }, "next": { "fno": "3870a414", "articleId": "12OmNBTs7rk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fie/2011/468/0/06142821", "title": "Distributed systems design supported by reflective writing and CATs", "doi": null, "abstractUrl": "/proceedings-article/fie/2011/06142821/12OmNAle6Xr", "parentPublication": { "id": "proceedings/fie/2011/468/0", "title": "2011 Frontiers in Education Conference (FIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2017/3870/0/3870a406", "title": "Critical Thinker: Supporting Collaborative Argumentation with Structure and Awareness", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a406/12OmNvqmUNB", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latice/2017/0892/0/0892a009", "title": "Students' Types of Argumentative Knowledge Construction Process in Social Collaborative Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/latice/2017/0892a009/12OmNvrMUf6", "parentPublication": { "id": "proceedings/latice/2017/0892/0", "title": "2017 International Conference on Learning and Teaching in Computing and Engineering (LaTICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/latice/2015/9967/0/9967a134", "title": "A Meta-Analysis on Students' Argumentative Knowledge Construction Process in Social Collaborative Learning Environment", "doi": null, "abstractUrl": "/proceedings-article/latice/2015/9967a134/12OmNyvoXf8", "parentPublication": { "id": "proceedings/latice/2015/9967/0", "title": "2015 International Conference on Learning and Teaching in Computing and Engineering (LaTiCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/2/4513b329", "title": "Multi-party Dialogue Games for Distributed Argumentation System", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513b329/12OmNzDNtts", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/2", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wicsa/2016/2131/0/2131a115", "title": "Defeasible Argumentation of Software Architectures", "doi": null, "abstractUrl": "/proceedings-article/wicsa/2016/2131a115/12OmNzVoBrQ", "parentPublication": { "id": "proceedings/wicsa/2016/2131/0", "title": "2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eitt/2018/9603/0/960300a077", "title": "Analyzing Critical Thinking Elements in the Argument Structure of Non-English-Major Chinese Undergraduate Students' Writing", "doi": null, "abstractUrl": "/proceedings-article/eitt/2018/960300a077/1ap5kSWcD9S", "parentPublication": { "id": "proceedings/eitt/2018/9603/0", "title": "2018 Seventh International Conference of Educational Innovation through Technology (EITT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2019/5341/0/09001802", "title": "Automatic Evaluation for Arabic Essays: A Rule-Based System", "doi": null, "abstractUrl": "/proceedings-article/isspit/2019/09001802/1hHMhkev7dm", "parentPublication": { "id": "proceedings/isspit/2019/5341/0", "title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222553", "title": "Visual Analysis of Argumentation in Essays", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222553/1nTqx1ClQqc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icalt/2021/4106/0/410600a270", "title": "Shimo-based collaborative argumentative writing: Do grouping patterns matter?", "doi": null, "abstractUrl": "/proceedings-article/icalt/2021/410600a270/1vK03aW6nny", "parentPublication": { "id": "proceedings/icalt/2021/4106/0", "title": "2021 International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzTYC8J", "title": "2009 Seventh International Conference on Creating, Connecting and Collaborating through Computing (C5 2009)", "acronym": "c5", "groupId": "1000171", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzA6GTy", "doi": "10.1109/C5.2009.10", "title": "Active Essays on the Web", "normalizedTitle": "Active Essays on the Web", "abstract": "This paper describes \"Active Essays\" and their implementation with Internet technology. An Active Essay combines a written essay, program fragments, and the resulting live simulations into a single cohesive narrative. We believe the integration of programming and natural language makes a superior teaching medium for expressing mathematical, scientific, and even literary ideas. It is especially effective when it can be read, run, and authored in a web browser. We review our previous implementations of Active Essays on the Web. Chalkboard is our latest Active Essay framework. We discuss Chalkboard's features, examples, design decisions, and unresolved issues.", "abstracts": [ { "abstractType": "Regular", "content": "This paper describes \"Active Essays\" and their implementation with Internet technology. An Active Essay combines a written essay, program fragments, and the resulting live simulations into a single cohesive narrative. We believe the integration of programming and natural language makes a superior teaching medium for expressing mathematical, scientific, and even literary ideas. It is especially effective when it can be read, run, and authored in a web browser. We review our previous implementations of Active Essays on the Web. Chalkboard is our latest Active Essay framework. We discuss Chalkboard's features, examples, design decisions, and unresolved issues.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper describes \"Active Essays\" and their implementation with Internet technology. An Active Essay combines a written essay, program fragments, and the resulting live simulations into a single cohesive narrative. We believe the integration of programming and natural language makes a superior teaching medium for expressing mathematical, scientific, and even literary ideas. It is especially effective when it can be read, run, and authored in a web browser. We review our previous implementations of Active Essays on the Web. Chalkboard is our latest Active Essay framework. We discuss Chalkboard's features, examples, design decisions, and unresolved issues.", "fno": "3620a003", "keywords": [], "authors": [ { "affiliation": null, "fullName": "Takashi Yamamiya", "givenName": "Takashi", "surname": "Yamamiya", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Alessandro Warth", "givenName": "Alessandro", "surname": "Warth", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ted Kaehler", "givenName": "Ted", "surname": "Kaehler", "__typename": "ArticleAuthorType" } ], "idPrefix": "c5", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-01-01T00:00:00", "pubType": "proceedings", "pages": "3-10", "year": "2009", "issn": null, "isbn": "978-0-7695-3620-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3620z009", "articleId": "12OmNqNG3kr", "__typename": "AdjacentArticleType" }, "next": { "fno": "3620a011", "articleId": "12OmNCctfjE", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/csie/2009/3507/5/3507e144", "title": "A Novel Technique for Automated Linguistic Quality Assessment of Students' Essays Using Automatic Summarizers", "doi": null, "abstractUrl": "/proceedings-article/csie/2009/3507e144/12OmNrkT7Gd", "parentPublication": { "id": "proceedings/csie/2009/3507/6", "title": "Computer Science and Information Engineering, World Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2017/3876/0/387601a670", "title": "Erasure Detection and Recognition on Children's Manuscript Essays", "doi": null, "abstractUrl": "/proceedings-article/ictai/2017/387601a670/12OmNvkpl0k", "parentPublication": { "id": "proceedings/ictai/2017/3876/0", "title": "2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eee/2005/2274/0/22740576", "title": "A Critiquing System to Support English Composition through the Use of Latent Semantic Analysis", "doi": null, "abstractUrl": "/proceedings-article/eee/2005/22740576/12OmNzFMFkY", "parentPublication": { "id": "proceedings/eee/2005/2274/0", "title": "Proceedings. The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2010/4077/2/4077d081", "title": "Research on Active Purchasing Strategy in the Context of Supply Chain", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077d081/12OmNzayNu0", "parentPublication": { "id": "proceedings/icicta/2010/4077/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2017/4822/0/482201a465", "title": "Unsupervised Off-Topic Essay Detection Based on Target and Reference Prompts", "doi": null, "abstractUrl": "/proceedings-article/cis/2017/482201a465/12OmNzb7ZpX", "parentPublication": { "id": "proceedings/cis/2017/4822/0", "title": "2017 13th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2003/01/x1032", "title": "Finding the WRITE Stuff: Automatic Identification of Discourse Structure in Student Essays", "doi": null, "abstractUrl": "/magazine/ex/2003/01/x1032/13rRUxCitDN", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a279", "title": "Automated Grading of Handwritten Essays", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a279/17D45WHONnf", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a274", "title": "Sentence-BERT Distinguishes Good and Bad Essays in Cross-prompt Automated Essay Scoring", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a274/1KBr81oxEY0", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2019/5341/0/09001802", "title": "Automatic Evaluation for Arabic Essays: A Rule-Based System", "doi": null, "abstractUrl": "/proceedings-article/isspit/2019/09001802/1hHMhkev7dm", "parentPublication": { "id": "proceedings/isspit/2019/5341/0", "title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222553", "title": "Visual Analysis of Argumentation in Essays", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222553/1nTqx1ClQqc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKird", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "acronym": "icfhr", "groupId": "1000298", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONnf", "doi": "10.1109/ICFHR-2018.2018.00056", "title": "Automated Grading of Handwritten Essays", "normalizedTitle": "Automated Grading of Handwritten Essays", "abstract": "Automatic grading of handwritten essays is vital in evaluating the performance of students in educational settings, particularly in situations where language experts are rare. We build a system capable of taking the input as handwritten essays in image format and outputs the grading on the scale of 0-5; 0 being the worst and 5 being the best. The overall system integrates Optical Handwriting Recognition (OHR) and Automated Essay Scoring (AES)/grading. The handwritten essay is transcribed using a network composed of Multi-Dimensional Long Short Term Memory (MDLSTM) and convolution layers. The loss function is Connectionist Temporal Classification (CTC). The AES model is a 2-layer artificial neural network with a feature set based on pretrained GloVe word vectors. The results of grading of essays are compared for transcriptions of essays received from OHR system and transcriptions of essays done manually. The mutual agreement between the two shows a Quadratic Weighted Kappa score of 0.88. The results indicate that though the current OHR systems have transcription errors but as a whole can perform well for an application like AES.", "abstracts": [ { "abstractType": "Regular", "content": "Automatic grading of handwritten essays is vital in evaluating the performance of students in educational settings, particularly in situations where language experts are rare. We build a system capable of taking the input as handwritten essays in image format and outputs the grading on the scale of 0-5; 0 being the worst and 5 being the best. The overall system integrates Optical Handwriting Recognition (OHR) and Automated Essay Scoring (AES)/grading. The handwritten essay is transcribed using a network composed of Multi-Dimensional Long Short Term Memory (MDLSTM) and convolution layers. The loss function is Connectionist Temporal Classification (CTC). The AES model is a 2-layer artificial neural network with a feature set based on pretrained GloVe word vectors. The results of grading of essays are compared for transcriptions of essays received from OHR system and transcriptions of essays done manually. The mutual agreement between the two shows a Quadratic Weighted Kappa score of 0.88. The results indicate that though the current OHR systems have transcription errors but as a whole can perform well for an application like AES.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Automatic grading of handwritten essays is vital in evaluating the performance of students in educational settings, particularly in situations where language experts are rare. We build a system capable of taking the input as handwritten essays in image format and outputs the grading on the scale of 0-5; 0 being the worst and 5 being the best. The overall system integrates Optical Handwriting Recognition (OHR) and Automated Essay Scoring (AES)/grading. The handwritten essay is transcribed using a network composed of Multi-Dimensional Long Short Term Memory (MDLSTM) and convolution layers. The loss function is Connectionist Temporal Classification (CTC). The AES model is a 2-layer artificial neural network with a feature set based on pretrained GloVe word vectors. The results of grading of essays are compared for transcriptions of essays received from OHR system and transcriptions of essays done manually. The mutual agreement between the two shows a Quadratic Weighted Kappa score of 0.88. The results indicate that though the current OHR systems have transcription errors but as a whole can perform well for an application like AES.", "fno": "587500a279", "keywords": [ "Convolution", "Educational Administrative Data Processing", "Handwriting Recognition", "Handwritten Character Recognition", "Image Classification", "Natural Language Processing", "Recurrent Neural Nets", "Vectors", "Handwritten Essay", "Automated Essay Scoring Grading", "Convolution Layers", "Automated Grading", "AES Grading", "Optical Handwriting Recognition", "Connectionist Temporal Classification", "CTC", "Artificial Neural Network", "Glo Ve Word Vectors", "Student Performance", "Educational Settings", "Task Analysis", "Feature Extraction", "Handwriting Recognition", "Convolution", "Hidden Markov Models", "Measurement", "Training", "Handwriting Recognition", "Automated Essay Grading", "MDLSTM", "Glo Ve Vector Representation" ], "authors": [ { "affiliation": null, "fullName": "Annapurna Sharma", "givenName": "Annapurna", "surname": "Sharma", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dinesh Babu Jayagopi", "givenName": "Dinesh Babu", "surname": "Jayagopi", "__typename": "ArticleAuthorType" } ], "idPrefix": "icfhr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-08-01T00:00:00", "pubType": "proceedings", "pages": "279-284", "year": "2018", "issn": null, "isbn": "978-1-5386-5875-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "587500a273", "articleId": "17D45WODapc", "__typename": "AdjacentArticleType" }, "next": { "fno": "587500a285", "articleId": "17D45Wuc388", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icfhr/2016/0981/0/0981a630", "title": "ICFHR2016 Competition on Handwritten Text Recognition on the READ Dataset", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2016/0981a630/12OmNApcugp", "parentPublication": { "id": "proceedings/icfhr/2016/0981/0", "title": "2016 15th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2011/4520/0/4520a053", "title": "HMM-Based Alignment of Inaccurate Transcriptions for Historical Documents", "doi": null, "abstractUrl": "/proceedings-article/icdar/2011/4520a053/12OmNqIzgZ3", "parentPublication": { "id": "proceedings/icdar/2011/4520/0", "title": "2011 International Conference on Document Analysis and Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icinis/2015/8221/0/8221a193", "title": "Feature Extraction and Identification of Handwritten Characters", "doi": null, "abstractUrl": "/proceedings-article/icinis/2015/8221a193/12OmNwbukdF", "parentPublication": { "id": "proceedings/icinis/2015/8221/0", "title": "2015 8th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2010/4109/0/4109d416", "title": "HMM-based Word Spotting in Handwritten Documents Using Subword Models", "doi": null, "abstractUrl": "/proceedings-article/icpr/2010/4109d416/12OmNx7ouS1", "parentPublication": { "id": "proceedings/icpr/2010/4109/0", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460138", "title": "Baseline extraction-driven Parsing of handwritten mathematical expressions", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460138/12OmNyPQ4D0", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a558", "title": "Probabilistic Music-Symbol Spotting in Handwritten Scores", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a558/17D45Wt3Ew2", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a587", "title": "Finding the Answer: Techniques for Locating Students' Answers in Handwritten Problem Solutions", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a587/17D45XeKgmw", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a274", "title": "Sentence-BERT Distinguishes Good and Bad Essays in Cross-prompt Automated Essay Scoring", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a274/1KBr81oxEY0", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdar/2019/3014/0/301400a426", "title": "Towards Automated Evaluation of Handwritten Assessments", "doi": null, "abstractUrl": "/proceedings-article/icdar/2019/301400a426/1h81oWbw2Fq", "parentPublication": { "id": "proceedings/icdar/2019/3014/0", "title": "2019 International Conference on Document Analysis and Recognition (ICDAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2019/5341/0/09001802", "title": "Automatic Evaluation for Arabic Essays: A Rule-Based System", "doi": null, "abstractUrl": "/proceedings-article/isspit/2019/09001802/1hHMhkev7dm", "parentPublication": { "id": "proceedings/isspit/2019/5341/0", "title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KBqPQkw71C", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "acronym": "icdmw", "groupId": "10029378", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KBr81oxEY0", "doi": "10.1109/ICDMW58026.2022.00045", "title": "Sentence-BERT Distinguishes Good and Bad Essays in Cross-prompt Automated Essay Scoring", "normalizedTitle": "Sentence-BERT Distinguishes Good and Bad Essays in Cross-prompt Automated Essay Scoring", "abstract": "Automated Essay Scoring (AES) refers to a set of processes that automatically assigns grades to student-written essays with machine learning models. Existing AES models are mostly trained prompt-specifically with supervised learning, which requires the essay prompt to be accessible to the system vendor at the time of model training. However, essay prompts for high-stakes testing should usually be kept confidential before the test date, which demands the model to be cross-promptly trainable with pre-scored essay data already in hands. Document embeddings obtained from pretrained language models such as Sentence-BERT (sbert) are primarily expected to represent the semantic content of the text. We hypothesize SBERT embeddings also contain assessment-relevant elements that are extractable by document embedding decomposition through Principal Component Analysis (PCA) enhanced with Normalized Discounted Cumulative Gain (nDCG) measurement. The identified evaluative elements in the entire embedding space of the source essays are then cross-promptly transferred to the target essays written on different prompts for binary clustering task of dividing high/low-scored groups. The result implies non-finetuned SBERT already contains evaluative elements to distinguish good and bad essays.", "abstracts": [ { "abstractType": "Regular", "content": "Automated Essay Scoring (AES) refers to a set of processes that automatically assigns grades to student-written essays with machine learning models. Existing AES models are mostly trained prompt-specifically with supervised learning, which requires the essay prompt to be accessible to the system vendor at the time of model training. However, essay prompts for high-stakes testing should usually be kept confidential before the test date, which demands the model to be cross-promptly trainable with pre-scored essay data already in hands. Document embeddings obtained from pretrained language models such as Sentence-BERT (sbert) are primarily expected to represent the semantic content of the text. We hypothesize SBERT embeddings also contain assessment-relevant elements that are extractable by document embedding decomposition through Principal Component Analysis (PCA) enhanced with Normalized Discounted Cumulative Gain (nDCG) measurement. The identified evaluative elements in the entire embedding space of the source essays are then cross-promptly transferred to the target essays written on different prompts for binary clustering task of dividing high/low-scored groups. The result implies non-finetuned SBERT already contains evaluative elements to distinguish good and bad essays.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Automated Essay Scoring (AES) refers to a set of processes that automatically assigns grades to student-written essays with machine learning models. Existing AES models are mostly trained prompt-specifically with supervised learning, which requires the essay prompt to be accessible to the system vendor at the time of model training. However, essay prompts for high-stakes testing should usually be kept confidential before the test date, which demands the model to be cross-promptly trainable with pre-scored essay data already in hands. Document embeddings obtained from pretrained language models such as Sentence-BERT (sbert) are primarily expected to represent the semantic content of the text. We hypothesize SBERT embeddings also contain assessment-relevant elements that are extractable by document embedding decomposition through Principal Component Analysis (PCA) enhanced with Normalized Discounted Cumulative Gain (nDCG) measurement. The identified evaluative elements in the entire embedding space of the source essays are then cross-promptly transferred to the target essays written on different prompts for binary clustering task of dividing high/low-scored groups. The result implies non-finetuned SBERT already contains evaluative elements to distinguish good and bad essays.", "fno": "460900a274", "keywords": [ "Document Handling", "Natural Language Processing", "Pattern Clustering", "Principal Component Analysis", "Supervised Learning", "Text Analysis", "AES Models", "Assessment Relevant Elements", "Binary Clustering Task", "Cross Prompt Automated Essay Scoring", "Document Embedding Decomposition", "Embedding Space", "Machine Learning Models", "Model Training", "N DCG", "Nonfinetuned SBERT", "Normalized Discounted Cumulative Gain Measurement", "Pre Scored Essay Data", "Pretrained Language Models", "Principal Component Analysis", "Sbert", "SBERT Embeddings", "Sentence BERT", "Source Essays", "Student Written Essays", "Supervised Learning", "Target Essays", "Training", "Semantics", "Supervised Learning", "Machine Learning", "Predictive Models", "Data Models", "Data Mining", "Automated Essay Scoring", "Document Embeddings", "Embedding Decomposition", "Pretrained Language Models", "Sentence BERT" ], "authors": [ { "affiliation": "Graduate School of Artificial Intelligence and Science Rikkyo University,Tokyo,Japan", "fullName": "Toru Sasaki", "givenName": "Toru", "surname": "Sasaki", "__typename": "ArticleAuthorType" }, { "affiliation": "Graduate School of Artificial Intelligence and Science Rikkyo University,Tokyo,Japan", "fullName": "Tomonari Masada", "givenName": "Tomonari", "surname": "Masada", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdmw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-11-01T00:00:00", "pubType": "proceedings", "pages": "274-281", "year": "2022", "issn": null, "isbn": "979-8-3503-4609-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "460900a264", "articleId": "1KBqQiuuM6s", "__typename": "AdjacentArticleType" }, "next": { "fno": "460900a282", "articleId": "1KBramVEBIQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cgc/2012/3027/0/06382855", "title": "A Ranked-Based Learning Approach to Automated Essay Scoring", "doi": null, "abstractUrl": "/proceedings-article/cgc/2012/06382855/12OmNBtl1Gt", "parentPublication": { "id": "proceedings/cgc/2012/3027/0", "title": "2012 International Conference on Cloud and Green Computing (CGC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2017/4822/0/482201a465", "title": "Unsupervised Off-Topic Essay Detection Based on Target and Reference Prompts", "doi": null, "abstractUrl": "/proceedings-article/cis/2017/482201a465/12OmNzb7ZpX", "parentPublication": { "id": "proceedings/cis/2017/4822/0", "title": "2017 13th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2003/01/x1032", "title": "Finding the WRITE Stuff: Automatic Identification of Discourse Structure in Student Essays", "doi": null, "abstractUrl": "/magazine/ex/2003/01/x1032/13rRUxCitDN", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2018/1737/0/08486468", "title": "Essay-Anchor Attentive Multi-Modal Bilinear Pooling for Textbook Question Answering", "doi": null, "abstractUrl": "/proceedings-article/icme/2018/08486468/14jQfNUirJz", "parentPublication": { "id": "proceedings/icme/2018/1737/0", "title": "2018 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a279", "title": "Automated Grading of Handwritten Essays", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a279/17D45WHONnf", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2018/05/08506398", "title": "Coherence-Based Automatic Essay Assessment", "doi": null, "abstractUrl": "/magazine/ex/2018/05/08506398/17D45WK5Al0", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2022/9755/0/975500a313", "title": "Statistical Learning Models for Japanese Essay Scoring Toward One-shot Learning", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2022/975500a313/1GU6PlVdRZu", "parentPublication": { "id": "proceedings/iiai-aai/2022/9755/0", "title": "2022 12th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2019/5341/0/09001802", "title": "Automatic Evaluation for Arabic Essays: A Rule-Based System", "doi": null, "abstractUrl": "/proceedings-article/isspit/2019/09001802/1hHMhkev7dm", "parentPublication": { "id": "proceedings/isspit/2019/5341/0", "title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222553", "title": "Visual Analysis of Argumentation in Essays", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222553/1nTqx1ClQqc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isctt/2020/8575/0/857500a355", "title": "An Automatic System for Essay Questions Scoring based on LSTM and Word Embedding", "doi": null, "abstractUrl": "/proceedings-article/isctt/2020/857500a355/1rHeOqKp5iU", "parentPublication": { "id": "proceedings/isctt/2020/8575/0", "title": "2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1hHMfoL4WPK", "title": "2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "acronym": "isspit", "groupId": "1001026", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1hHMhkev7dm", "doi": "10.1109/ISSPIT47144.2019.9001802", "title": "Automatic Evaluation for Arabic Essays: A Rule-Based System", "normalizedTitle": "Automatic Evaluation for Arabic Essays: A Rule-Based System", "abstract": "Essay writing is a common way to evaluate students' writing skills. Automated Essay Scoring (AES) systems are designed to facilitate the grading task for a large number of students in schools, universities, and testing companies. This study proposes a rule-based system to evaluate Arabic essays automatically, based on free textual essay analysis, whether or not there are predefined model essays. The evaluation criteria include surface-based and text processing requirements such as spelling, punctuation marks, essay structure, coherence, and essay style. To evaluate our system, we collected unrestricted Arabic essays from native Arabic writers with university-level proficiency. This dataset has been manually evaluated following our rubric based on the common criteria for good writing. The results obtained by our system show that, for essay's overall score around 73% were correctly evaluated. In addition, results show a variety in the system performance for each specific criterion. This system is designed as a baseline for more advanced AES system that uses complex features with machine learning techniques in future.", "abstracts": [ { "abstractType": "Regular", "content": "Essay writing is a common way to evaluate students' writing skills. Automated Essay Scoring (AES) systems are designed to facilitate the grading task for a large number of students in schools, universities, and testing companies. This study proposes a rule-based system to evaluate Arabic essays automatically, based on free textual essay analysis, whether or not there are predefined model essays. The evaluation criteria include surface-based and text processing requirements such as spelling, punctuation marks, essay structure, coherence, and essay style. To evaluate our system, we collected unrestricted Arabic essays from native Arabic writers with university-level proficiency. This dataset has been manually evaluated following our rubric based on the common criteria for good writing. The results obtained by our system show that, for essay's overall score around 73% were correctly evaluated. In addition, results show a variety in the system performance for each specific criterion. This system is designed as a baseline for more advanced AES system that uses complex features with machine learning techniques in future.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Essay writing is a common way to evaluate students' writing skills. Automated Essay Scoring (AES) systems are designed to facilitate the grading task for a large number of students in schools, universities, and testing companies. This study proposes a rule-based system to evaluate Arabic essays automatically, based on free textual essay analysis, whether or not there are predefined model essays. The evaluation criteria include surface-based and text processing requirements such as spelling, punctuation marks, essay structure, coherence, and essay style. To evaluate our system, we collected unrestricted Arabic essays from native Arabic writers with university-level proficiency. This dataset has been manually evaluated following our rubric based on the common criteria for good writing. The results obtained by our system show that, for essay's overall score around 73% were correctly evaluated. In addition, results show a variety in the system performance for each specific criterion. This system is designed as a baseline for more advanced AES system that uses complex features with machine learning techniques in future.", "fno": "09001802", "keywords": [ "Computer Aided Instruction", "Educational Administrative Data Processing", "Natural Language Processing", "Text Analysis", "Word Processing", "Automated Essay Scoring Systems", "Rule Based System", "Free Textual Essay Analysis", "Evaluation Criteria", "Essay Structure", "Essay Style", "Native Arabic Writers", "University Level Proficiency", "System Performance", "Advanced AES System", "Automatic Evaluation", "Essay Writing", "Surface Based Requirements", "Unrestricted Arabic Essays", "Writing", "Semantics", "Correlation", "Coherence", "Testing", "Analytical Models", "Linguistics", "Automatic Essay Scoring", "Writing Evaluation" ], "authors": [ { "affiliation": "College of Computer and Information Sciences, Al Immam Mohammad Ibn Saud Islamic University(IMSIU),Computer Sciences Department,Riyadh,Saudi Arabia", "fullName": "Abeer Alqahtani", "givenName": "Abeer", "surname": "Alqahtani", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer and Information Sciences, Al Immam Mohammad Ibn Saud Islamic University(IMSIU),Computer Sciences Department,Riyadh,Saudi Arabia", "fullName": "Amal Alsaif", "givenName": "Amal", "surname": "Alsaif", "__typename": "ArticleAuthorType" } ], "idPrefix": "isspit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-12-01T00:00:00", "pubType": "proceedings", "pages": "1-7", "year": "2019", "issn": null, "isbn": "978-1-7281-5341-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09001779", "articleId": "1hHMlmJN0hq", "__typename": "AdjacentArticleType" }, "next": { "fno": "09001822", "articleId": "1hHMmMKRjVK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icalt/2017/3870/0/3870a411", "title": "A Digital Tool for Argumentation Construction that Assists Users in Writing Argumentative Essays", "doi": null, "abstractUrl": "/proceedings-article/icalt/2017/3870a411/12OmNxEByYF", "parentPublication": { "id": "proceedings/icalt/2017/3870/0", "title": "2017 IEEE 17th International Conference on Advanced Learning Technologies (ICALT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2014/4302/0/4302b133", "title": "Automated Essay Evaluation Augmented with Semantic Coherence Measures", "doi": null, "abstractUrl": "/proceedings-article/icdm/2014/4302b133/12OmNxUdvaH", "parentPublication": { "id": "proceedings/icdm/2014/4302/0", "title": "2014 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aina/2011/4337/0/4337a270", "title": "Determining Writing Genre: Towards a Rubric-based Approach to Automated Essay Grading", "doi": null, "abstractUrl": "/proceedings-article/aina/2011/4337a270/12OmNxwENJ7", "parentPublication": { "id": "proceedings/aina/2011/4337/0", "title": "2011 IEEE International Conference on Advanced Information Networking and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2009/3904/0/3904a265", "title": "Automatic Chinese Essay Scoring Using Connections between Concepts in Paragraphs", "doi": null, "abstractUrl": "/proceedings-article/ialp/2009/3904a265/12OmNyS6RI4", "parentPublication": { "id": "proceedings/ialp/2009/3904/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cis/2017/4822/0/482201a465", "title": "Unsupervised Off-Topic Essay Detection Based on Target and Reference Prompts", "doi": null, "abstractUrl": "/proceedings-article/cis/2017/482201a465/12OmNzb7ZpX", "parentPublication": { "id": "proceedings/cis/2017/4822/0", "title": "2017 13th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2003/01/x1032", "title": "Finding the WRITE Stuff: Automatic Identification of Discourse Structure in Student Essays", "doi": null, "abstractUrl": "/magazine/ex/2003/01/x1032/13rRUxCitDN", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2018/5875/0/587500a279", "title": "Automated Grading of Handwritten Essays", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2018/587500a279/17D45WHONnf", "parentPublication": { "id": "proceedings/icfhr/2018/5875/0", "title": "2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2018/05/08506398", "title": "Coherence-Based Automatic Essay Assessment", "doi": null, "abstractUrl": "/magazine/ex/2018/05/08506398/17D45WK5Al0", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2022/4609/0/460900a274", "title": "Sentence-BERT Distinguishes Good and Bad Essays in Cross-prompt Automated Essay Scoring", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2022/460900a274/1KBr81oxEY0", "parentPublication": { "id": "proceedings/icdmw/2022/4609/0", "title": "2022 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isctt/2020/8575/0/857500a355", "title": "An Automatic System for Essay Questions Scoring based on LSTM and Word Embedding", "doi": null, "abstractUrl": "/proceedings-article/isctt/2020/857500a355/1rHeOqKp5iU", "parentPublication": { "id": "proceedings/isctt/2020/8575/0", "title": "2020 5th International Conference on Information Science, Computer Technology and Transportation (ISCTT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1rFzRO89N28", "title": "2021 IEEE 15th International Conference on Semantic Computing (ICSC)", "acronym": "icsc", "groupId": "1001356", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1rFzViIWPEk", "doi": "10.1109/ICSC50631.2021.00046", "title": "Modeling Clinical Empathy in Narrative Essays", "normalizedTitle": "Modeling Clinical Empathy in Narrative Essays", "abstract": "Empathy is commonly defined as the capacity to stand in another's shoes and can be generally divided into two major components: affective and cognitive empathy. The role and importance of empathy in clinical practice have been widely discussed in the research community at large and there have been numerous initiatives to train physicians and nurses in empathic communication. Qualitative and quantitative investigations of clinical practice settings involving empathy have primarily focused on patient experience, yet little has been done on the quantitative analysis and modeling of clinical empathy themselves. In this paper, we address two important aspects of clinical empathy modeling: the design and implementation of a new annotation protocol, and an automatic classification system trained on a new corpus of narrative essays written by pre-med students. To develop the annotation protocol, we built MedicalCare, a corpus of essays simulating a doctor's delivery of bad news to a hypothetical patient. We compared our results with state-of-the-art research on empathy prediction using self-rated empathy scores. Our research suggests that the classification system we built is effective in modeling clinical empathy and that our annotation protocol is more reliable when compared with self-assessment approaches to empathy prediction.", "abstracts": [ { "abstractType": "Regular", "content": "Empathy is commonly defined as the capacity to stand in another's shoes and can be generally divided into two major components: affective and cognitive empathy. The role and importance of empathy in clinical practice have been widely discussed in the research community at large and there have been numerous initiatives to train physicians and nurses in empathic communication. Qualitative and quantitative investigations of clinical practice settings involving empathy have primarily focused on patient experience, yet little has been done on the quantitative analysis and modeling of clinical empathy themselves. In this paper, we address two important aspects of clinical empathy modeling: the design and implementation of a new annotation protocol, and an automatic classification system trained on a new corpus of narrative essays written by pre-med students. To develop the annotation protocol, we built MedicalCare, a corpus of essays simulating a doctor's delivery of bad news to a hypothetical patient. We compared our results with state-of-the-art research on empathy prediction using self-rated empathy scores. Our research suggests that the classification system we built is effective in modeling clinical empathy and that our annotation protocol is more reliable when compared with self-assessment approaches to empathy prediction.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Empathy is commonly defined as the capacity to stand in another's shoes and can be generally divided into two major components: affective and cognitive empathy. The role and importance of empathy in clinical practice have been widely discussed in the research community at large and there have been numerous initiatives to train physicians and nurses in empathic communication. Qualitative and quantitative investigations of clinical practice settings involving empathy have primarily focused on patient experience, yet little has been done on the quantitative analysis and modeling of clinical empathy themselves. In this paper, we address two important aspects of clinical empathy modeling: the design and implementation of a new annotation protocol, and an automatic classification system trained on a new corpus of narrative essays written by pre-med students. To develop the annotation protocol, we built MedicalCare, a corpus of essays simulating a doctor's delivery of bad news to a hypothetical patient. We compared our results with state-of-the-art research on empathy prediction using self-rated empathy scores. Our research suggests that the classification system we built is effective in modeling clinical empathy and that our annotation protocol is more reliable when compared with self-assessment approaches to empathy prediction.", "fno": "889900a215", "keywords": [ "Behavioural Sciences Computing", "Biomedical Education", "Cognition", "Health Care", "Medical Computing", "Medical Information Systems", "Patient Care", "Psychology", "Empathy Scores", "Annotation Protocol", "Empathy Prediction", "Narrative Essays", "Affective Empathy", "Cognitive Empathy", "Clinical Practice Settings", "Quantitative Analysis", "Clinical Empathy Modeling", "Protocols", "Annotations", "Statistical Analysis", "Computational Modeling", "Semantics", "Medical Services", "Reliability", "Empathy", "Clinical Empathy", "Self Rated Empathy", "Third Party Rated Empathy" ], "authors": [ { "affiliation": "University of Illinois,Department of Linguistics,Urbana-Champaign,USA", "fullName": "Shuju Shi", "givenName": "Shuju", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois,Department of Linguistics,Urbana-Champaign,USA", "fullName": "Yinglun Sun", "givenName": "Yinglun", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Illinois,Department of Linguistics,Urbana-Champaign,USA", "fullName": "Jose Zavala", "givenName": "Jose", "surname": "Zavala", "__typename": "ArticleAuthorType" }, { "affiliation": "Beckman Institute for Advanced Science and Technology, University of Illinois,Urbana-Champaign,USA", "fullName": "Jeffrey Moore", "givenName": "Jeffrey", "surname": "Moore", "__typename": "ArticleAuthorType" }, { "affiliation": "Beckman Institute for Advanced Science and Technology, University of Illinois,Urbana-Champaign,USA", "fullName": "Roxana Girju", "givenName": "Roxana", "surname": "Girju", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "215-220", "year": "2021", "issn": "2325-6516", "isbn": "978-1-7281-8899-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "889900a211", "articleId": "1rFzVwiR5rG", "__typename": "AdjacentArticleType" }, "next": { "fno": "889900a221", "articleId": "1rFzUXA7eYo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ichi/2016/6117/0/6117a271", "title": "Mining the Clinical Narrative: All Text are Not Equal", "doi": null, "abstractUrl": "/proceedings-article/ichi/2016/6117a271/12OmNBOll48", "parentPublication": { "id": "proceedings/ichi/2016/6117/0", "title": "2016 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbms/2012/2049/0/06266322", "title": "Modeling clinical workflows using business process modeling notation", "doi": null, "abstractUrl": "/proceedings-article/cbms/2012/06266322/12OmNCdk2BY", "parentPublication": { "id": "proceedings/cbms/2012/2049/0", "title": "2012 25th IEEE International Symposium on Computer-Based Medical Systems (CBMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2011/9618/0/05718685", "title": "Creating Reusable Annotated Corpora with the Clinical Document Architecture", "doi": null, "abstractUrl": "/proceedings-article/hicss/2011/05718685/12OmNzyGH6e", "parentPublication": { "id": "proceedings/hicss/2011/9618/0", "title": "2011 44th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669611", "title": "A framework for clinical data integration and annotation for decision support", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669611/1A9WccuV3Xi", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itme/2022/1015/0/101500a507", "title": "Implementation path of Nursing \"Empathy\" in Virtual Reality Teaching", "doi": null, "abstractUrl": "/proceedings-article/itme/2022/101500a507/1M4rnukGKIM", "parentPublication": { "id": "proceedings/itme/2022/1015/0", "title": "2022 12th International Conference on Information Technology in Medicine and Education (ITME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2019/1867/0/08983406", "title": "Clinical named-entity recognition: A short comparison", "doi": null, "abstractUrl": "/proceedings-article/bibm/2019/08983406/1hgudWFsNLG", "parentPublication": { "id": "proceedings/bibm/2019/1867/0", "title": "2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222553", "title": "Visual Analysis of Argumentation in Essays", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222553/1nTqx1ClQqc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2020/6215/0/09313302", "title": "Cost-Quality Adaptive Active Learning for Chinese Clinical Named Entity Recognition", "doi": null, "abstractUrl": "/proceedings-article/bibm/2020/09313302/1qmgdfy35XW", "parentPublication": { "id": "proceedings/bibm/2020/6215/0", "title": "2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2020/5382/0/09374402", "title": "Automated Empathy Detection for Oncology Encounters", "doi": null, "abstractUrl": "/proceedings-article/ichi/2020/09374402/1rUIZMXLFwA", "parentPublication": { "id": "proceedings/ichi/2020/5382/0", "title": "2020 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2021/0132/0/013200a445", "title": "Clinical data annotation for parotid neoplasia management", "doi": null, "abstractUrl": "/proceedings-article/ichi/2021/013200a445/1xIONdmTjH2", "parentPublication": { "id": "proceedings/ichi/2021/0132/0", "title": "2021 IEEE 9th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tGcgESIWpa", "title": "2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)", "acronym": "iiai-aai", "groupId": "1801921", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1tGcjUHeP96", "doi": "10.1109/IIAI-AAI50415.2020.00062", "title": "The Discussion Corpus toward Argumentation Quality Assessment in Multi-Party Conversation", "normalizedTitle": "The Discussion Corpus toward Argumentation Quality Assessment in Multi-Party Conversation", "abstract": "Recently, many studies in NLP, especially argument mining, have focused on revealing what a good argument is with written texts. However, there are a few studies to challenge argumentation quality assessment in face-to-face conversations due to a lack of corpora, as compared with written texts. Therefore, we construct a multimodal multi-party discussion corpus toward argumentation quality assessment in multi-party conversation. The corpus consists of 10 multi-party discussions (200 minutes) in total. Each participant is annotated for 6 scores about rhetoric, which is one of the classes of argumentation quality. In this paper, we explain the procedure of our corpus construction and report the results of the annotation.", "abstracts": [ { "abstractType": "Regular", "content": "Recently, many studies in NLP, especially argument mining, have focused on revealing what a good argument is with written texts. However, there are a few studies to challenge argumentation quality assessment in face-to-face conversations due to a lack of corpora, as compared with written texts. Therefore, we construct a multimodal multi-party discussion corpus toward argumentation quality assessment in multi-party conversation. The corpus consists of 10 multi-party discussions (200 minutes) in total. Each participant is annotated for 6 scores about rhetoric, which is one of the classes of argumentation quality. In this paper, we explain the procedure of our corpus construction and report the results of the annotation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recently, many studies in NLP, especially argument mining, have focused on revealing what a good argument is with written texts. However, there are a few studies to challenge argumentation quality assessment in face-to-face conversations due to a lack of corpora, as compared with written texts. Therefore, we construct a multimodal multi-party discussion corpus toward argumentation quality assessment in multi-party conversation. The corpus consists of 10 multi-party discussions (200 minutes) in total. Each participant is annotated for 6 scores about rhetoric, which is one of the classes of argumentation quality. In this paper, we explain the procedure of our corpus construction and report the results of the annotation.", "fno": "739700a280", "keywords": [ "Data Mining", "Natural Language Processing", "Text Analysis", "NLP", "Corpus Construction", "Multiparty Discussion Corpus", "Face To Face Conversations", "Written Texts", "Argument Mining", "Multiparty Conversation", "Argumentation Quality Assessment", "Annotations", "Predictive Models", "Rhetoric", "Quality Assessment", "Reliability", "Data Mining", "Informatics", "Conversation Understanding", "Multi Party Discussion Corpus", "Argumentation Quality Assessment", "Rhetorical Quality" ], "authors": [ { "affiliation": "Kyushu Institute of Technology,Graduate School of Computer Science and System Engineering,Iizuka,Fukuoka,Japan", "fullName": "Tsukasa Shiota", "givenName": "Tsukasa", "surname": "Shiota", "__typename": "ArticleAuthorType" }, { "affiliation": "Kyushu Institute of Technology,Department of Artificial Intelligence,Iizuka,Fukuoka,Japan", "fullName": "Kazutaka Shimada", "givenName": "Kazutaka", "surname": "Shimada", "__typename": "ArticleAuthorType" } ], "idPrefix": "iiai-aai", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-09-01T00:00:00", "pubType": "proceedings", "pages": "280-283", "year": "2020", "issn": null, "isbn": "978-1-7281-7397-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "739700a274", "articleId": "1tGcm5OiJR6", "__typename": "AdjacentArticleType" }, "next": { "fno": "739700a284", "articleId": "1tGcrg64Duw", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icassp/2009/2353/0/04960543", "title": "COSINE - A corpus of multi-party COnversational Speech In Noisy Environments", "doi": null, "abstractUrl": "/proceedings-article/icassp/2009/04960543/12OmNvkpkTI", "parentPublication": { "id": "proceedings/icassp/2009/2353/0", "title": "Acoustics, Speech, and Signal Processing, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iat/2011/4513/2/4513b329", "title": "Multi-party Dialogue Games for Distributed Argumentation System", "doi": null, "abstractUrl": "/proceedings-article/wi-iat/2011/4513b329/12OmNzDNtts", "parentPublication": { "id": "proceedings/wi-iat/2011/4513/2", "title": "Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msr/2022/9303/0/930300a237", "title": "SLNET: A Redistributable Corpus of 3rd-party Simulink Models", "doi": null, "abstractUrl": "/proceedings-article/msr/2022/930300a237/1Eo5YDZgc3C", "parentPublication": { "id": "proceedings/msr/2022/9303/0", "title": "2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2022/6845/0/684500a530", "title": "MedTator: A Serverless Web-based Tool for Corpus Annotation", "doi": null, "abstractUrl": "/proceedings-article/ichi/2022/684500a530/1Gvdr8p8x3O", "parentPublication": { "id": "proceedings/ichi/2022/6845/0", "title": "2022 IEEE 10th International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/faiml/2022/7364/0/736400a097", "title": "Named Entity Annotation Corpus for Commercial Opportunity Mining", "doi": null, "abstractUrl": "/proceedings-article/faiml/2022/736400a097/1IUELALaHHa", "parentPublication": { "id": "proceedings/faiml/2022/7364/0", "title": "2022 International Conference on Frontiers of Artificial Intelligence and Machine Learning (FAIML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vast/2019/2284/0/08986917", "title": "VIANA: Visual Interactive Annotation of Argumentation", "doi": null, "abstractUrl": "/proceedings-article/vast/2019/08986917/1hrMyF76kRW", "parentPublication": { "id": "proceedings/vast/2019/2284/0", "title": "2019 IEEE Conference on Visual Analytics Science and Technology (VAST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/02/09222553", "title": "Visual Analysis of Argumentation in Essays", "doi": null, "abstractUrl": "/journal/tg/2021/02/09222553/1nTqx1ClQqc", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2021/8899/0/889900a248", "title": "The ReCAP Corpus: A Corpus of Complex Argument Graphs on German Education Politics", "doi": null, "abstractUrl": "/proceedings-article/icsc/2021/889900a248/1rFzTfOy61W", "parentPublication": { "id": "proceedings/icsc/2021/8899/0", "title": "2021 IEEE 15th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2020/7397/0/739700a444", "title": "Don&#x2019;t beat a dead horse: Recognizing a person who returns to a done-deal in a multi-party conversation", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2020/739700a444/1tGcko2rZMA", "parentPublication": { "id": "proceedings/iiai-aai/2020/7397/0", "title": "2020 9th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cds/2021/0428/0/042800a333", "title": "Annotated Corpus of Comments and Basic Semantic Analysis", "doi": null, "abstractUrl": "/proceedings-article/cds/2021/042800a333/1uZxrMcM9i0", "parentPublication": { "id": "proceedings/cds/2021/0428/0", "title": "2021 2nd International Conference on Computing and Data Science (CDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxwWorE", "title": "2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops", "acronym": "iccvw", "groupId": "1800041", "volume": "0", "displayVolume": "0", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNvAAtp3", "doi": "10.1109/ICCVW.2009.5457500", "title": "A compact representation for scanned 3D objects", "normalizedTitle": "A compact representation for scanned 3D objects", "abstract": "We consider the representation of densely sampled scanned 3D objects. Scanning physical objects can be an efficient way of obtaining natural looking input for computer graphics image generation. Scanned meshes however require large amounts of storage. For applications such as computer graphics, preserving the look of objects rather than precise measurements is critical. We seek a representation that preserves characteristic features at both low and high spatial frequencies. Our proposed representation consists of a simplified base mesh and characteristic detailed patches. The detailed patches contain a spatially dense sampling of mean curvature on a small region on the object surface. A large initial set of patches covering the object is segmented into sets of patches using k-means clustering. Each cluster of patches is then compactly represented with Gaussian distributions. We present comparisons of a series of original scanned objects and the objects reconstructed from the compact representation.", "abstracts": [ { "abstractType": "Regular", "content": "We consider the representation of densely sampled scanned 3D objects. Scanning physical objects can be an efficient way of obtaining natural looking input for computer graphics image generation. Scanned meshes however require large amounts of storage. For applications such as computer graphics, preserving the look of objects rather than precise measurements is critical. We seek a representation that preserves characteristic features at both low and high spatial frequencies. Our proposed representation consists of a simplified base mesh and characteristic detailed patches. The detailed patches contain a spatially dense sampling of mean curvature on a small region on the object surface. A large initial set of patches covering the object is segmented into sets of patches using k-means clustering. Each cluster of patches is then compactly represented with Gaussian distributions. We present comparisons of a series of original scanned objects and the objects reconstructed from the compact representation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We consider the representation of densely sampled scanned 3D objects. Scanning physical objects can be an efficient way of obtaining natural looking input for computer graphics image generation. Scanned meshes however require large amounts of storage. For applications such as computer graphics, preserving the look of objects rather than precise measurements is critical. We seek a representation that preserves characteristic features at both low and high spatial frequencies. Our proposed representation consists of a simplified base mesh and characteristic detailed patches. The detailed patches contain a spatially dense sampling of mean curvature on a small region on the object surface. A large initial set of patches covering the object is segmented into sets of patches using k-means clustering. Each cluster of patches is then compactly represented with Gaussian distributions. We present comparisons of a series of original scanned objects and the objects reconstructed from the compact representation.", "fno": "05457500", "keywords": [ "Computer Graphics", "Image Representation", "Object Recognition", "Pattern Clustering", "Compact Representation", "Scanned 3 D Objects", "Computer Graphics Image Generation", "High Spatial Frequencies", "K Means Clustering", "Shape", "Solid Modeling", "Computer Graphics", "Frequency", "Application Software", "Surface Reconstruction", "Gaussian Distribution", "Spatial Resolution", "Conferences", "Computer Science" ], "authors": [ { "affiliation": "Department of Computer Science, Yale University, USA", "fullName": "Bing Wang", "givenName": "Bing", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Department of Computer Science, Yale University, USA", "fullName": "Holly Rushmeier", "givenName": "Holly", "surname": "Rushmeier", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccvw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-09-01T00:00:00", "pubType": "proceedings", "pages": "1793-1800", "year": "2009", "issn": null, "isbn": "978-1-4244-4442-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05457499", "articleId": "12OmNvmG7VD", "__typename": "AdjacentArticleType" }, "next": { "fno": "05457501", "articleId": "12OmNya72qU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/1990/2062/1/00118135", "title": "Wing representation for rigid 3D objects", "doi": null, "abstractUrl": "/proceedings-article/icpr/1990/00118135/12OmNAXxX7c", "parentPublication": { "id": "proceedings/icpr/1990/2062/1", "title": "Proceedings 10th International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/1999/0293/0/02930188", "title": "Adaptive Parameterization for Reconstruction of 3D Freeform Objects from Laser-Scanned Data", "doi": null, "abstractUrl": "/proceedings-article/pg/1999/02930188/12OmNvjyy1f", "parentPublication": { "id": "proceedings/pg/1999/0293/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2013/2840/0/2840a969", "title": "Point-Based 3D Reconstruction of Thin Objects", "doi": null, "abstractUrl": "/proceedings-article/iccv/2013/2840a969/12OmNx7G68H", "parentPublication": { "id": "proceedings/iccv/2013/2840/0", "title": "2013 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70421024", "title": "COSMOS-a representation scheme for free-form surfaces", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70421024/12OmNy1SFHJ", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2007/3009/0/30090248", "title": "Efficient Spherical Harmonics Representation of 3D Objects", "doi": null, "abstractUrl": "/proceedings-article/pg/2007/30090248/12OmNyKJiB7", "parentPublication": { "id": "proceedings/pg/2007/3009/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2017/1032/0/1032f315", "title": "Editable Parametric Dense Foliage from 3D Capture", "doi": null, "abstractUrl": "/proceedings-article/iccv/2017/1032f315/12OmNz61du5", "parentPublication": { "id": "proceedings/iccv/2017/1032/0", "title": "2017 IEEE International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmip/2016/8940/0/8940a028", "title": "Recognition of Objects from Laser Scanned Data Points Using SVM", "doi": null, "abstractUrl": "/proceedings-article/icmip/2016/8940a028/12OmNzvhvzE", "parentPublication": { "id": "proceedings/icmip/2016/8940/0", "title": "2016 First International Conference on Multimedia and Image Processing (ICMIP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1997/10/i1115", "title": "COSMOS-A Representation Scheme for 3D Free-Form Objects", "doi": null, "abstractUrl": "/journal/tp/1997/10/i1115/13rRUwjXZKx", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1995/03/i0307", "title": "A Mechanism of Automatic 3D Object Modeling", "doi": null, "abstractUrl": "/journal/tp/1995/03/i0307/13rRUxjQyie", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09531524", "title": "GDR-Net: A Geometric Detail Recovering Network for 3D Scanned Objects", "doi": null, "abstractUrl": "/journal/tg/2022/12/09531524/1wJl1PkCw4o", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2Yv", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNwMFMki", "doi": "10.1109/VISUAL.2000.885711", "title": "Geometric Compression for Interactive Transmission", "normalizedTitle": "Geometric Compression for Interactive Transmission", "abstract": "The compression of geometric structures is a relatively new field of data compression. Since about 1995, several articles have dealt with the coding of meshes, using for most of them the following approach: the vertices of the mesh are coded in an order that partially contains the topology of the mesh. In the same time, some simple rules attempt to predict the position of each vertex from the positions of its neighbors that have been previously coded. In this article, we describe a compression algorithm whose principle is completely different: the coding order of the vertices is used to compress their coordinates, and then the topology of the mesh is reconstructed from the vertices. This algorithm achieves compression ratios that are slightly better than those of the currently available algorithms, and moreover, it allows progressive and interactive transmission of the meshes.", "abstracts": [ { "abstractType": "Regular", "content": "The compression of geometric structures is a relatively new field of data compression. Since about 1995, several articles have dealt with the coding of meshes, using for most of them the following approach: the vertices of the mesh are coded in an order that partially contains the topology of the mesh. In the same time, some simple rules attempt to predict the position of each vertex from the positions of its neighbors that have been previously coded. In this article, we describe a compression algorithm whose principle is completely different: the coding order of the vertices is used to compress their coordinates, and then the topology of the mesh is reconstructed from the vertices. This algorithm achieves compression ratios that are slightly better than those of the currently available algorithms, and moreover, it allows progressive and interactive transmission of the meshes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The compression of geometric structures is a relatively new field of data compression. Since about 1995, several articles have dealt with the coding of meshes, using for most of them the following approach: the vertices of the mesh are coded in an order that partially contains the topology of the mesh. In the same time, some simple rules attempt to predict the position of each vertex from the positions of its neighbors that have been previously coded. In this article, we describe a compression algorithm whose principle is completely different: the coding order of the vertices is used to compress their coordinates, and then the topology of the mesh is reconstructed from the vertices. This algorithm achieves compression ratios that are slightly better than those of the currently available algorithms, and moreover, it allows progressive and interactive transmission of the meshes.", "fno": "64780057", "keywords": [ "Geometry", "Compression", "Coding", "Interactivity", "Mesh", "Reconstruction", "Terrain Models" ], "authors": [ { "affiliation": "INRIA, Sophia Antipolis Cedex", "fullName": "Olivier Devillers", "givenName": "Olivier", "surname": "Devillers", "__typename": "ArticleAuthorType" }, { "affiliation": "INRIA, Sophia Antipolis Cedex", "fullName": "Pierre-Marie Gandoin", "givenName": "Pierre-Marie", "surname": "Gandoin", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-10-01T00:00:00", "pubType": "proceedings", "pages": "57", "year": "2000", "issn": "1070-2385", "isbn": "0-7803-6478-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00885744", "articleId": "1h0P72Eb636", "__typename": "AdjacentArticleType" }, "next": { "fno": "64780058", "articleId": "12OmNzlD9ll", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dcc/2007/2791/0/27910391", "title": "Data Hiding based Compression Mechanism for 3D Models", "doi": null, "abstractUrl": "/proceedings-article/dcc/2007/27910391/12OmNA0dMRT", "parentPublication": { "id": "proceedings/dcc/2007/2791/0", "title": "2007 Data Compression Conference (DCC'07)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ipps/1995/7074/0/70740418", "title": "Geometric mesh partitioning: implementation and experiments", "doi": null, "abstractUrl": "/proceedings-article/ipps/1995/70740418/12OmNANTAyk", "parentPublication": { "id": "proceedings/ipps/1995/7074/0", "title": "Proceedings of 9th International Parallel Processing Symposium", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pg/2000/0868/0/08680408", "title": "Progressive Geometry Compression for Meshes", "doi": null, "abstractUrl": "/proceedings-article/pg/2000/08680408/12OmNAWYKFX", "parentPublication": { "id": "proceedings/pg/2000/0868/0", "title": "Computer Graphics and Applications, Pacific Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498isenburg", "title": "Compressing Polygon Mesh Geometry with Parallelogram Prediction", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498isenburg/12OmNroijmR", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/1999/5897/0/58970012", "title": "Efficient Compression of Non-Manifold Polygonal Meshes", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/1999/58970012/12OmNvlg8mc", "parentPublication": { "id": "proceedings/ieee-vis/1999/5897/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sibgrapi/2005/2389/0/23890249", "title": "GEncode: Geometry-Driven Compression in Arbitrary Dimension and Co-Dimension", "doi": null, "abstractUrl": "/proceedings-article/sibgrapi/2005/23890249/12OmNxWuigb", "parentPublication": { "id": "proceedings/sibgrapi/2005/2389/0", "title": "XVIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'05)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/1999/0210/0/02100280", "title": "Triangle Mesh Compression for Fast Rendering", "doi": null, "abstractUrl": "/proceedings-article/iv/1999/02100280/12OmNyqRnhM", "parentPublication": { "id": "proceedings/iv/1999/0210/0", "title": "1999 IEEE International Conference on Information Visualization (Cat. No. PR00210)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/viz/2009/3734/0/3734a229", "title": "Progressive Geometry-Driven Compression for Triangle Mesh Based on Binary Tree", "doi": null, "abstractUrl": "/proceedings-article/viz/2009/3734a229/12OmNzuIjsc", "parentPublication": { "id": "proceedings/viz/2009/3734/0", "title": "Visualisation, International Conference in", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2000/01/v0079", "title": "Compressed Progressive Meshes", "doi": null, "abstractUrl": "/journal/tg/2000/01/v0079/13rRUwhpBNZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2009/01/ttg2009010160", "title": "Random Accessible Mesh Compression Using Mesh Chartification", "doi": null, "abstractUrl": "/journal/tg/2009/01/ttg2009010160/13rRUxlgxTf", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxE2mTP", "title": "2017 First IEEE International Conference on Robotic Computing (IRC)", "acronym": "irc", "groupId": "1819925", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNsbY6SB", "doi": "10.1109/IRC.2017.9", "title": "Control Strategy Research for a Biped Walking Robot with Flexible Ankle Joints", "normalizedTitle": "Control Strategy Research for a Biped Walking Robot with Flexible Ankle Joints", "abstract": "The traditional zero moment point (ZMP) control method is not suitable for underactuated biped robots. In this article, based on the computed torque method, the virtual constraint method and feedback linearization method are introduced into robot control to develop a joint control strategy for a biped robot with flexible ankle joints. Meanwhile, the traditional spline curve planning method of ankle joint and hip joint trajectory is no longer applicable to the biped robot. In this article, the time-invariant gait planning and gait stability of the robot are studied based on the principle of periodic walking. The effectiveness of the control strategy is verified by an experiment on the biped walking robot with flexible ankle joints.", "abstracts": [ { "abstractType": "Regular", "content": "The traditional zero moment point (ZMP) control method is not suitable for underactuated biped robots. In this article, based on the computed torque method, the virtual constraint method and feedback linearization method are introduced into robot control to develop a joint control strategy for a biped robot with flexible ankle joints. Meanwhile, the traditional spline curve planning method of ankle joint and hip joint trajectory is no longer applicable to the biped robot. In this article, the time-invariant gait planning and gait stability of the robot are studied based on the principle of periodic walking. The effectiveness of the control strategy is verified by an experiment on the biped walking robot with flexible ankle joints.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The traditional zero moment point (ZMP) control method is not suitable for underactuated biped robots. In this article, based on the computed torque method, the virtual constraint method and feedback linearization method are introduced into robot control to develop a joint control strategy for a biped robot with flexible ankle joints. Meanwhile, the traditional spline curve planning method of ankle joint and hip joint trajectory is no longer applicable to the biped robot. In this article, the time-invariant gait planning and gait stability of the robot are studied based on the principle of periodic walking. The effectiveness of the control strategy is verified by an experiment on the biped walking robot with flexible ankle joints.", "fno": "07926521", "keywords": [ "Feedback", "Gait Analysis", "Legged Locomotion", "Linearisation Techniques", "Stability", "Torque Control", "Biped Walking Robot", "Flexible Ankle Joints", "Underactuated Biped Robots", "Computed Torque Method", "Virtual Constraint Method", "Feedback Linearization Method", "Robot Control", "Joint Control Strategy", "Time Invariant Gait Planning", "Gait Stability", "Periodic Walking", "Legged Locomotion", "Mathematical Model", "Limit Cycles", "Stability Analysis", "Planning", "Robot Control", "Biped Robots", "Flexible Ankle Joints", "Control Strategy", "Gait Planning", "Gait Stability" ], "authors": [ { "affiliation": null, "fullName": "Xizhe Zang", "givenName": "Xizhe", "surname": "Zang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Zhenkun Lin", "givenName": "Zhenkun", "surname": "Lin", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yixiang Liu", "givenName": "Yixiang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xinran Sun", "givenName": "Xinran", "surname": "Sun", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jie Zhao", "givenName": "Jie", "surname": "Zhao", "__typename": "ArticleAuthorType" } ], "idPrefix": "irc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "93-96", "year": "2017", "issn": null, "isbn": "978-1-5090-6724-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07926520", "articleId": "12OmNzZEAvO", "__typename": "AdjacentArticleType" }, "next": { "fno": "07926522", "articleId": "12OmNCwCLqN", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/robot/1991/2163/0/00131936", "title": "Biped gait transitions", "doi": null, "abstractUrl": "/proceedings-article/robot/1991/00131936/12OmNAS9zt7", "parentPublication": { "id": "proceedings/robot/1991/2163/0", "title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cca/2000/6562/0/00897393", "title": "Constant torque walking", "doi": null, "abstractUrl": "/proceedings-article/cca/2000/00897393/12OmNAs2trp", "parentPublication": { "id": "proceedings/cca/2000/6562/0", "title": "Proceedings of the 2000 IEEE International Conference on Control Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/3/4296e314", "title": "Some Results on the Study of 3d Biped Robot", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296e314/12OmNBh8gQu", "parentPublication": { "id": "proceedings/icmtma/2011/4296/3", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535a763", "title": "A Neuro Fuzzy-Based Gait Trajectory Generator for a Biped Robot Using Kinect Data", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a763/12OmNwcUk2S", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isic/1988/2012/0/00065480", "title": "Control of a 5-link biped robot for steady walking", "doi": null, "abstractUrl": "/proceedings-article/isic/1988/00065480/12OmNwlZu39", "parentPublication": { "id": "proceedings/isic/1988/2012/0", "title": "Proceedings 1988 IEEE International Symposium on Intelligent Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/5/00914689", "title": "Walking of a biped robot with compliant ankle joints: implementation with KUBCA", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00914689/12OmNwwd2Re", "parentPublication": { "id": "proceedings/cdc/2000/6638/5", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/robot/1989/1938/0/00100205", "title": "Powered flight, child's play, silly wheels and walking machines", "doi": null, "abstractUrl": "/proceedings-article/robot/1989/00100205/12OmNy68EEZ", "parentPublication": { "id": "proceedings/robot/1989/1938/0", "title": "1989 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijsis/1996/7728/0/77280109", "title": "Adaptive network based fuzzy control of a dynamic biped walking robot", "doi": null, "abstractUrl": "/proceedings-article/ijsis/1996/77280109/12OmNzRqdJ8", "parentPublication": { "id": "proceedings/ijsis/1996/7728/0", "title": "Intelligence and Systems, IEEE International Joint Symposia on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/case/2012/0430/0/06386470", "title": "Walking pattern generation based on energy function and inverse pendulum model for biped robot", "doi": null, "abstractUrl": "/proceedings-article/case/2012/06386470/12OmNzcxZ9h", "parentPublication": { "id": "proceedings/case/2012/0430/0", "title": "2012 IEEE International Conference on Automation Science and Engineering (CASE 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichci/2021/0764/0/076400a322", "title": "Importance of compliant joints in below-knee exoskeletons for improving walking", "doi": null, "abstractUrl": "/proceedings-article/ichci/2021/076400a322/1Bb0O4Kvy6s", "parentPublication": { "id": "proceedings/ichci/2021/0764/0", "title": "2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqFJhOR", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "acronym": "cdc", "groupId": "1000188", "volume": "5", "displayVolume": "5", "year": "2000", "__typename": "ProceedingType" }, "article": { "id": "12OmNwwd2Re", "doi": "10.1109/CDC.2001.914689", "title": "Walking of a biped robot with compliant ankle joints: implementation with KUBCA", "normalizedTitle": "Walking of a biped robot with compliant ankle joints: implementation with KUBCA", "abstract": "Presents a compliant ankle mechanism and its implementation for a biped robot without actuators for the ankle joints. Ankle joints have been built using springs and mechanical constraints, which give a flexibility of joint within a predefined range and stiffness beyond the range. The biped with compliant ankles proposed makes foot landing easy, and weight and cost of legs are also reduced. The cost of the advantages is that the control problem becomes more difficult because the control torque of the ankle joint to put the biped in a desired walking gait can not be provided from the compliant ankle joint. To overcome this problem, we propose a pseudo static walking gait with dynamic gait modification method by adjusting the position of a hip joint. Experimental results with the biped KUBCA are given to show the validity of the proposed controller.", "abstracts": [ { "abstractType": "Regular", "content": "Presents a compliant ankle mechanism and its implementation for a biped robot without actuators for the ankle joints. Ankle joints have been built using springs and mechanical constraints, which give a flexibility of joint within a predefined range and stiffness beyond the range. The biped with compliant ankles proposed makes foot landing easy, and weight and cost of legs are also reduced. The cost of the advantages is that the control problem becomes more difficult because the control torque of the ankle joint to put the biped in a desired walking gait can not be provided from the compliant ankle joint. To overcome this problem, we propose a pseudo static walking gait with dynamic gait modification method by adjusting the position of a hip joint. Experimental results with the biped KUBCA are given to show the validity of the proposed controller.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Presents a compliant ankle mechanism and its implementation for a biped robot without actuators for the ankle joints. Ankle joints have been built using springs and mechanical constraints, which give a flexibility of joint within a predefined range and stiffness beyond the range. The biped with compliant ankles proposed makes foot landing easy, and weight and cost of legs are also reduced. The cost of the advantages is that the control problem becomes more difficult because the control torque of the ankle joint to put the biped in a desired walking gait can not be provided from the compliant ankle joint. To overcome this problem, we propose a pseudo static walking gait with dynamic gait modification method by adjusting the position of a hip joint. Experimental results with the biped KUBCA are given to show the validity of the proposed controller.", "fno": "00914689", "keywords": [ "Legged Locomotion", "Position Control", "Feedback", "Biped Robot", "Compliant Ankle Joints", "KUBCA", "Springs", "Mechanical Constraints", "Foot Landing", "Control Torque", "Pseudo Static Walking Gait", "Dynamic Gait Modification Method", "Hip Joint", "Legged Locomotion", "Humans", "Actuators", "Foot", "Costs", "Robot Sensing Systems", "Springs", "Torque Control", "Service Robots", "Mobile Robots" ], "authors": [ { "affiliation": "Dept. of Electr. Eng., Kwangwoon Univ., Seoul, South Korea", "fullName": "Keon Young Yi", "givenName": null, "surname": "Keon Young Yi", "__typename": "ArticleAuthorType" } ], "idPrefix": "cdc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2000-01-01T00:00:00", "pubType": "proceedings", "pages": "4809,4810,4811,4812,4813,4814", "year": "2000", "issn": "0191-2216", "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00914688", "articleId": "12OmNwcCIXt", "__typename": "AdjacentArticleType" }, "next": { "fno": "00914690", "articleId": "12OmNAqkSEs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/robot/1991/2163/0/00131936", "title": "Biped gait transitions", "doi": null, "abstractUrl": "/proceedings-article/robot/1991/00131936/12OmNAS9zt7", "parentPublication": { "id": "proceedings/robot/1991/2163/0", "title": "Proceedings. 1991 IEEE International Conference on Robotics and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cca/2000/6562/0/00897393", "title": "Constant torque walking", "doi": null, "abstractUrl": "/proceedings-article/cca/2000/00897393/12OmNAs2trp", "parentPublication": { "id": "proceedings/cca/2000/6562/0", "title": "Proceedings of the 2000 IEEE International Conference on Control Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2017/6724/0/07926521", "title": "Control Strategy Research for a Biped Walking Robot with Flexible Ankle Joints", "doi": null, "abstractUrl": "/proceedings-article/irc/2017/07926521/12OmNsbY6SB", "parentPublication": { "id": "proceedings/irc/2017/6724/0", "title": "2017 First IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535a763", "title": "A Neuro Fuzzy-Based Gait Trajectory Generator for a Biped Robot Using Kinect Data", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a763/12OmNwcUk2S", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2016/2239/0/07515880", "title": "A novel fuzzy omni-directional gait planning algorithm for biped robot", "doi": null, "abstractUrl": "/proceedings-article/snpd/2016/07515880/12OmNx19k00", "parentPublication": { "id": "proceedings/snpd/2016/2239/0", "title": "2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/med/2006/1/0/04124877", "title": "Observer-based control for absolute orientation estimation of a five-link walking biped robot", "doi": null, "abstractUrl": "/proceedings-article/med/2006/04124877/12OmNz5JBNP", "parentPublication": { "id": "proceedings/med/2006/1/0", "title": "Proceedings of the 14th Mediterranean Conference on Control and Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icarsc/2016/2255/0/07781954", "title": "Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx)", "doi": null, "abstractUrl": "/proceedings-article/icarsc/2016/07781954/12OmNzBwGEx", "parentPublication": { "id": "proceedings/icarsc/2016/2255/0", "title": "2016 International Conference on Autonomous Robot Systems and Competitions (ICARSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ijsis/1996/7728/0/77280109", "title": "Adaptive network based fuzzy control of a dynamic biped walking robot", "doi": null, "abstractUrl": "/proceedings-article/ijsis/1996/77280109/12OmNzRqdJ8", "parentPublication": { "id": "proceedings/ijsis/1996/7728/0", "title": "Intelligence and Systems, IEEE International Joint Symposia on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichci/2021/0764/0/076400a322", "title": "Importance of compliant joints in below-knee exoskeletons for improving walking", "doi": null, "abstractUrl": "/proceedings-article/ichci/2021/076400a322/1Bb0O4Kvy6s", "parentPublication": { "id": "proceedings/ichci/2021/0764/0", "title": "2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc-2018/2018/7738/0/773800a083", "title": "Design of Mechanism and Control System for a Lightweight Lower Limb Exoskeleton", "doi": null, "abstractUrl": "/proceedings-article/crc-2018/2018/773800a083/1cJ7cw9zWh2", "parentPublication": { "id": "proceedings/crc-2018/2018/7738/0", "title": "2018 3rd International Conference on Control, Robotics and Cybernetics (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18M7cVguDNm", "title": "2019 Third IEEE International Conference on Robotic Computing (IRC)", "acronym": "irc", "groupId": "1819925", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "18M7ixxaQr6", "doi": "10.1109/IRC.2019.00054", "title": "A Bio-Inspired Musculoskeletal Model of the Lower Limb for Energy Economical Bipedal Walking", "normalizedTitle": "A Bio-Inspired Musculoskeletal Model of the Lower Limb for Energy Economical Bipedal Walking", "abstract": "This paper aims to transfer the properties of passive dynamics to fully actuated humanoid robots in order to reduce their energy cost while preserving their versatility. To achieve this purpose, muscle-actuated walking simulation which can offer insights into the actions of muscles during walking is performed in the open-source software OpenSim. The contributions of major muscles of the lower limb to body propulsion and support during walking are analyzed. The analysis indicates that for normal walking, hip flexor, hip extensor, knee extensor, and ankle plantar flexor are the most important contributors in providing propulsion and support, whereas knee flexor and ankle dorsiflexor play a very small role. On this basis, a new twodimensional musculoskeletal model of the lower limb is proposed by replacing the muscles that contribute little to walking with passive elastic elements. In the model, the hip joint is actuated by a pair of Hill-type muscles, while the knee and ankle joints are antagonistically actuated by muscle and spring. The effectiveness of the proposed model in realizing economical bipedal walking is demonstrated by simulation.", "abstracts": [ { "abstractType": "Regular", "content": "This paper aims to transfer the properties of passive dynamics to fully actuated humanoid robots in order to reduce their energy cost while preserving their versatility. To achieve this purpose, muscle-actuated walking simulation which can offer insights into the actions of muscles during walking is performed in the open-source software OpenSim. The contributions of major muscles of the lower limb to body propulsion and support during walking are analyzed. The analysis indicates that for normal walking, hip flexor, hip extensor, knee extensor, and ankle plantar flexor are the most important contributors in providing propulsion and support, whereas knee flexor and ankle dorsiflexor play a very small role. On this basis, a new twodimensional musculoskeletal model of the lower limb is proposed by replacing the muscles that contribute little to walking with passive elastic elements. In the model, the hip joint is actuated by a pair of Hill-type muscles, while the knee and ankle joints are antagonistically actuated by muscle and spring. The effectiveness of the proposed model in realizing economical bipedal walking is demonstrated by simulation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper aims to transfer the properties of passive dynamics to fully actuated humanoid robots in order to reduce their energy cost while preserving their versatility. To achieve this purpose, muscle-actuated walking simulation which can offer insights into the actions of muscles during walking is performed in the open-source software OpenSim. The contributions of major muscles of the lower limb to body propulsion and support during walking are analyzed. The analysis indicates that for normal walking, hip flexor, hip extensor, knee extensor, and ankle plantar flexor are the most important contributors in providing propulsion and support, whereas knee flexor and ankle dorsiflexor play a very small role. On this basis, a new twodimensional musculoskeletal model of the lower limb is proposed by replacing the muscles that contribute little to walking with passive elastic elements. In the model, the hip joint is actuated by a pair of Hill-type muscles, while the knee and ankle joints are antagonistically actuated by muscle and spring. The effectiveness of the proposed model in realizing economical bipedal walking is demonstrated by simulation.", "fno": "924500a288", "keywords": [ "Gait Analysis", "Humanoid Robots", "Medical Robotics", "Muscle", "Orthopaedics", "Physiological Models", "Bio Inspired Musculoskeletal Model", "Lower Limb", "Energy Economical Bipedal Walking", "Humanoid Robots", "Muscle Actuated Walking Simulation", "Body Propulsion", "Hip Flexor", "Hip Extensor", "Knee Extensor", "Ankle Plantar Flexor", "Knee Flexor", "Hip Joint", "Hill Type Muscles", "Ankle Joints", "Open Source Software", "Ankle Dorsiflexor", "2 D Musculoskeletal Model", "Open Sim", "Legged Locomotion", "Muscles", "Knee", "Hip", "Acceleration", "Bipedal Walking", "Muscle Function", "Musculoskeletal Model", "Passive Dynamics", "Energy Economical Walking" ], "authors": [ { "affiliation": null, "fullName": "Yixiang Liu", "givenName": "Yixiang", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xizhe Zang", "givenName": "Xizhe", "surname": "Zang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Chao Wang", "givenName": "Chao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yubin Liu", "givenName": "Yubin", "surname": "Liu", "__typename": "ArticleAuthorType" } ], "idPrefix": "irc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-02-01T00:00:00", "pubType": "proceedings", "pages": "288-292", "year": "2019", "issn": null, "isbn": "978-1-5386-9245-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "924500a282", "articleId": "18M7iWKV20w", "__typename": "AdjacentArticleType" }, "next": { "fno": "924500a293", "articleId": "18M7erodQXK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmssp/2016/4519/0/07946040", "title": "3D Quasi-Passive Walker of Bipedal Robot with Flat Feet Gait Analysis of 3D Quasi-Passive Walking", "doi": null, "abstractUrl": "/proceedings-article/icmssp/2016/07946040/12OmNvmG7ZQ", "parentPublication": { "id": "proceedings/icmssp/2016/4519/0", "title": "2016 International Conference on Multimedia Systems and Signal Processing (ICMSSP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2016/8692/0/07501310", "title": "Fuzzy PID control of lower limb exoskeleton for elderly mobility", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2016/07501310/12OmNvqmUGb", "parentPublication": { "id": "proceedings/aqtr/2016/8692/0", "title": "2016 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2017/2434/0/2434a164", "title": "A Study of Exoskeleton Walking Aids Device", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2017/2434a164/12OmNxdVgTa", "parentPublication": { "id": "proceedings/iciicii/2017/2434/0", "title": "2017 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icccnt/2014/2696/0/06963121", "title": "Design and fabrication of bipedal robot", "doi": null, "abstractUrl": "/proceedings-article/icccnt/2014/06963121/12OmNylbouN", "parentPublication": { "id": "proceedings/icccnt/2014/2696/0", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icarsc/2016/2255/0/07781954", "title": "Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx)", "doi": null, "abstractUrl": "/proceedings-article/icarsc/2016/07781954/12OmNzBwGEx", "parentPublication": { "id": "proceedings/icarsc/2016/2255/0", "title": "2016 International Conference on Autonomous Robot Systems and Competitions (ICARSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hbdss/2021/2188/0/218800a060", "title": "Isokinetic strength training improves motor function in a Chinese classical dancer with knee injury: a case report", "doi": null, "abstractUrl": "/proceedings-article/hbdss/2021/218800a060/1AqwQMWd0Ag", "parentPublication": { "id": "proceedings/hbdss/2021/2188/0", "title": "2021 International Conference on Health Big Data and Smart Sports (HBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hbdss/2021/2188/0/218800a268", "title": "Research on Lower Limb Motion Characteristics of Oblique Stride on &#x201C;Euro Step&#x201D; Layup Based on Intelligent Motion Capture System", "doi": null, "abstractUrl": "/proceedings-article/hbdss/2021/218800a268/1AqwSHB6zOo", "parentPublication": { "id": "proceedings/hbdss/2021/2188/0", "title": "2021 International Conference on Health Big Data and Smart Sports (HBDSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismii/2021/1290/0/129000a070", "title": "Research on Promotion of Lower Limb Movement Function Recovery after Stroke by Using Lower Limb Rehabilitation Robot in Combination with Constant Velocity Muscle Strength Training", "doi": null, "abstractUrl": "/proceedings-article/ismii/2021/129000a070/1sZ2L7YVSCs", "parentPublication": { "id": "proceedings/ismii/2021/1290/0", "title": "2021 7th International Symposium on Mechatronics and Industrial Informatics (ISMII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09535237", "title": "Haptic Ankle Platform for Interactive Walking in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09535237/1wMEPqxIx9u", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdh/2021/1685/0/168500a315", "title": "Use of Musculoskeletal Modeling to Examine Lower Limb Muscle Contribution to Gait Balance Control: Effects of Overweight", "doi": null, "abstractUrl": "/proceedings-article/icdh/2021/168500a315/1ymJfvjWO1W", "parentPublication": { "id": "proceedings/icdh/2021/1685/0", "title": "2021 IEEE International Conference on Digital Health (ICDH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Bb0NEOLxn2", "title": "2021 2nd International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)", "acronym": "ichci", "groupId": "1841325", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1Bb0O4Kvy6s", "doi": "10.1109/ICHCI54629.2021.00072", "title": "Importance of compliant joints in below-knee exoskeletons for improving walking", "normalizedTitle": "Importance of compliant joints in below-knee exoskeletons for improving walking", "abstract": "This paper evaluated an exoskeleton with compliant joints containing a toe joint. The ankle and toe joints were driven by two series elastic of actuators that can provide maximal push-off power. Firstly, the Human walking experiments were conducted for exploring the effects of the toe joint on providing power and keeping the gait balanced. Secondly, based on a theoretical model and computations, a compliant exoskeleton with a toe joint was designed for those whose ankle is not powerful enough for walking. Because of the impedance control, the exoskeleton was controlled to either follow or guide a person. Finally, an experiment with one person whose ankle could not provide enough power for supporting walking was conducted, and the results validated the effectiveness of the toe joint containing compliant actuators during walking.", "abstracts": [ { "abstractType": "Regular", "content": "This paper evaluated an exoskeleton with compliant joints containing a toe joint. The ankle and toe joints were driven by two series elastic of actuators that can provide maximal push-off power. Firstly, the Human walking experiments were conducted for exploring the effects of the toe joint on providing power and keeping the gait balanced. Secondly, based on a theoretical model and computations, a compliant exoskeleton with a toe joint was designed for those whose ankle is not powerful enough for walking. Because of the impedance control, the exoskeleton was controlled to either follow or guide a person. Finally, an experiment with one person whose ankle could not provide enough power for supporting walking was conducted, and the results validated the effectiveness of the toe joint containing compliant actuators during walking.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper evaluated an exoskeleton with compliant joints containing a toe joint. The ankle and toe joints were driven by two series elastic of actuators that can provide maximal push-off power. Firstly, the Human walking experiments were conducted for exploring the effects of the toe joint on providing power and keeping the gait balanced. Secondly, based on a theoretical model and computations, a compliant exoskeleton with a toe joint was designed for those whose ankle is not powerful enough for walking. Because of the impedance control, the exoskeleton was controlled to either follow or guide a person. Finally, an experiment with one person whose ankle could not provide enough power for supporting walking was conducted, and the results validated the effectiveness of the toe joint containing compliant actuators during walking.", "fno": "076400a322", "keywords": [ "Actuators", "Biomechanics", "Elasticity", "Gait Analysis", "Legged Locomotion", "Medical Robotics", "Motion Control", "Patient Rehabilitation", "Ankle", "Toe Joint", "Compliant Joints", "Human Walking Experiments", "Compliant Exoskeleton", "Legged Locomotion", "Human Computer Interaction", "Actuators", "Energy Consumption", "Costs", "Computational Modeling", "Exoskeletons", "Exoskeleton", "Toe Joint", "Compliant Joint", "Series Elastic Actuator" ], "authors": [ { "affiliation": "School of Mechatronical Engineering, Beijing Institute of Technology,Beijing,China,100081", "fullName": "Haotian She", "givenName": "Haotian", "surname": "She", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Advanced Innovation Center for Intelligent Robot and System,Beijing,China,100081", "fullName": "Yan Zhao", "givenName": "Yan", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing University of Technology,Faculty of Information Technology,Beijing,China,100124", "fullName": "Gao Huang", "givenName": "Gao", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Advanced Innovation Center for Intelligent Robot and System,Beijing,China,100081", "fullName": "Jinying Zhu", "givenName": "Jinying", "surname": "Zhu", "__typename": "ArticleAuthorType" } ], "idPrefix": "ichci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-11-01T00:00:00", "pubType": "proceedings", "pages": "322-325", "year": "2021", "issn": null, "isbn": "978-1-6654-0764-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "076400a318", "articleId": "1Bb0TEIYIzS", "__typename": "AdjacentArticleType" }, "next": { "fno": "076400a326", "articleId": "1Bb0YwiE1BC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ic3/2014/5172/0/06897178", "title": "Trajectory generation for myoelectrically controlled lower limb active knee exoskeleton", "doi": null, "abstractUrl": "/proceedings-article/ic3/2014/06897178/12OmNBDyA7R", "parentPublication": { "id": "proceedings/ic3/2014/5172/0", "title": "2014 Seventh International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2018/2205/0/08402732", "title": "A leg exoskeleton command unit for human walking rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2018/08402732/12OmNCcKQN2", "parentPublication": { "id": "proceedings/aqtr/2018/2205/0", "title": "2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2017/6724/0/07926521", "title": "Control Strategy Research for a Biped Walking Robot with Flexible Ankle Joints", "doi": null, "abstractUrl": "/proceedings-article/irc/2017/07926521/12OmNsbY6SB", "parentPublication": { "id": "proceedings/irc/2017/6724/0", "title": "2017 First IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aqtr/2016/8692/0/07501306", "title": "Exoskeleton for children walking rehabilitation: Theoretical studies and simulation", "doi": null, "abstractUrl": "/proceedings-article/aqtr/2016/07501306/12OmNwGIcBl", "parentPublication": { "id": "proceedings/aqtr/2016/8692/0", "title": "2016 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cdc/2000/6638/5/00914689", "title": "Walking of a biped robot with compliant ankle joints: implementation with KUBCA", "doi": null, "abstractUrl": "/proceedings-article/cdc/2000/00914689/12OmNwwd2Re", "parentPublication": { "id": "proceedings/cdc/2000/6638/5", "title": "Proceedings of the 39th IEEE Conference on Decision and Control", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2016/2535/0/2535a923", "title": "Design of a Novel All Terrains Wearable Vehicle", "doi": null, "abstractUrl": "/proceedings-article/icisce/2016/2535a923/12OmNx6xHto", "parentPublication": { "id": "proceedings/icisce/2016/2535/0", "title": "2016 3rd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2017/2434/0/2434a164", "title": "A Study of Exoskeleton Walking Aids Device", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2017/2434a164/12OmNxdVgTa", "parentPublication": { "id": "proceedings/iciicii/2017/2434/0", "title": "2017 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icarsc/2016/2255/0/07781954", "title": "Mechanical Design of a Biomimetic Compliant Lower Limb Exoskeleton (BioComEx)", "doi": null, "abstractUrl": "/proceedings-article/icarsc/2016/07781954/12OmNzBwGEx", "parentPublication": { "id": "proceedings/icarsc/2016/2255/0", "title": "2016 International Conference on Autonomous Robot Systems and Competitions (ICARSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibe/2020/9574/0/957400a830", "title": "Vision-Based Autonomous Walking in a Lower-Limb Powered Exoskeleton", "doi": null, "abstractUrl": "/proceedings-article/bibe/2020/957400a830/1pBMn9swlOM", "parentPublication": { "id": "proceedings/bibe/2020/9574/0", "title": "2020 IEEE 20th International Conference on Bioinformatics and Bioengineering (BIBE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoias/2021/4195/0/419500a385", "title": "Research of Fuzzy PID Control for Lower Limb Wearable Exoskeleton Robot", "doi": null, "abstractUrl": "/proceedings-article/icoias/2021/419500a385/1wG6fTPZHpu", "parentPublication": { "id": "proceedings/icoias/2021/4195/0", "title": "2021 4th International Conference on Intelligent Autonomous Systems (ICoIAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jIxhEnA8IE", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jIxqW7cHTO", "doi": "10.1109/VRW50115.2020.00059", "title": "Can We Give Seated Users in Virtual Reality the Sensation of Standing or Even Walking? Do We Want To?", "normalizedTitle": "Can We Give Seated Users in Virtual Reality the Sensation of Standing or Even Walking? Do We Want To?", "abstract": "VR is often experienced in a seated position, similar to 3D video games, that almost exclusively are. The reasons for this are diverse and can go beyond just being more comfortable [18]. Interestingly, even when users are physically seated, often designers try to simulate standing and moving experiences, using head-bobbing and other ways to make users believe they are walking. Does this actually work? Can we get seated users to believe they are standing, walking, or even running? Moreover, is trying to provide the illusion of being standing or moving while being seated even relevant and helpful? Does it improve user experience or performance? Or might it be more effective just to be &#x201D;honest&#x201D; and ensure that the virtual locomotion metaphor matches the users&#x2019; physical posture? In this extended abstract, we aim to explore these little-researched questions and analyze different situations and scenarios, hoping to help motivate future research and discussion on this topic.", "abstracts": [ { "abstractType": "Regular", "content": "VR is often experienced in a seated position, similar to 3D video games, that almost exclusively are. The reasons for this are diverse and can go beyond just being more comfortable [18]. Interestingly, even when users are physically seated, often designers try to simulate standing and moving experiences, using head-bobbing and other ways to make users believe they are walking. Does this actually work? Can we get seated users to believe they are standing, walking, or even running? Moreover, is trying to provide the illusion of being standing or moving while being seated even relevant and helpful? Does it improve user experience or performance? Or might it be more effective just to be &#x201D;honest&#x201D; and ensure that the virtual locomotion metaphor matches the users&#x2019; physical posture? In this extended abstract, we aim to explore these little-researched questions and analyze different situations and scenarios, hoping to help motivate future research and discussion on this topic.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "VR is often experienced in a seated position, similar to 3D video games, that almost exclusively are. The reasons for this are diverse and can go beyond just being more comfortable [18]. Interestingly, even when users are physically seated, often designers try to simulate standing and moving experiences, using head-bobbing and other ways to make users believe they are walking. Does this actually work? Can we get seated users to believe they are standing, walking, or even running? Moreover, is trying to provide the illusion of being standing or moving while being seated even relevant and helpful? Does it improve user experience or performance? Or might it be more effective just to be ”honest” and ensure that the virtual locomotion metaphor matches the users’ physical posture? In this extended abstract, we aim to explore these little-researched questions and analyze different situations and scenarios, hoping to help motivate future research and discussion on this topic.", "fno": "09090555", "keywords": [ "Legged Locomotion", "Virtual Reality", "Games", "Wheelchairs", "Switches", "Visualization", "Vibrations" ], "authors": [ { "affiliation": "Human-Computer Interaction University of Trier,Germany", "fullName": "Daniel Zielasko", "givenName": "Daniel", "surname": "Zielasko", "__typename": "ArticleAuthorType" }, { "affiliation": "Simon Fraser University,School of Interactive Arts and Technology,Canada", "fullName": "Bernhard E. Riecke", "givenName": "Bernhard E.", "surname": "Riecke", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "281-282", "year": "2020", "issn": null, "isbn": "978-1-7281-6532-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09090421", "articleId": "1jIxr9dj52o", "__typename": "AdjacentArticleType" }, "next": { "fno": "09090560", "articleId": "1jIxzjmEoeY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2012/1204/0/06184179", "title": "The King-Kong Effects: Improving sensation of walking in VR with visual and tactile vibrations at each step", "doi": null, "abstractUrl": "/proceedings-article/3dui/2012/06184179/12OmNwEJ0Lv", "parentPublication": { "id": "proceedings/3dui/2012/1204/0", "title": "2012 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223390", "title": "Third person's footsteps enhanced moving sensation of seated person", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223390/12OmNxFsmDI", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/04/08267106", "title": "Force Rendering and its Evaluation of a Friction-Based Walking Sensation Display for a Seated User", "doi": null, "abstractUrl": "/journal/tg/2018/04/08267106/13rRUwIF6dW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09736631", "title": "On Rotation Gains Within and Beyond Perceptual Limitations for Seated VR", "doi": null, "abstractUrl": "/journal/tg/5555/01/09736631/1BN1UtLinTi", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09744001", "title": "Influence of user posture and virtual exercise on impression of locomotion during VR observation", "doi": null, "abstractUrl": "/journal/tg/5555/01/09744001/1C8BFV420lq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090453", "title": "Perception of Walking Self-body Avatar Enhances Virtual-walking Sensation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090453/1jIxoojmMy4", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090577", "title": "Resizing of the peripersonal space for the seated for different step frequencies of vibrations at the soles", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090577/1jIxp3AAdhK", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a346", "title": "Spring Stepper: A Seated VR Locomotion Controller", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a346/1oZBBswUSzK", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a395", "title": "Is Walking Necessary for Effective Locomotion and Interaction in VR?", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a395/1tnXRY815xS", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a064", "title": "A Short Description of an Ankle-Actuated Seated VR Locomotion Interface", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a064/1tnXf67lAWs", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tnWwqMuCzu", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tnXf67lAWs", "doi": "10.1109/VRW52623.2021.00018", "title": "A Short Description of an Ankle-Actuated Seated VR Locomotion Interface", "normalizedTitle": "A Short Description of an Ankle-Actuated Seated VR Locomotion Interface", "abstract": "We present an overview of the interface that allows users to perform foot-tapping movements in a seated posture to emulate walking sensation in virtual reality (VR). The interface comprises an impedance controlled robotic foot platform that moves while resisting the user's foot-tapping movements. The platform's angular movement is used to recognize the walking intention of the user and animate the VR avatar accordingly. The impedance characteristics of the platform are controlled to emulate different VR walking terrains.", "abstracts": [ { "abstractType": "Regular", "content": "We present an overview of the interface that allows users to perform foot-tapping movements in a seated posture to emulate walking sensation in virtual reality (VR). The interface comprises an impedance controlled robotic foot platform that moves while resisting the user's foot-tapping movements. The platform's angular movement is used to recognize the walking intention of the user and animate the VR avatar accordingly. The impedance characteristics of the platform are controlled to emulate different VR walking terrains.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present an overview of the interface that allows users to perform foot-tapping movements in a seated posture to emulate walking sensation in virtual reality (VR). The interface comprises an impedance controlled robotic foot platform that moves while resisting the user's foot-tapping movements. The platform's angular movement is used to recognize the walking intention of the user and animate the VR avatar accordingly. The impedance characteristics of the platform are controlled to emulate different VR walking terrains.", "fno": "405700a064", "keywords": [ "Actuators", "Avatars", "Computer Animation", "Ergonomics", "Gait Analysis", "Legged Locomotion", "Medical Computing", "User Interfaces", "Ankle Actuated Seated VR Locomotion Interface", "Foot Tapping Movements", "Seated Posture", "Walking Sensation", "Virtual Reality", "Robotic Foot Platform", "Angular Movement", "Walking Intention", "Animate", "VR Avatar", "VR Walking Terrains", "Impedance Controlled Robotic Foot Platform", "Legged Locomotion", "Three Dimensional Displays", "Cybersickness", "Conferences", "Avatars", "User Interfaces", "Robot Sensing Systems", "Human Centered Computing", "Human Computer Interaction HCI", "Interaction Paradigms", "Virtual Reality", "Interaction Devices", "Haptic Devices" ], "authors": [ { "affiliation": "Queen Mary University of London,School of Electronic Engineering and Computer Science", "fullName": "Ata Otaran", "givenName": "Ata", "surname": "Otaran", "__typename": "ArticleAuthorType" }, { "affiliation": "Queen Mary University of London,School of Electronic Engineering and Computer Science", "fullName": "Ildar Farkhatdinov", "givenName": "Ildar", "surname": "Farkhatdinov", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "64-66", "year": "2021", "issn": null, "isbn": "978-1-6654-4057-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1tnXeKIkRQQ", "name": "pvrw202140570-09419289s1-mm_405700a064.zip", "size": "57.1 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvrw202140570-09419289s1-mm_405700a064.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "405700a060", "articleId": "1tnWM3NlU8E", "__typename": "AdjacentArticleType" }, "next": { "fno": "405700a067", "articleId": "1tnWChd88wM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892348", "title": "Steering locomotion by vestibular perturbation in room-scale VR", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892348/12OmNvrMUgU", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223390", "title": "Third person's footsteps enhanced moving sensation of seated person", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223390/12OmNxFsmDI", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09744001", "title": "Influence of user posture and virtual exercise on impression of locomotion during VR observation", "doi": null, "abstractUrl": "/journal/tg/5555/01/09744001/1C8BFV420lq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a222", "title": "Design and Evaluation of Travel and Orientation Techniques for Desk VR", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a222/1CJc05Lu2LS", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a493", "title": "Eye Tracking-based LSTM for Locomotion Prediction in VR", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a493/1CJcrKWnUtO", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a696", "title": "Seamless-walk: Novel Natural Virtual Reality Locomotion Method with a High-Resolution Tactile Sensor", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a696/1CJeXaYYtd6", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090453", "title": "Perception of Walking Self-body Avatar Enhances Virtual-walking Sensation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090453/1jIxoojmMy4", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a346", "title": "Spring Stepper: A Seated VR Locomotion Controller", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a346/1oZBBswUSzK", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a438", "title": "Larger Step Faster Speed: Investigating Gesture-Amplitude-based Locomotion in Place with Different Virtual Walking Speed in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a438/1tuBuuWZCLe", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09535237", "title": "Haptic Ankle Platform for Interactive Walking in Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09535237/1wMEPqxIx9u", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzn3952", "title": "2012 5th Workshop on Software Engineering and Architectures for Realtime Interactive Systems", "acronym": "searis", "groupId": "1801605", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNrkT7GZ", "doi": "10.1109/SEARIS.2012.6231166", "title": "VR JuggLua: A framework for VR applications combining Lua, OpenSceneGraph, and VR Juggler", "normalizedTitle": "VR JuggLua: A framework for VR applications combining Lua, OpenSceneGraph, and VR Juggler", "abstract": "A gap exists between virtual reality (VR) software platforms designed for optimum hardware abstraction and cluster support, and those designed for efficient content authoring and exploration of interaction techniques through prototyping. This paper describes VR JuggLua, a high-level virtual reality application framework based on combining Lua, a dynamic, interpreted language designed for embedding and extension, with VR Juggler and OpenSceneGraph. This work allows fully-featured immersive applications to be written entirely in Lua, and also supports the embedding of the Lua engine in C++ applications. Like native C++ VR Juggler applications, VR JuggLua-based applications run successfully on systems ranging from a single desktop machine to a 49-node cluster. The osgLua introspection-based bindings facilitate scenegraph manipulation from Lua code, while bindings created using the Luabind template meta-programming library connect VR Juggler functionality. A thread-safe run buffer allows new Lua code to be passed to the interpreter during run time, supporting interactive creation of scene-graph structures. It has been successfully used in an immersive application implementing two different navigation techniques entirely in Lua and a physically-based virtual assembly simulation where C++ code handles physics computations and Lua code handles all display and configuration.", "abstracts": [ { "abstractType": "Regular", "content": "A gap exists between virtual reality (VR) software platforms designed for optimum hardware abstraction and cluster support, and those designed for efficient content authoring and exploration of interaction techniques through prototyping. This paper describes VR JuggLua, a high-level virtual reality application framework based on combining Lua, a dynamic, interpreted language designed for embedding and extension, with VR Juggler and OpenSceneGraph. This work allows fully-featured immersive applications to be written entirely in Lua, and also supports the embedding of the Lua engine in C++ applications. Like native C++ VR Juggler applications, VR JuggLua-based applications run successfully on systems ranging from a single desktop machine to a 49-node cluster. The osgLua introspection-based bindings facilitate scenegraph manipulation from Lua code, while bindings created using the Luabind template meta-programming library connect VR Juggler functionality. A thread-safe run buffer allows new Lua code to be passed to the interpreter during run time, supporting interactive creation of scene-graph structures. It has been successfully used in an immersive application implementing two different navigation techniques entirely in Lua and a physically-based virtual assembly simulation where C++ code handles physics computations and Lua code handles all display and configuration.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A gap exists between virtual reality (VR) software platforms designed for optimum hardware abstraction and cluster support, and those designed for efficient content authoring and exploration of interaction techniques through prototyping. This paper describes VR JuggLua, a high-level virtual reality application framework based on combining Lua, a dynamic, interpreted language designed for embedding and extension, with VR Juggler and OpenSceneGraph. This work allows fully-featured immersive applications to be written entirely in Lua, and also supports the embedding of the Lua engine in C++ applications. Like native C++ VR Juggler applications, VR JuggLua-based applications run successfully on systems ranging from a single desktop machine to a 49-node cluster. The osgLua introspection-based bindings facilitate scenegraph manipulation from Lua code, while bindings created using the Luabind template meta-programming library connect VR Juggler functionality. A thread-safe run buffer allows new Lua code to be passed to the interpreter during run time, supporting interactive creation of scene-graph structures. It has been successfully used in an immersive application implementing two different navigation techniques entirely in Lua and a physically-based virtual assembly simulation where C++ code handles physics computations and Lua code handles all display and configuration.", "fno": "06231166", "keywords": [ "Application Program Interfaces", "C Language", "Program Assemblers", "Program Interpreters", "Virtual Reality", "VR Jugg Lua", "Open Scene Graph", "VR Juggler", "Optimum Hardware Abstraction", "Interaction Techniques", "High Level Virtual Reality Application Framework", "Dynamic Interpreted Language", "Immersive Applications", "Lua Engine", "C Applications", "Desktop Machine", "49 Node Cluster", "Osg Lua Introspection Based Bindings", "Scene Graph Manipulation", "Lua Code", "Luabind Template Meta Programming Library", "Thread Safe Run Buffer", "Interpreter", "Run Time", "Navigation Techniques", "Physically Based Virtual Assembly Simulation", "Physics Computations", "Content Authorisation", "Virtual Reality", "Libraries", "Kernel", "Transforms", "Syntactics", "Solid Modeling", "Virtual Reality", "Software Tools", "Human Computer Interaction", "C", "Lua", "Interactivity" ], "authors": [ { "affiliation": "Human-Computer Interaction, Graduate Program, Iowa State University, USA", "fullName": "Ryan A. Pavlik", "givenName": "Ryan A.", "surname": "Pavlik", "__typename": "ArticleAuthorType" }, { "affiliation": "Virtual Reality Applications Center, Iowa State University, USA", "fullName": "Judy M. Vance", "givenName": "Judy M.", "surname": "Vance", "__typename": "ArticleAuthorType" } ], "idPrefix": "searis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-03-01T00:00:00", "pubType": "proceedings", "pages": "29-35", "year": "2012", "issn": "2328-7772", "isbn": "978-1-4673-1249-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06231177", "articleId": "12OmNwDSdi7", "__typename": "AdjacentArticleType" }, "next": { "fno": "06231167", "articleId": "12OmNAQJzOL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/svr/2012/4725/0/4725a116", "title": "From VR to AR: Adding AR Functionality to an Existing VR Software Framework", "doi": null, "abstractUrl": "/proceedings-article/svr/2012/4725a116/12OmNAYoKsE", "parentPublication": { "id": "proceedings/svr/2012/4725/0", "title": "2012 14th Symposium on Virtual and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2012/4725/0/4725a010", "title": "A VR Framework for Desktop Applications", "doi": null, "abstractUrl": "/proceedings-article/svr/2012/4725a010/12OmNBrlPwO", "parentPublication": { "id": "proceedings/svr/2012/4725/0", "title": "2012 14th Symposium on Virtual and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbac-padw/2016/4844/0/07803669", "title": "Towards a GPU Abstraction for Lua", "doi": null, "abstractUrl": "/proceedings-article/sbac-padw/2016/07803669/12OmNC2OSIs", "parentPublication": { "id": "proceedings/sbac-padw/2016/4844/0", "title": "2016 International Symposium on Computer Architecture and High-Performance Computing: Workshops (SBAC-PADW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2002/1492/0/14920273", "title": "Net Juggler: Running VR Juggler with Multiple Displays on a Commodity Component Cluster", "doi": null, "abstractUrl": "/proceedings-article/vr/2002/14920273/12OmNrY3Luv", "parentPublication": { "id": "proceedings/vr/2002/1492/0", "title": "Proceedings IEEE Virtual Reality 2002", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2001/0948/0/09480097", "title": "VjControl: An Advanced Configuration Management Tool for VR Juggler Applications", "doi": null, "abstractUrl": "/proceedings-article/vr/2001/09480097/12OmNxEBz1T", "parentPublication": { "id": "proceedings/vr/2001/0948/0", "title": "Virtual Reality Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2001/0948/0/09480089", "title": "VR Juggler: A Virtual Platform for Virtual Reality Application Development", "doi": null, "abstractUrl": "/proceedings-article/vr/2001/09480089/12OmNzV70Nv", "parentPublication": { "id": "proceedings/vr/2001/0948/0", "title": "Virtual Reality Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icekim/2022/1666/0/166600a231", "title": "Application of VR Technology in Virtual Simulation Experiment Teaching", "doi": null, "abstractUrl": "/proceedings-article/icekim/2022/166600a231/1KpBw9u2vT2", "parentPublication": { "id": "proceedings/icekim/2022/1666/0", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a243", "title": "Continuous VR Weight Illusion by Combining Adaptive Trigger Resistance and Control-Display Ratio Manipulation", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a243/1MNgyZ3pLFe", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a564", "title": "VR-Spy: A Side-Channel Attack on Virtual Key-Logging in VR Headsets", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a564/1tuBp9b29LW", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2020/0497/0/049700a346", "title": "NOBOOK VR Experiment Test", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2020/049700a346/1vg85m64iRy", "parentPublication": { "id": "proceedings/icvrv/2020/0497/0", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqBtiEH", "title": "Computer Science-Technology and Applications, International Forum on", "acronym": "ifcsta", "groupId": "1003083", "volume": "2", "displayVolume": "2", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNwoPtzS", "doi": "10.1109/IFCSTA.2009.195", "title": "Research on the Realization of Substation Virtual Equipment Based on 3D Engine", "normalizedTitle": "Research on the Realization of Substation Virtual Equipment Based on 3D Engine", "abstract": "According to training requirements that a substation virtual training scene needs substation virtual equipment with high actual sense and high interaction. This paper proposes a thought which is used to achieve substation virtual equipment by 3D engine, and then generalizes a method which contains geometrical characteristic, interactive characteristic and behavioral characteristic towards Virtual equipment achieved by 3D engine. This method uses modeling tool to construct the geometrical appearance of substation virtual equipment, takes the 3D engine VR technique as core to realize interactive characteristic and behavioral characteristic of the virtual equipment. Combining with substation the application characteristics of substation virtual equipment, the paper proposes an interactive algorithm suiting to virtual equipment to improve the interaction of virtual equipment.", "abstracts": [ { "abstractType": "Regular", "content": "According to training requirements that a substation virtual training scene needs substation virtual equipment with high actual sense and high interaction. This paper proposes a thought which is used to achieve substation virtual equipment by 3D engine, and then generalizes a method which contains geometrical characteristic, interactive characteristic and behavioral characteristic towards Virtual equipment achieved by 3D engine. This method uses modeling tool to construct the geometrical appearance of substation virtual equipment, takes the 3D engine VR technique as core to realize interactive characteristic and behavioral characteristic of the virtual equipment. Combining with substation the application characteristics of substation virtual equipment, the paper proposes an interactive algorithm suiting to virtual equipment to improve the interaction of virtual equipment.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "According to training requirements that a substation virtual training scene needs substation virtual equipment with high actual sense and high interaction. This paper proposes a thought which is used to achieve substation virtual equipment by 3D engine, and then generalizes a method which contains geometrical characteristic, interactive characteristic and behavioral characteristic towards Virtual equipment achieved by 3D engine. This method uses modeling tool to construct the geometrical appearance of substation virtual equipment, takes the 3D engine VR technique as core to realize interactive characteristic and behavioral characteristic of the virtual equipment. Combining with substation the application characteristics of substation virtual equipment, the paper proposes an interactive algorithm suiting to virtual equipment to improve the interaction of virtual equipment.", "fno": "3930b299", "keywords": [ "Virtual Reality", "The 3 D Engine", "Substation", "Virtual Equipment", "Object Oriented" ], "authors": [ { "affiliation": null, "fullName": "Zhaoyang Qu", "givenName": "Zhaoyang", "surname": "Qu", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Tao Jiang", "givenName": "Tao", "surname": "Jiang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ifcsta", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-12-01T00:00:00", "pubType": "proceedings", "pages": "299-302", "year": "2009", "issn": null, "isbn": "978-0-7695-3930-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3930b295", "articleId": "12OmNrkBwjT", "__typename": "AdjacentArticleType" }, "next": { "fno": "3930b303", "articleId": "12OmNAqCtNt", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iwcse/2009/3881/1/3881a430", "title": "Surge Suppression of Protection Equipment in UHV Substation", "doi": null, "abstractUrl": "/proceedings-article/iwcse/2009/3881a430/12OmNvHGrwY", "parentPublication": { "id": "proceedings/iwcse/2009/3881/1", "title": "Computer Science and Engineering, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/citworkshops/2008/3242/0/3242a577", "title": "A Communication Architecture for Inter-substation Communication", "doi": null, "abstractUrl": "/proceedings-article/citworkshops/2008/3242a577/12OmNx76THq", "parentPublication": { "id": "proceedings/citworkshops/2008/3242/0", "title": "Computer and Information Technology, IEEE 8th International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2008/3311/2/3311b175", "title": "Unified Model of Substation Equipment State Information Based on CIM", "doi": null, "abstractUrl": "/proceedings-article/iscid/2008/3311b175/12OmNxeutbM", "parentPublication": { "id": "proceedings/iscid/2008/3311/2", "title": "2008 International Symposium on Computational Intelligence and Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892374", "title": "Immersive virtual training for substation electricians", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892374/12OmNy49sP9", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/3/3804c529", "title": "Components-Based VRS-Engine for Substation Simulation", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804c529/12OmNyQYtdJ", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscid/2009/3865/1/3865a249", "title": "The Design of the Substation Simulation Model of Distributed Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/iscid/2009/3865a249/12OmNyXMQhl", "parentPublication": { "id": "proceedings/iscid/2009/3865/1", "title": "Computational Intelligence and Design, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mvhi/2010/4009/0/4009a572", "title": "A Training Simulation System for Substation Equipments Maintenance", "doi": null, "abstractUrl": "/proceedings-article/mvhi/2010/4009a572/12OmNzxgHoG", "parentPublication": { "id": "proceedings/mvhi/2010/4009/0", "title": "Machine Vision and Human-machine Interface, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a910", "title": "Realization of Communication Security in Substation", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a910/17D45WaTkoM", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iceitsa/2021/1300/0/130000a106", "title": "Study on Lightning Protection Measures for 220 kV Substation", "doi": null, "abstractUrl": "/proceedings-article/iceitsa/2021/130000a106/1B2HoWvWR3i", "parentPublication": { "id": "proceedings/iceitsa/2021/1300/0", "title": "2021 International Conference on Electronic Information Technology and Smart Agriculture (ICEITSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2020/6406/0/640600c082", "title": "Research on 3D rendering effect of substation based on OSG", "doi": null, "abstractUrl": "/proceedings-article/icisce/2020/640600c082/1x3krFbMKmA", "parentPublication": { "id": "proceedings/icisce/2020/6406/0", "title": "2020 7th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrNh0vf", "title": "Intelligent Human-Machine Systems and Cybernetics, International Conference on", "acronym": "ihmsc", "groupId": "1002959", "volume": "2", "displayVolume": "2", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNzBwGoh", "doi": "10.1109/IHMSC.2010.108", "title": "Virtual Operation of Motor Based on the Virtual Reality Technology", "normalizedTitle": "Virtual Operation of Motor Based on the Virtual Reality Technology", "abstract": "In this paper, it mainly introduces and analyzes the virtual reality technology. It shows a method of 3D products online virtual display based on the 3DS MAX and VRML. Build the 3D modeling of the three-phase asynchronous motors with 3DS MAX, and build its virtual display model of the scene. The combination of VRML virtual interactive technology has become a virtual scene about interactive virtual operation of motor. VR plays an important role in many scientific fields. In education, based on VR technology, students can finish some experiments that are too dangerous to be done in the real world. It is also be used for auxiliary teaching, and so on.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, it mainly introduces and analyzes the virtual reality technology. It shows a method of 3D products online virtual display based on the 3DS MAX and VRML. Build the 3D modeling of the three-phase asynchronous motors with 3DS MAX, and build its virtual display model of the scene. The combination of VRML virtual interactive technology has become a virtual scene about interactive virtual operation of motor. VR plays an important role in many scientific fields. In education, based on VR technology, students can finish some experiments that are too dangerous to be done in the real world. It is also be used for auxiliary teaching, and so on.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, it mainly introduces and analyzes the virtual reality technology. It shows a method of 3D products online virtual display based on the 3DS MAX and VRML. Build the 3D modeling of the three-phase asynchronous motors with 3DS MAX, and build its virtual display model of the scene. The combination of VRML virtual interactive technology has become a virtual scene about interactive virtual operation of motor. VR plays an important role in many scientific fields. In education, based on VR technology, students can finish some experiments that are too dangerous to be done in the real world. It is also be used for auxiliary teaching, and so on.", "fno": "4151b037", "keywords": [ "3 DS MAX Modeling", "VRML", "Virtual Reality Technology", "Virtual Display System" ], "authors": [ { "affiliation": null, "fullName": "Guobin Tao", "givenName": "Guobin", "surname": "Tao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiuyan Zhang", "givenName": "Xiuyan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Qinghua Zhang", "givenName": "Qinghua", "surname": "Zhang", "__typename": "ArticleAuthorType" } ], "idPrefix": "ihmsc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-08-01T00:00:00", "pubType": "proceedings", "pages": "37-40", "year": "2010", "issn": null, "isbn": "978-0-7695-4151-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4151b032", "articleId": "12OmNyrqzxC", "__typename": "AdjacentArticleType" }, "next": { "fno": "4151b041", "articleId": "12OmNzzfTom", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/etcs/2010/3987/1/3987a754", "title": "The Application of Virtual Reality Technology in the ", "doi": null, "abstractUrl": "/proceedings-article/etcs/2010/3987a754/12OmNB8CiXu", "parentPublication": { "id": "proceedings/etcs/2010/3987/1", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccms/2009/3562/0/3562a307", "title": "Research of Traffic Safety Simulation Based on 3DS MAX", "doi": null, "abstractUrl": "/proceedings-article/iccms/2009/3562a307/12OmNBsue7I", "parentPublication": { "id": "proceedings/iccms/2009/3562/0", "title": "2009 International Conference on Computer Modeling and Simulation. ICCMS 2009", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icic/2009/3634/4/3634d331", "title": "A Solution to Integrate CAD/CAE System and VR for Complex Product Design Processes", "doi": null, "abstractUrl": "/proceedings-article/icic/2009/3634d331/12OmNCyTyn6", "parentPublication": { "id": "proceedings/icic/2009/3634/4", "title": "2009 Second International Conference on Information and Computing Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wevr/2015/1725/0/07151692", "title": "Virtual reality enabled scientific visualization workflow", "doi": null, "abstractUrl": "/proceedings-article/wevr/2015/07151692/12OmNrJAeiv", "parentPublication": { "id": "proceedings/wevr/2015/1725/0", "title": "2015 IEEE 1st Workshop on Everyday Virtual Reality (WEVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichit/2008/3328/0/3328a222", "title": "Character Animation Tool ?Biped Hand Selector?", "doi": null, "abstractUrl": "/proceedings-article/ichit/2008/3328a222/12OmNrkT7y9", "parentPublication": { "id": "proceedings/ichit/2008/3328/0", "title": "2008 International Conference on Convergence and Hybrid Information Technology (ICHIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl/1999/0216/0/02160194", "title": "Browsing the Web through Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vl/1999/02160194/12OmNviZlet", "parentPublication": { "id": "proceedings/vl/1999/0216/0", "title": "Visual Languages, IEEE Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cccm/2008/3290/1/3290a400", "title": "Study on Simulation System for Turn-Milling Centre Based on VR Technology", "doi": null, "abstractUrl": "/proceedings-article/cccm/2008/3290a400/12OmNyQGS4R", "parentPublication": { "id": "cccm/2008/3290/1", "title": "Computing, Communication, Control and Management, ISECS International Colloquium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2008/3381/0/3381a627", "title": "Research on Method of 3D Reconstruction of Ancient Architecture (Nanputuo Temple)", "doi": null, "abstractUrl": "/proceedings-article/cw/2008/3381a627/12OmNz5JCa2", "parentPublication": { "id": "proceedings/cw/2008/3381/0", "title": "2008 International Conference on Cyberworlds", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoip/2010/4252/2/4252b726", "title": "Vision Based Tel-operation Robot Virtual Reality Circumstance Modeling in Real-Time", "doi": null, "abstractUrl": "/proceedings-article/icoip/2010/4252b726/12OmNzYNN9Q", "parentPublication": { "id": null, "title": null, "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/etcs/2010/3987/3/3987c296", "title": "Research of 3D Modeling of Virtual Reality for LAMOST Based on OpenGL", "doi": null, "abstractUrl": "/proceedings-article/etcs/2010/3987c296/12OmNzzfTpB", "parentPublication": { "id": "proceedings/etcs/2010/3987/3", "title": "Education Technology and Computer Science, International Workshop on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1KpBpkR1qBq", "title": "2022 3rd International Conference on Education, Knowledge and Information Management (ICEKIM)", "acronym": "icekim", "groupId": "1841184", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1KpBw9u2vT2", "doi": "10.1109/ICEKIM55072.2022.00058", "title": "Application of VR Technology in Virtual Simulation Experiment Teaching", "normalizedTitle": "Application of VR Technology in Virtual Simulation Experiment Teaching", "abstract": "Thanks to the booming development of virtual reality technology, the current teaching model has been improved. VR technology is applied to teaching while integrating database technology, network programming, and other technologies, to build a multi-dimensional, multi-scene, interactive and high immersion \"VR virtual simulation experiment teaching space\". This paper will take three specific examples to discuss the application of VR technology in virtual simulation experiment teaching, and the prospect of future virtual simulation experiment teaching, for the future VR technology and virtual simulation experiment teaching development to provide a reference.", "abstracts": [ { "abstractType": "Regular", "content": "Thanks to the booming development of virtual reality technology, the current teaching model has been improved. VR technology is applied to teaching while integrating database technology, network programming, and other technologies, to build a multi-dimensional, multi-scene, interactive and high immersion \"VR virtual simulation experiment teaching space\". This paper will take three specific examples to discuss the application of VR technology in virtual simulation experiment teaching, and the prospect of future virtual simulation experiment teaching, for the future VR technology and virtual simulation experiment teaching development to provide a reference.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Thanks to the booming development of virtual reality technology, the current teaching model has been improved. VR technology is applied to teaching while integrating database technology, network programming, and other technologies, to build a multi-dimensional, multi-scene, interactive and high immersion \"VR virtual simulation experiment teaching space\". This paper will take three specific examples to discuss the application of VR technology in virtual simulation experiment teaching, and the prospect of future virtual simulation experiment teaching, for the future VR technology and virtual simulation experiment teaching development to provide a reference.", "fno": "166600a231", "keywords": [ "Computer Aided Instruction", "Teaching", "Virtual Reality", "Current Teaching Model", "Database Technology", "Future Virtual Simulation Experiment Teaching", "Future VR Technology", "High Immersion", "Interactive", "Virtual Reality Technology", "Virtual Simulation Experiment Teaching Development", "Virtual Simulation Experiment Teaching Space", "Training", "Solid Modeling", "Education", "Virtual Reality", "Transforms", "Educational Technology", "Modems", "VR Technology", "Virtual Simulation Experiment Teaching", "Teaching Mode" ], "authors": [ { "affiliation": "China Agricultural University,College of Economics and Management,Beijing,China,100000", "fullName": "Chenlu Yang", "givenName": "Chenlu", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icekim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-01-01T00:00:00", "pubType": "proceedings", "pages": "231-234", "year": "2022", "issn": null, "isbn": "978-1-6654-1666-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "166600a224", "articleId": "1KpBS7Mq6Yg", "__typename": "AdjacentArticleType" }, "next": { "fno": "166600a235", "articleId": "1KpBvlblHMc", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/esaic/2018/8028/0/802800a343", "title": "Research on Application of VR Technology in Art Design Teaching", "doi": null, "abstractUrl": "/proceedings-article/esaic/2018/802800a343/17D45XdBRRM", "parentPublication": { "id": "proceedings/esaic/2018/8028/0", "title": "2018 International Conference on Engineering Simulation and Intelligent Control (ESAIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isaiee/2021/7874/0/787400a204", "title": "Teaching Mode of Art Design Wisdom Course Based on VR Technology", "doi": null, "abstractUrl": "/proceedings-article/isaiee/2021/787400a204/1BByh8CxzR6", "parentPublication": { "id": "proceedings/isaiee/2021/7874/0", "title": "2021 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900b102", "title": "Design of an VR-based Immersive Physics Experiment Teaching Platform", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900b102/1C8G8x4kiC4", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itei/2021/8050/0/805000a232", "title": "VR technology applied to traditional dance", "doi": null, "abstractUrl": "/proceedings-article/itei/2021/805000a232/1CzeG2lZvEI", "parentPublication": { "id": "proceedings/itei/2021/8050/0", "title": "2021 3rd International Conference on Internet Technology and Educational Informization (ITEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itei/2021/8050/0/805000a219", "title": "Application of virtual reality technology in experimental teaching of medical specialty", "doi": null, "abstractUrl": "/proceedings-article/itei/2021/805000a219/1CzeGNTNNsI", "parentPublication": { "id": "proceedings/itei/2021/8050/0", "title": "2021 3rd International Conference on Internet Technology and Educational Informization (ITEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiotcs/2022/3410/0/341000a471", "title": "Realization of Virtual Teaching Platform For English Translation Based On VR Technology", "doi": null, "abstractUrl": "/proceedings-article/aiotcs/2022/341000a471/1MuZGtTk0IE", "parentPublication": { "id": "proceedings/aiotcs/2022/3410/0", "title": "2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cipae/2020/8223/0/822300a170", "title": "Teaching Design of Vocal Music Course Group in Normal University Based on Intelligent Technology of Virtual Simulation Experiment", "doi": null, "abstractUrl": "/proceedings-article/cipae/2020/822300a170/1rSRjWK5tMQ", "parentPublication": { "id": "proceedings/cipae/2020/8223/0", "title": "2020 International Conference on Computers, Information Processing and Advanced Education (CIPAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2020/0497/0/049700a346", "title": "NOBOOK VR Experiment Test", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2020/049700a346/1vg85m64iRy", "parentPublication": { "id": "proceedings/icvrv/2020/0497/0", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2021/4854/0/485400a129", "title": "Japanese Teaching Environment Construction Based on Virtual Reality Technology", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2021/485400a129/1wB6NZeBii4", "parentPublication": { "id": "proceedings/icitbs/2021/4854/0", "title": "2021 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieit/2021/2563/0/256300a477", "title": "Applied Research of VR Technology in Civil Engineering Teaching", "doi": null, "abstractUrl": "/proceedings-article/ieit/2021/256300a477/1wHKq2RrP20", "parentPublication": { "id": "proceedings/ieit/2021/2563/0", "title": "2021 International Conference on Internet, Education and Information Technology (IEIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1iERzv8QOwU", "title": "2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "acronym": "icmtma", "groupId": "1002837", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1iERLv8UJhe", "doi": "10.1109/ICMTMA50254.2020.00092", "title": "Research on Multi-Mode Interactive Virtual Reality Scene Enhancement Based on Artificial Intelligence", "normalizedTitle": "Research on Multi-Mode Interactive Virtual Reality Scene Enhancement Based on Artificial Intelligence", "abstract": "Aiming at the problem of high distortion of traditional virtual reality scene enhancement methods, a multi-mode interactive vr scene enhancement method based on artificial intelligence is studied. The convolution neural network in artificial intelligence technology is used to extract the cloud of virtual field points and reconstruct the cloud of virtual field points. The coordinate matching relationship between the virtual scene built by computer and the real world was determined, and the virtual scene was enhanced in detail by Gouraud shading algorithm, texture mapping and other processing methods. Combined with multi-mode interactive equipment, the processed virtual scene is projected into the real space to complete the design of multi-mode interactive virtual reality scene enhancement method based on artificial intelligence. Through the comparison experiment with the traditional scene enhancement method, it is verified that the designed virtual reality scene enhancement method based on artificial intelligence can reduce the distortion degree, improve the user satisfaction and have a broader application prospect.", "abstracts": [ { "abstractType": "Regular", "content": "Aiming at the problem of high distortion of traditional virtual reality scene enhancement methods, a multi-mode interactive vr scene enhancement method based on artificial intelligence is studied. The convolution neural network in artificial intelligence technology is used to extract the cloud of virtual field points and reconstruct the cloud of virtual field points. The coordinate matching relationship between the virtual scene built by computer and the real world was determined, and the virtual scene was enhanced in detail by Gouraud shading algorithm, texture mapping and other processing methods. Combined with multi-mode interactive equipment, the processed virtual scene is projected into the real space to complete the design of multi-mode interactive virtual reality scene enhancement method based on artificial intelligence. Through the comparison experiment with the traditional scene enhancement method, it is verified that the designed virtual reality scene enhancement method based on artificial intelligence can reduce the distortion degree, improve the user satisfaction and have a broader application prospect.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Aiming at the problem of high distortion of traditional virtual reality scene enhancement methods, a multi-mode interactive vr scene enhancement method based on artificial intelligence is studied. The convolution neural network in artificial intelligence technology is used to extract the cloud of virtual field points and reconstruct the cloud of virtual field points. The coordinate matching relationship between the virtual scene built by computer and the real world was determined, and the virtual scene was enhanced in detail by Gouraud shading algorithm, texture mapping and other processing methods. Combined with multi-mode interactive equipment, the processed virtual scene is projected into the real space to complete the design of multi-mode interactive virtual reality scene enhancement method based on artificial intelligence. Through the comparison experiment with the traditional scene enhancement method, it is verified that the designed virtual reality scene enhancement method based on artificial intelligence can reduce the distortion degree, improve the user satisfaction and have a broader application prospect.", "fno": "708100a391", "keywords": [ "Artificial Intelligence", "Convolutional Neural Nets", "Image Enhancement", "Image Texture", "Virtual Reality", "Artificial Intelligence Technology", "Virtual Field Points", "Multimode Interactive Equipment", "Virtual Scene", "Multimode Interactive Virtual Reality Scene Enhancement Method", "Designed Virtual Reality Scene Enhancement Method", "Multimode Interactive VR Scene Enhancement Method", "Gouraud Shading Algorithm", "Texture Mapping", "Convolution Neural Network", "Cloud Computing", "Mechatronics", "Automation", "Convolution", "Virtual Reality", "Artificial Neural Networks", "Distortion", "Artificial Intelligence", "Multimode Interactive", "Virtual Reality", "Scene Enhancement Method" ], "authors": [ { "affiliation": "Chongqing University of Arts and Science", "fullName": "Feng Gao", "givenName": "Feng", "surname": "Gao", "__typename": "ArticleAuthorType" }, { "affiliation": "Chongqing University of Arts and Science", "fullName": "Guofeng Xu", "givenName": "Guofeng", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icmtma", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-02-01T00:00:00", "pubType": "proceedings", "pages": "391-396", "year": "2020", "issn": null, "isbn": "978-1-7281-7081-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "708100a387", "articleId": "1iERNdTvDby", "__typename": "AdjacentArticleType" }, "next": { "fno": "708100a397", "articleId": "1iERMiVfgyI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icmtma/2022/9978/0/997800a852", "title": "A Low-Light Enhancement Network-LLENet", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800a852/1ByeWVDofQs", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise-ie/2021/3829/0/382900b669", "title": "Artificial intelligence application of virtual reality technology in digital media art creation", "doi": null, "abstractUrl": "/proceedings-article/icise-ie/2021/382900b669/1C8GGpMKMSY", "parentPublication": { "id": "proceedings/icise-ie/2021/3829/0", "title": "2021 2nd International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwecai/2022/7997/0/799700a343", "title": "Application of Artificial Intelligence and Virtual Reality Technology in the Construction of University Physical Education", "doi": null, "abstractUrl": "/proceedings-article/iwecai/2022/799700a343/1CugzA0c1JS", "parentPublication": { "id": "proceedings/iwecai/2022/7997/0", "title": "2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apct/2022/8345/0/834500a047", "title": "Application prospect of artificial intelligence technology in autism spectrum disorder intervention", "doi": null, "abstractUrl": "/proceedings-article/apct/2022/834500a047/1FAMs5PqJLG", "parentPublication": { "id": "proceedings/apct/2022/8345/0", "title": "2022 Asia-Pacific Computer Technologies Conference (APCT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/arace/2022/5153/0/515300a161", "title": "Research on the Application of Artificial Intelligence Technology in the Three-dimensional Teaching Field", "doi": null, "abstractUrl": "/proceedings-article/arace/2022/515300a161/1Ip7Iap2wQE", "parentPublication": { "id": "proceedings/arace/2022/5153/0", "title": "2022 Asia Conference on Advanced Robotics, Automation, and Control Engineering (ARACE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2019/2165/0/216500a517", "title": "A Teaching System of English Online Course Based on Artificial Intelligence", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2019/216500a517/1dUnPxRnVmg", "parentPublication": { "id": "proceedings/icmtma/2019/2165/0", "title": "2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2019/2165/0/216500a568", "title": "Research on Information Security Situation Awareness System Based on Big Data and Artificial Intelligence Technology", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2019/216500a568/1dUnQkWhPJS", "parentPublication": { "id": "proceedings/icmtma/2019/2165/0", "title": "2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2019/2165/0/216500a458", "title": "Interactive Teaching Path Analysis of Higher Vocational Ideological and Political Courses Based on Artificial Intelligence Algorithms", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2019/216500a458/1dUnSZzDh9S", "parentPublication": { "id": "proceedings/icmtma/2019/2165/0", "title": "2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2020/7081/0/708100a662", "title": "The Application of Artificial Intelligence in the Evaluation of Linear Thinking Mode of Chinese Piano Music", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2020/708100a662/1iERBu2SxkQ", "parentPublication": { "id": "proceedings/icmtma/2020/7081/0", "title": "2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400a235", "title": "Application and research of artificial intelligence in mechatronic engineering", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400a235/1tzyIQH37by", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1pBMeBWXAZ2", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "1810084", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1pBMjRRAvtK", "doi": "10.1109/ISMAR-Adjunct51615.2020.00072", "title": "Retargetable AR: Context-aware Augmented Reality in Indoor Scenes based on 3D Scene Graph", "normalizedTitle": "Retargetable AR: Context-aware Augmented Reality in Indoor Scenes based on 3D Scene Graph", "abstract": "We present Retargetable AR-a novel AR framework that yields an AR experience that is aware of scene contexts set in various real environments, achieving natural interaction between the virtual and real worlds. We characterize scene contexts with relationships among objects in 3D space. A context assumed by an AR content and a context formed by a real environment where users experience AR are represented as abstract graph representations, i.e. scene graphs. From RGB-D streams, our framework generates a volumetric map in which geometric and semantic information of a scene are integrated. Moreover, using the semantic map, we abstract scene objects as oriented bounding boxes and estimate their orientations. Then our framework constructs, in an online fashion, a 3D scene graph characterizing the context of a real environment for AR. The correspondence between the constructed graph and an AR scene graph denoting the context of AR content provides a semantically registered content arrangement, which facilitates natural interaction between the virtual and real worlds. We performed extensive evaluations on our prototype system through quantitative evaluation of the performance of the oriented bounding box estimation, subjective evaluation of the AR content arrangement based on constructed 3D scene graphs, and an online AR demonstration.", "abstracts": [ { "abstractType": "Regular", "content": "We present Retargetable AR-a novel AR framework that yields an AR experience that is aware of scene contexts set in various real environments, achieving natural interaction between the virtual and real worlds. We characterize scene contexts with relationships among objects in 3D space. A context assumed by an AR content and a context formed by a real environment where users experience AR are represented as abstract graph representations, i.e. scene graphs. From RGB-D streams, our framework generates a volumetric map in which geometric and semantic information of a scene are integrated. Moreover, using the semantic map, we abstract scene objects as oriented bounding boxes and estimate their orientations. Then our framework constructs, in an online fashion, a 3D scene graph characterizing the context of a real environment for AR. The correspondence between the constructed graph and an AR scene graph denoting the context of AR content provides a semantically registered content arrangement, which facilitates natural interaction between the virtual and real worlds. We performed extensive evaluations on our prototype system through quantitative evaluation of the performance of the oriented bounding box estimation, subjective evaluation of the AR content arrangement based on constructed 3D scene graphs, and an online AR demonstration.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present Retargetable AR-a novel AR framework that yields an AR experience that is aware of scene contexts set in various real environments, achieving natural interaction between the virtual and real worlds. We characterize scene contexts with relationships among objects in 3D space. A context assumed by an AR content and a context formed by a real environment where users experience AR are represented as abstract graph representations, i.e. scene graphs. From RGB-D streams, our framework generates a volumetric map in which geometric and semantic information of a scene are integrated. Moreover, using the semantic map, we abstract scene objects as oriented bounding boxes and estimate their orientations. Then our framework constructs, in an online fashion, a 3D scene graph characterizing the context of a real environment for AR. The correspondence between the constructed graph and an AR scene graph denoting the context of AR content provides a semantically registered content arrangement, which facilitates natural interaction between the virtual and real worlds. We performed extensive evaluations on our prototype system through quantitative evaluation of the performance of the oriented bounding box estimation, subjective evaluation of the AR content arrangement based on constructed 3D scene graphs, and an online AR demonstration.", "fno": "767500a249", "keywords": [ "Augmented Reality", "Graph Theory", "Image Colour Analysis", "Natural Scenes", "Stereo Image Processing", "Ubiquitous Computing", "User Experience", "RGB D Streams", "3 D Scene Graph", "AR Content Arrangement", "Retargetable AR", "Oriented Bounding Box Estimation", "AR Scene Graph", "Oriented Bounding Boxes", "Abstract Scene Objects", "Semantic Map", "Semantic Information", "Geometric Information", "Abstract Graph Representations", "Users Experience AR", "Indoor Scenes", "Context Aware Augmented Reality", "Three Dimensional Displays", "Semantics", "Prototypes", "Estimation", "User Experience", "Task Analysis", "Augmented Reality", "Human Centered Computing", "Human Computer Interaction HCI", "Interaction Paradigms", "Mixed Augmented Reality", "Artificial Intelligence", "Computer Vision", "Computer Vision Tasks", "Scene Understanding" ], "authors": [ { "affiliation": "Sony Corporation,R&D Center", "fullName": "Tomu Tahara", "givenName": "Tomu", "surname": "Tahara", "__typename": "ArticleAuthorType" }, { "affiliation": "Sony Corporation,R&D Center", "fullName": "Takashi Seno", "givenName": "Takashi", "surname": "Seno", "__typename": "ArticleAuthorType" }, { "affiliation": "Sony Corporation,R&D Center", "fullName": "Gaku Narita", "givenName": "Gaku", "surname": "Narita", "__typename": "ArticleAuthorType" }, { "affiliation": "Sony Corporation,R&D Center", "fullName": "Tomoya Ishikawa", "givenName": "Tomoya", "surname": "Ishikawa", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "249-255", "year": "2020", "issn": null, "isbn": "978-1-7281-7675-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "767500a247", "articleId": "1pBMj6Ryu9q", "__typename": "AdjacentArticleType" }, "next": { "fno": "767500a255", "articleId": "1pBMkhmVP7a", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2014/6184/0/06948445", "title": "[Poster] View management for webized mobile AR contents", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948445/12OmNAJDBvu", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2005/8929/0/01492753", "title": "Flexible parametrization of scene graphs", "doi": null, "abstractUrl": "/proceedings-article/vr/2005/01492753/12OmNB06l9e", "parentPublication": { "id": "proceedings/vr/2005/8929/0", "title": "IEEE Virtual Reality 2005", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a253", "title": "Workshop on VR and AR meet creative industries", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a253/12OmNylKASp", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699200", "title": "Effective Free Field of View Scene Exploration in VR and AR", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699200/19F1SrRS4vK", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090479", "title": "Impact of AR Display Context Switching and Focal Distance Switching on Human Performance: Replication on an AR Haploscope", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090479/1jIxlrWEUmc", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a167", "title": "Decoupled Localization and Sensing with HMD-based AR for Interactive Scene Acquisition", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a167/1pBMfN4nbnq", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a039", "title": "Designing a Multitasking Interface for Object-aware AR applications", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a039/1pBMfjaOy08", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a279", "title": "Enhancing Visitor Experience or Hindering Docent Roles: Attentional Issues in Augmented Reality Supported Installations", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a279/1pysvRpTvr2", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2020/0497/0/049700a379", "title": "AR Creator: A Mobile Application of Logic Education Based on AR", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2020/049700a379/1vg86AfolmE", "parentPublication": { "id": "proceedings/icvrv/2020/0497/0", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccst/2021/4254/0/425400a034", "title": "Current Status and Prospects of Mobile AR Applications", "doi": null, "abstractUrl": "/proceedings-article/iccst/2021/425400a034/1ziP9KHT7Vu", "parentPublication": { "id": "proceedings/iccst/2021/4254/0", "title": "2021 International Conference on Culture-oriented Science & Technology (ICCST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tuAeQeDJja", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tuAmQvIgWA", "doi": "10.1109/VR50410.2021.00045", "title": "Scene-Context-Aware Indoor Object Selection and Movement in VR", "normalizedTitle": "Scene-Context-Aware Indoor Object Selection and Movement in VR", "abstract": "Virtual reality (VR) applications such as interior design typically require accurate and efficient selection and movement of indoor objects. In this paper, we present an indoor object selection and movement approach by taking into account scene contexts such as object semantics and interrelations. This provides more intelligence and guidance to the interaction, and greatly enhances user experience. We evaluate our proposals by comparing them with traditional approaches in different interaction modes based on controller, head pose, and eye gaze. Extensive user studies on a variety of selection and movement tasks are conducted to validate the advantages of our approach. We demonstrate our findings via a furniture arrangement application.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual reality (VR) applications such as interior design typically require accurate and efficient selection and movement of indoor objects. In this paper, we present an indoor object selection and movement approach by taking into account scene contexts such as object semantics and interrelations. This provides more intelligence and guidance to the interaction, and greatly enhances user experience. We evaluate our proposals by comparing them with traditional approaches in different interaction modes based on controller, head pose, and eye gaze. Extensive user studies on a variety of selection and movement tasks are conducted to validate the advantages of our approach. We demonstrate our findings via a furniture arrangement application.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual reality (VR) applications such as interior design typically require accurate and efficient selection and movement of indoor objects. In this paper, we present an indoor object selection and movement approach by taking into account scene contexts such as object semantics and interrelations. This provides more intelligence and guidance to the interaction, and greatly enhances user experience. We evaluate our proposals by comparing them with traditional approaches in different interaction modes based on controller, head pose, and eye gaze. Extensive user studies on a variety of selection and movement tasks are conducted to validate the advantages of our approach. We demonstrate our findings via a furniture arrangement application.", "fno": "255600a235", "keywords": [ "Data Visualisation", "Furniture", "Virtual Reality", "Scene Context Aware Indoor Object Selection", "VR", "Virtual Reality Applications", "Interior Design", "Efficient Selection", "Indoor Objects", "Account Scene Contexts", "Object Semantics", "Interrelations", "Different Interaction Modes", "Three Dimensional Displays", "Semantics", "Virtual Reality", "User Interfaces", "User Experience", "Proposals", "Task Analysis" ], "authors": [ { "affiliation": "Peng Cheng Laboratory", "fullName": "Miao Wang", "givenName": "Miao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Laboratory of Virtual Reality Technology and Systems, Beihang University,China", "fullName": "Zi-Ming Ye", "givenName": "Zi-Ming", "surname": "Ye", "__typename": "ArticleAuthorType" }, { "affiliation": "State Key Laboratory of Virtual Reality Technology and Systems, Beihang University,China", "fullName": "Jin-Chuan Shi", "givenName": "Jin-Chuan", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Bath", "fullName": "Yang-Liang Yang", "givenName": "Yang-Liang", "surname": "Yang", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-03-01T00:00:00", "pubType": "proceedings", "pages": "235-244", "year": "2021", "issn": null, "isbn": "978-1-6654-1838-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1tuAmGmYLPG", "name": "pvr202118380-09417774s1-mm_255600a235.zip", "size": "20.9 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pvr202118380-09417774s1-mm_255600a235.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "255600a226", "articleId": "1tuAvyrBEXe", "__typename": "AdjacentArticleType" }, "next": { "fno": "255600a245", "articleId": "1tuAspQrBcY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tg/2018/09/08039524", "title": "A Data-Driven Approach for Furniture and Indoor Scene Colorization", "doi": null, "abstractUrl": "/journal/tg/2018/09/08039524/13rRUy3gn7D", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2019/2297/0/229700a029", "title": "Flexible Indoor Scene Synthesis via a Multi-object Particle Swarm Intelligence Optimization Algorithm and User Intentions", "doi": null, "abstractUrl": "/proceedings-article/cw/2019/229700a029/1fHkncxu9Hi", "parentPublication": { "id": "proceedings/cw/2019/2297/0", "title": "2019 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2019/4765/0/476500a317", "title": "Indoor Scene Reconstruction: From Panorama Images to CAD Models", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2019/476500a317/1gyskCPmgco", "parentPublication": { "id": "proceedings/ismar-adjunct/2019/4765/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2019/2627/0/262700b071", "title": "An Assist System for Visually Impaired at Indoor Residential Environment using Faster-RCNN", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2019/262700b071/1hrLyuiaLSw", "parentPublication": { "id": "proceedings/iiai-aai/2019/2627/0", "title": "2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090580", "title": "A Study on the Effects of Head Mounted Displays Movement and Image Movement on Virtual Reality Sickness", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090580/1jIxns5TwxG", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/12/09128027", "title": "Motion Planning for Convertible Indoor Scene Layout Design", "doi": null, "abstractUrl": "/journal/tg/2021/12/09128027/1l3unTAaNuE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2020/4663/0/09162272", "title": "CAPRIOv2.0: A Context-Aware Unified Indoor-Outdoor Path Recommendation System", "doi": null, "abstractUrl": "/proceedings-article/mdm/2020/09162272/1m6hFlhJx2U", "parentPublication": { "id": "proceedings/mdm/2020/4663/0", "title": "2020 21st IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a249", "title": "Retargetable AR: Context-aware Augmented Reality in Indoor Scenes based on 3D Scene Graph", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a249/1pBMjRRAvtK", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a450", "title": "Interactive Context-Aware Furniture Recommendation using Mixed Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a450/1tnWO8nmeeA", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09535226", "title": "Context-Consistent Generation of Indoor Virtual Environments Based on Geometry Constraints", "doi": null, "abstractUrl": "/journal/tg/2022/12/09535226/1wMEQ9trRGE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1vg7AGzvxNC", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "acronym": "icvrv", "groupId": "1800579", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1vg816YtVjG", "doi": "10.1109/ICVRV51359.2020.00060", "title": "Cloud mobile display and interaction framework of virtual reality 3D scenes", "normalizedTitle": "Cloud mobile display and interaction framework of virtual reality 3D scenes", "abstract": "We propose a framework for cloud mobile virtual reality (VR) applications on smart phone web browsers. It combines cloud rendering and panoramic stereo imaging technology to realize interactive high-quality 3D scene display on smart phones. The images of the VR 3D scenes are transmitted in the manner of video stream, and the interactive data is processed by the proposed anti-jitter algorithm (AJA). A web-side lightweight rendering approach is also realized in our framework. Use of our framework can both reduce the computational cost of displaying VR 3D scenes on smart phones, meanwhile eliminating the need of installing plug-ins or dedicated APPs. Our framework can interactively display VR 3D scenes on a smart phone web browser and provide satisfactory immersive experience for observers with the help of VR glasses.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a framework for cloud mobile virtual reality (VR) applications on smart phone web browsers. It combines cloud rendering and panoramic stereo imaging technology to realize interactive high-quality 3D scene display on smart phones. The images of the VR 3D scenes are transmitted in the manner of video stream, and the interactive data is processed by the proposed anti-jitter algorithm (AJA). A web-side lightweight rendering approach is also realized in our framework. Use of our framework can both reduce the computational cost of displaying VR 3D scenes on smart phones, meanwhile eliminating the need of installing plug-ins or dedicated APPs. Our framework can interactively display VR 3D scenes on a smart phone web browser and provide satisfactory immersive experience for observers with the help of VR glasses.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a framework for cloud mobile virtual reality (VR) applications on smart phone web browsers. It combines cloud rendering and panoramic stereo imaging technology to realize interactive high-quality 3D scene display on smart phones. The images of the VR 3D scenes are transmitted in the manner of video stream, and the interactive data is processed by the proposed anti-jitter algorithm (AJA). A web-side lightweight rendering approach is also realized in our framework. Use of our framework can both reduce the computational cost of displaying VR 3D scenes on smart phones, meanwhile eliminating the need of installing plug-ins or dedicated APPs. Our framework can interactively display VR 3D scenes on a smart phone web browser and provide satisfactory immersive experience for observers with the help of VR glasses.", "fno": "049700a261", "keywords": [ "Mobile Computing", "Online Front Ends", "Rendering Computer Graphics", "Smart Phones", "Stereo Image Processing", "Video Streaming", "Virtual Reality", "Interaction Framework", "Virtual Reality 3 D Scenes", "Cloud Mobile Virtual Reality Applications", "Smart Phone Web Browser", "Panoramic Stereo Imaging Technology", "High Quality 3 D Scene Display", "Smart Phones", "VR 3 D Scenes", "Interactive Data", "Web Side Lightweight Rendering Approach", "Cloud Computing", "Three Dimensional Displays", "Imaging", "Glass", "Immersive Experience", "Streaming Media", "Observers", "Cloud Mobile Virtual Reality", "Cloud Rendering", "Panoramic Stereo Imaging", "A Web Side Lightweight Rendering", "Anti Jitter Algorithm", "Video Stream", "Plug In", "VR Glasses Problem Statement" ], "authors": [ { "affiliation": "Engineering Research Center for Technology and Equipment of Special Movies, Changchun University of Science and Technology,Changchun,China", "fullName": "Jiazhe Liu", "givenName": "Jiazhe", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Engineering Research Center for Technology and Equipment of Special Movies, Changchun University of Science and Technology,Changchun,China", "fullName": "Yunbiao Liu", "givenName": "Yunbiao", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Engineering Research Center for Technology and Equipment of Special Movies, Changchun University of Science and Technology,Changchun,China", "fullName": "Ling Li", "givenName": "Ling", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Engineering Research Center for Technology and Equipment of Special Movies, Changchun University of Science and Technology,Changchun,China", "fullName": "Chunyi Chen", "givenName": "Chunyi", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "Engineering Research Center for Technology and Equipment of Special Movies, Changchun University of Science and Technology,Changchun,China", "fullName": "Xiaojuan Hu", "givenName": "Xiaojuan", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "Engineering Research Center for Technology and Equipment of Special Movies, Changchun University of Science and Technology,Changchun,China", "fullName": "Haiyang Yu", "givenName": "Haiyang", "surname": "Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "icvrv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "261-264", "year": "2020", "issn": "2375-141X", "isbn": "978-1-6654-0497-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1vg80DHf8v6", "name": "picvrv202004970-09479814s1-mm_049700a261.zip", "size": "88.4 MB", "location": "https://www.computer.org/csdl/api/v1/extra/picvrv202004970-09479814s1-mm_049700a261.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "049700a258", "articleId": "1vg7KgR18U8", "__typename": "AdjacentArticleType" }, "next": { "fno": "049700a265", "articleId": "1vg7VjdTKs8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/mlbdbi/2021/1790/0/179000a621", "title": "Application of Virtual Reality Technology in Mental Health Education", "doi": null, "abstractUrl": "/proceedings-article/mlbdbi/2021/179000a621/1BQiynC3R9m", "parentPublication": { "id": "proceedings/mlbdbi/2021/1790/0", "title": "2021 3rd International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a902", "title": "ArtScape: Gamified Virtual Reality Art Exploration", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a902/1CJcDIxI14k", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2022/9598/0/959800a232", "title": "VRTest: An Extensible Framework for Automatic Testing of Virtual Reality Scenes", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2022/959800a232/1EaP2BazwaI", "parentPublication": { "id": "proceedings/icse-companion/2022/9598/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2022/6814/0/681400a213", "title": "EEG-based Evaluation on Intuitive Gesture Interaction in Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/cw/2022/681400a213/1I6RKHGKLD2", "parentPublication": { "id": "proceedings/cw/2022/6814/0", "title": "2022 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icenit/2022/6307/0/630700a037", "title": "Design and Application of Project-Based Teaching of Convergence Media Smart Classroom Based on VR+AR Technology", "doi": null, "abstractUrl": "/proceedings-article/icenit/2022/630700a037/1KCSFtLUkk8", "parentPublication": { "id": "proceedings/icenit/2022/6307/0", "title": "2022 International Conference on Education, Network and Information Technology (ICENIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2023/4815/0/481500a001", "title": "RemoteTouch: Enhancing Immersive 3D Video Communication with Hand Touch", "doi": null, "abstractUrl": "/proceedings-article/vr/2023/481500a001/1MNgTT89hni", "parentPublication": { "id": "proceedings/vr/2023/4815/0", "title": "2023 IEEE Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798342", "title": "An Open Initiative for the Delivery of Infinitely Scalable and Animated 3D Scenes", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798342/1cJ0OpjGOkw", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090490", "title": "Evaluation of Simulator Sickness for 360&#x00B0; Videos on an HMD Subject to Participants&#x2019; Experience with Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090490/1jIxwgIdgsw", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vl-hcc/2021/4592/0/09576372", "title": "VREUD - An End-User Development Tool to Simplify the Creation of Interactive VR Scenes", "doi": null, "abstractUrl": "/proceedings-article/vl-hcc/2021/09576372/1y63pjBC6qs", "parentPublication": { "id": "proceedings/vl-hcc/2021/4592/0", "title": "2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900o4703", "title": "Populating 3D Scenes by Learning Human-Scene Interaction", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900o4703/1yeHZ17Dp3a", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1y63oido7ra", "title": "2021 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)", "acronym": "vl-hcc", "groupId": "1001007", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1y63pjBC6qs", "doi": "10.1109/VL/HCC51201.2021.9576372", "title": "VREUD - An End-User Development Tool to Simplify the Creation of Interactive VR Scenes", "normalizedTitle": "VREUD - An End-User Development Tool to Simplify the Creation of Interactive VR Scenes", "abstract": "Recent advances in Virtual Reality (VR) technology and the increased availability of VR-equipped devices enable a wide range of consumer-oriented applications. For novice developers, however, creating interactive scenes for VR applications is a complex and cumbersome task that requires high technical knowledge which is often missing. This hinders the potential of enabling novices to create, modify, and execute their own interactive VR scenes. Although recent authoring tools for interactive VR scenes are promising, most of them focus on expert professionals as the target group and neglect the novices with low programming knowledge. To lower the entry barrier, we provide an open-source web-based End-User Development (EUD) tool, called VREUD, that supports the rapid construction and execution of interactive VR scenes. Concerning construction, VREUD enables the specification of the VR scene including interactions and tasks. Furthermore, VREUD supports the execution and immersive experience of the created interactive VR scenes on VR head-mounted displays. Based on a user study, we have analyzed the effectiveness, efficiency, and user satisfaction of VREUD which shows promising results to empower novices in creating their interactive VR scenes.", "abstracts": [ { "abstractType": "Regular", "content": "Recent advances in Virtual Reality (VR) technology and the increased availability of VR-equipped devices enable a wide range of consumer-oriented applications. For novice developers, however, creating interactive scenes for VR applications is a complex and cumbersome task that requires high technical knowledge which is often missing. This hinders the potential of enabling novices to create, modify, and execute their own interactive VR scenes. Although recent authoring tools for interactive VR scenes are promising, most of them focus on expert professionals as the target group and neglect the novices with low programming knowledge. To lower the entry barrier, we provide an open-source web-based End-User Development (EUD) tool, called VREUD, that supports the rapid construction and execution of interactive VR scenes. Concerning construction, VREUD enables the specification of the VR scene including interactions and tasks. Furthermore, VREUD supports the execution and immersive experience of the created interactive VR scenes on VR head-mounted displays. Based on a user study, we have analyzed the effectiveness, efficiency, and user satisfaction of VREUD which shows promising results to empower novices in creating their interactive VR scenes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent advances in Virtual Reality (VR) technology and the increased availability of VR-equipped devices enable a wide range of consumer-oriented applications. For novice developers, however, creating interactive scenes for VR applications is a complex and cumbersome task that requires high technical knowledge which is often missing. This hinders the potential of enabling novices to create, modify, and execute their own interactive VR scenes. Although recent authoring tools for interactive VR scenes are promising, most of them focus on expert professionals as the target group and neglect the novices with low programming knowledge. To lower the entry barrier, we provide an open-source web-based End-User Development (EUD) tool, called VREUD, that supports the rapid construction and execution of interactive VR scenes. Concerning construction, VREUD enables the specification of the VR scene including interactions and tasks. Furthermore, VREUD supports the execution and immersive experience of the created interactive VR scenes on VR head-mounted displays. Based on a user study, we have analyzed the effectiveness, efficiency, and user satisfaction of VREUD which shows promising results to empower novices in creating their interactive VR scenes.", "fno": "09576372", "keywords": [ "Interactive Systems", "Internet", "Public Domain Software", "Virtual Reality", "VREUD", "Virtual Reality Technology", "VR Equipped Devices", "Interactive Scenes", "VR Applications", "Created Interactive VR Scenes", "Open Source Web Based End User Development Tool", "Visualization", "Head Mounted Displays", "Authoring Systems", "Immersive Experience", "Tools", "Task Analysis", "Programming Profession", "Virtual Reality", "End User Development", "Authoring", "Interactive Scene", "Development Tool" ], "authors": [ { "affiliation": "Paderborn University,Germany", "fullName": "Enes Yigitbas", "givenName": "Enes", "surname": "Yigitbas", "__typename": "ArticleAuthorType" }, { "affiliation": "Paderborn University,Germany", "fullName": "Jonas Klauke", "givenName": "Jonas", "surname": "Klauke", "__typename": "ArticleAuthorType" }, { "affiliation": "Paderborn University,Germany", "fullName": "Sebastian Gottschalk", "givenName": "Sebastian", "surname": "Gottschalk", "__typename": "ArticleAuthorType" }, { "affiliation": "Paderborn University,Germany", "fullName": "Gregor Engels", "givenName": "Gregor", "surname": "Engels", "__typename": "ArticleAuthorType" } ], "idPrefix": "vl-hcc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "1-10", "year": "2021", "issn": null, "isbn": "978-1-6654-4592-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09576203", "articleId": "1y63vcawGZO", "__typename": "AdjacentArticleType" }, "next": { "fno": "09576315", "articleId": "1y63zWvHMvC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ncm/2009/3769/0/3769a320", "title": "Providing a Heuristic Method to Simplify Behaviour Authoring", "doi": null, "abstractUrl": "/proceedings-article/ncm/2009/3769a320/12OmNrYCXNO", "parentPublication": { "id": "proceedings/ncm/2009/3769/0", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2018/7123/0/08493419", "title": "Effects of Graphical Styles on Emotional States for VR-Supported Psychotherapy", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2018/08493419/14tNJnLIk5b", "parentPublication": { "id": "proceedings/vs-games/2018/7123/0", "title": "2018 10th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2022/06/09984052", "title": "BoidVR: An Agent Simulation Environment Based on Freehand and Virtual Reality", "doi": null, "abstractUrl": "/magazine/cg/2022/06/09984052/1J4y8IsgDM4", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icenit/2022/6307/0/630700a037", "title": "Design and Application of Project-Based Teaching of Convergence Media Smart Classroom Based on VR+AR Technology", "doi": null, "abstractUrl": "/proceedings-article/icenit/2022/630700a037/1KCSFtLUkk8", "parentPublication": { "id": "proceedings/icenit/2022/6307/0", "title": "2022 International Conference on Education, Network and Information Technology (ICENIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090490", "title": "Evaluation of Simulator Sickness for 360&#x00B0; Videos on an HMD Subject to Participants&#x2019; Experience with Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090490/1jIxwgIdgsw", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a001", "title": "Using Semantic Segmentation to Assist the Creation of Interactive VR Applications", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a001/1qpzzCegGmA", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2020/0497/0/049700a261", "title": "Cloud mobile display and interaction framework of virtual reality 3D scenes", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2020/049700a261/1vg816YtVjG", "parentPublication": { "id": "proceedings/icvrv/2020/0497/0", "title": "2020 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icris/2020/1969/0/196900a142", "title": "VR interactive game design based on unity3d engine", "doi": null, "abstractUrl": "/proceedings-article/icris/2020/196900a142/1wG5UNVdvkA", "parentPublication": { "id": "proceedings/icris/2020/1969/0", "title": "2020 International Conference on Robots & Intelligent System (ICRIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciddt/2020/0367/0/036700a373", "title": "Research on VR Tourism Application Based on 5G Technology &#x2014; Taking Guilin Lijiang as an Example", "doi": null, "abstractUrl": "/proceedings-article/iciddt/2020/036700a373/1wutGkEJbtS", "parentPublication": { "id": "proceedings/iciddt/2020/0367/0", "title": "2020 International Conference on Innovation Design and Digital Technology (ICIDDT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a133", "title": "Learning to Perceive: Perceptual Resolution Enhancement for VR Display with Efficient Neural Network Processing", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a133/1yeQzHQNgvC", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCbCrVL", "title": "Web Intelligence and Intelligent Agent Technology, International Conference on", "acronym": "wi-iatw", "groupId": "1001411", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNC4wtz1", "doi": "10.1109/WI-IATW.2006.55", "title": "Crime Pattern Detection Using Data Mining", "normalizedTitle": "Crime Pattern Detection Using Data Mining", "abstract": "Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. We applied these techniques to real crime data from a sheriff?s office and validated our results. We also use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy. We also developed a weighting scheme for attributes here to deal with limitations of various out of the box clustering tools and techniques. This easy to implement data mining framework works with the geo-spatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for homeland security.", "abstracts": [ { "abstractType": "Regular", "content": "Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. We applied these techniques to real crime data from a sheriff?s office and validated our results. We also use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy. We also developed a weighting scheme for attributes here to deal with limitations of various out of the box clustering tools and techniques. This easy to implement data mining framework works with the geo-spatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for homeland security.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. We applied these techniques to real crime data from a sheriff?s office and validated our results. We also use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy. We also developed a weighting scheme for attributes here to deal with limitations of various out of the box clustering tools and techniques. This easy to implement data mining framework works with the geo-spatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for homeland security.", "fno": "27490041", "keywords": [ "Crime Patterns", "Clustering", "Data Mining", "K Means", "Law Enforcement", "Semi Supervised Learning" ], "authors": [ { "affiliation": "Florida Atlantic University/Oracle Corporation, USA", "fullName": "Shyam Varan Nath", "givenName": "Shyam Varan", "surname": "Nath", "__typename": "ArticleAuthorType" } ], "idPrefix": "wi-iatw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-12-01T00:00:00", "pubType": "proceedings", "pages": "41-44", "year": "2006", "issn": null, "isbn": "0-7695-2749-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "27490037", "articleId": "12OmNyUWR96", "__typename": "AdjacentArticleType" }, "next": { "fno": "27490045", "articleId": "12OmNBr4eO1", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cine/2017/2529/0/2529a001", "title": "Identity Crime Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/cine/2017/2529a001/12OmNrF2DNn", "parentPublication": { "id": "proceedings/cine/2017/2529/0", "title": "2017 3rd International Conference on Computational Intelligence and Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2016/2857/0/07870197", "title": "Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870197/12OmNvq5jub", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2017/2385/0/2385a001", "title": "Detecting Crime Series Based on Route Estimation and Behavioral Similarity", "doi": null, "abstractUrl": "/proceedings-article/eisic/2017/2385a001/12OmNy3Agu7", "parentPublication": { "id": "proceedings/eisic/2017/2385/0", "title": "2017 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cine/2017/2529/0/2529a033", "title": "Crime Analysis Using K-Means Clustering", "doi": null, "abstractUrl": "/proceedings-article/cine/2017/2529a033/12OmNz2C1ng", "parentPublication": { "id": "proceedings/cine/2017/2529/0", "title": "2017 3rd International Conference on Computational Intelligence and Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wiiatw/2006/2749/0/04053200", "title": "Crime Pattern Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wiiatw/2006/04053200/12OmNzSh13t", "parentPublication": { "id": "proceedings/wiiatw/2006/2749/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence International Intelligence Agent Technology Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2012/4799/0/4799a887", "title": "Mining Hate Crimes to Figure Out Reasons Behind", "doi": null, "abstractUrl": "/proceedings-article/asonam/2012/4799a887/12OmNzTH0VE", "parentPublication": { "id": "proceedings/asonam/2012/4799/0", "title": "2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/co/2004/04/r4050", "title": "Crime Data Mining: A General Framework and Some Examples", "doi": null, "abstractUrl": "/magazine/co/2004/04/r4050/13rRUwhpBTf", "parentPublication": { "id": "mags/co", "title": "Computer", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633657", "title": "Time, Place, and Modus Operandi: A Simple Apriori Algorithm Experiment for Crime Pattern Detection", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633657/17D45VWpMz5", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2021/2845/0/284500a225", "title": "Crime Monitor: Monitoring Criminals from Trajectory Data", "doi": null, "abstractUrl": "/proceedings-article/mdm/2021/284500a225/1v2QCg0TgsM", "parentPublication": { "id": "proceedings/mdm/2021/2845/0", "title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsecs-icocsim/2021/1407/0/140700a453", "title": "Bangladesh Crime Reports Analysis and Prediction", "doi": null, "abstractUrl": "/proceedings-article/icsecs-icocsim/2021/140700a453/1wYlA5ZjdrG", "parentPublication": { "id": "proceedings/icsecs-icocsim/2021/1407/0", "title": "2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyoSbiB", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNvq5jub", "doi": "10.1109/EISIC.2016.024", "title": "Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data", "normalizedTitle": "Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data", "abstract": "Law enforcement agencies strive to link serial crimes, most preferably based on physical evidence, such as DNA or fingerprints, in order to solve criminal cases more efficiently. However, physical evidence is more common at crime scenes in some crime categories than others. For crime categories with relative low occurrence of physical evidence it could instead be possible to link related crimes using soft evidence based on the perpetrators' modus operandi (MO). However, crime linkage based on soft evidence is associated with considerably higher error-rates, i.e. crimes being incorrectly linked. In this study, we investigate the possibility of filtering erroneous crime links based on travel time between crimes using web-based direction services, more specifically Google maps. A filtering method has been designed, implemented and evaluated using two data sets of residential burglaries, one with known links between crimes, and one with estimated links based on soft evidence. The results show that the proposed route-based filtering method removed 79 % more erroneous crimes than the state-of-the-art method relying on Euclidean straight-line routes. Further, by analyzing travel times between crimes in known series it is indicated that burglars on average have up to 15 minutes for carrying out the actual burglary event.", "abstracts": [ { "abstractType": "Regular", "content": "Law enforcement agencies strive to link serial crimes, most preferably based on physical evidence, such as DNA or fingerprints, in order to solve criminal cases more efficiently. However, physical evidence is more common at crime scenes in some crime categories than others. For crime categories with relative low occurrence of physical evidence it could instead be possible to link related crimes using soft evidence based on the perpetrators' modus operandi (MO). However, crime linkage based on soft evidence is associated with considerably higher error-rates, i.e. crimes being incorrectly linked. In this study, we investigate the possibility of filtering erroneous crime links based on travel time between crimes using web-based direction services, more specifically Google maps. A filtering method has been designed, implemented and evaluated using two data sets of residential burglaries, one with known links between crimes, and one with estimated links based on soft evidence. The results show that the proposed route-based filtering method removed 79 % more erroneous crimes than the state-of-the-art method relying on Euclidean straight-line routes. Further, by analyzing travel times between crimes in known series it is indicated that burglars on average have up to 15 minutes for carrying out the actual burglary event.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Law enforcement agencies strive to link serial crimes, most preferably based on physical evidence, such as DNA or fingerprints, in order to solve criminal cases more efficiently. However, physical evidence is more common at crime scenes in some crime categories than others. For crime categories with relative low occurrence of physical evidence it could instead be possible to link related crimes using soft evidence based on the perpetrators' modus operandi (MO). However, crime linkage based on soft evidence is associated with considerably higher error-rates, i.e. crimes being incorrectly linked. In this study, we investigate the possibility of filtering erroneous crime links based on travel time between crimes using web-based direction services, more specifically Google maps. A filtering method has been designed, implemented and evaluated using two data sets of residential burglaries, one with known links between crimes, and one with estimated links based on soft evidence. The results show that the proposed route-based filtering method removed 79 % more erroneous crimes than the state-of-the-art method relying on Euclidean straight-line routes. Further, by analyzing travel times between crimes in known series it is indicated that burglars on average have up to 15 minutes for carrying out the actual burglary event.", "fno": "07870197", "keywords": [ "Criminal Law", "Information Filtering", "Internet", "Crime Series Filtering", "Route Calculations", "Spatio Temporal Data", "Law Enforcement Agencies", "Serial Crimes", "Physical Evidence", "Criminal Cases", "Crime Scenes", "Crime Categories", "Soft Evidence", "Perpetrators Modus Operandi", "Crime Linkage", "Erroneous Crime Links Filtering", "Travel Time", "Web Based Direction Services", "Google Maps", "Residential Burglaries", "Route Based Filtering", "Euclidean Straight Line Routes", "Burglary Event", "Google", "Filtering", "Law Enforcement", "Space Exploration", "DNA", "Area Measurement", "Transportation", "Crime Linkage", "Crime Filtering", "Route Analysis" ], "authors": [ { "affiliation": null, "fullName": "Martin Boldt", "givenName": "Martin", "surname": "Boldt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jaswanth Bala", "givenName": "Jaswanth", "surname": "Bala", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-08-01T00:00:00", "pubType": "proceedings", "pages": "92-95", "year": "2016", "issn": null, "isbn": "978-1-5090-2857-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07870196", "articleId": "12OmNBIFmvE", "__typename": "AdjacentArticleType" }, "next": { "fno": "07870198", "articleId": "12OmNxu6pbU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iatw/2006/2749/0/27490041", "title": "Crime Pattern Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wi-iatw/2006/27490041/12OmNC4wtz1", "parentPublication": { "id": "proceedings/wi-iatw/2006/2749/0", "title": "Web Intelligence and Intelligent Agent Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2018/4705/0/470501a017", "title": "A Data-Driven Approach for Spatio-Temporal Crime Predictions in Smart Cities", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2018/470501a017/12OmNvTBB8k", "parentPublication": { "id": "proceedings/smartcomp/2018/4705/0", "title": "2018 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2017/2385/0/2385a001", "title": "Detecting Crime Series Based on Route Estimation and Behavioral Similarity", "doi": null, "abstractUrl": "/proceedings-article/eisic/2017/2385a001/12OmNy3Agu7", "parentPublication": { "id": "proceedings/eisic/2017/2385/0", "title": "2017 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cine/2017/2529/0/2529a033", "title": "Crime Analysis Using K-Means Clustering", "doi": null, "abstractUrl": "/proceedings-article/cine/2017/2529a033/12OmNz2C1ng", "parentPublication": { "id": "proceedings/cine/2017/2529/0", "title": "2017 3rd International Conference on Computational Intelligence and Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wiiatw/2006/2749/0/04053200", "title": "Crime Pattern Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wiiatw/2006/04053200/12OmNzSh13t", "parentPublication": { "id": "proceedings/wiiatw/2006/2749/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence International Intelligence Agent Technology Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ares/2009/3564/0/3564a143", "title": "The Anatomy of Electronic Evidence - Quantitative Analysis of Police E-Crime Data", "doi": null, "abstractUrl": "/proceedings-article/ares/2009/3564a143/12OmNzlUKee", "parentPublication": { "id": "proceedings/ares/2009/3564/0", "title": "2009 International Conference on Availability, Reliability and Security", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2018/9400/0/08752959", "title": "Multi-Expert Estimations of Burglars&#x0027; Risk Exposure and Level of Pre-Crime Preparation Using Coded Crime Scene Data: Work in Progress", "doi": null, "abstractUrl": "/proceedings-article/eisic/2018/08752959/1bolVuBx5HW", "parentPublication": { "id": "proceedings/eisic/2018/9400/0", "title": "2018 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/04/08869805", "title": "CrimAnalyzer: Understanding Crime Patterns in S&#x00E3;o Paulo", "doi": null, "abstractUrl": "/journal/tg/2021/04/08869805/1e9hb0tlqpy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsecs-icocsim/2021/1407/0/140700a453", "title": "Bangladesh Crime Reports Analysis and Prediction", "doi": null, "abstractUrl": "/proceedings-article/icsecs-icocsim/2021/140700a453/1wYlA5ZjdrG", "parentPublication": { "id": "proceedings/icsecs-icocsim/2021/1407/0", "title": "2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icecem/2021/1025/0/102500a388", "title": "Analysis of Hate Crime Rates in the United States: Statistical Modeling of Public Safety Issues Based on Socioeconomic Factors", "doi": null, "abstractUrl": "/proceedings-article/icecem/2021/102500a388/1zpETefXw1G", "parentPublication": { "id": "proceedings/icecem/2021/1025/0", "title": "2021 International Conference on E-Commerce and E-Management (ICECEM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy314bv", "title": "2016 5th Brazilian Conference on Intelligent Systems (BRACIS)", "acronym": "bracis", "groupId": "1803430", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNwBjP6k", "doi": "10.1109/BRACIS.2016.067", "title": "An Ontology for Property Crime Based on Events from UFO-B Foundational Ontology", "normalizedTitle": "An Ontology for Property Crime Based on Events from UFO-B Foundational Ontology", "abstract": "Property Crime has been highlighted as one of the major criminal offenses within the Brazilian Legal System. Moreover, it is common that there is some misunderstanding amongst the subtypes of this crime, such as Theft, Robbery, Misappropriation, and Extortion. We still emphasize the verynuance of legal literature that makes this domain as hostile as challenging: a weakly formalized knowledge, the presence of conflicts and ambiguities between norms, the heterogeneity of legal literature, as well as the diversity in reasoning models. Therefore, this article presents, inspired by UFO-B foundational ontology, a conceptual model for the representation of crimes against property in the Brazilian Criminal Code, in order to support some decision-making process, as the agents behavior classification and the inference of punishments. Thus, we present throughout this article, an ontological formalization for the Theory of Crime from Brazilian Penal Code, as well as for Property Crimes applications.", "abstracts": [ { "abstractType": "Regular", "content": "Property Crime has been highlighted as one of the major criminal offenses within the Brazilian Legal System. Moreover, it is common that there is some misunderstanding amongst the subtypes of this crime, such as Theft, Robbery, Misappropriation, and Extortion. We still emphasize the verynuance of legal literature that makes this domain as hostile as challenging: a weakly formalized knowledge, the presence of conflicts and ambiguities between norms, the heterogeneity of legal literature, as well as the diversity in reasoning models. Therefore, this article presents, inspired by UFO-B foundational ontology, a conceptual model for the representation of crimes against property in the Brazilian Criminal Code, in order to support some decision-making process, as the agents behavior classification and the inference of punishments. Thus, we present throughout this article, an ontological formalization for the Theory of Crime from Brazilian Penal Code, as well as for Property Crimes applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Property Crime has been highlighted as one of the major criminal offenses within the Brazilian Legal System. Moreover, it is common that there is some misunderstanding amongst the subtypes of this crime, such as Theft, Robbery, Misappropriation, and Extortion. We still emphasize the verynuance of legal literature that makes this domain as hostile as challenging: a weakly formalized knowledge, the presence of conflicts and ambiguities between norms, the heterogeneity of legal literature, as well as the diversity in reasoning models. Therefore, this article presents, inspired by UFO-B foundational ontology, a conceptual model for the representation of crimes against property in the Brazilian Criminal Code, in order to support some decision-making process, as the agents behavior classification and the inference of punishments. Thus, we present throughout this article, an ontological formalization for the Theory of Crime from Brazilian Penal Code, as well as for Property Crimes applications.", "fno": "07839608", "keywords": [ "Decision Making", "Law Administration", "Ontologies Artificial Intelligence", "Property Crime", "UFO B Foundational Ontology Events", "United Foundational Ontology", "Criminal Offenses", "Brazilian Legal System", "Brazilian Criminal Code", "Decision Making Process", "Agents Behavior Classification", "Punishment Inference", "Ontological Formalization", "Brazilian Penal Code", "Legal Computing", "Ontologies", "Criminal Law", "Cognition", "Art", "Informatics", "Legal Knowledge Representation And Reasoning", "Ontology", "Property Crime" ], "authors": [ { "affiliation": "Center of Inf., Fed. Univ. of Pernambuco, Recife, Brazil", "fullName": "Cleyton Mário de Oliveira Rodrigues", "givenName": "Cleyton Mário de Oliveira", "surname": "Rodrigues", "__typename": "ArticleAuthorType" }, { "affiliation": "Center of Inf., Fed. Univ. of Pernambuco, Recife, Brazil", "fullName": "Frederico Luiz Gonçalves de Freitas", "givenName": "Frederico Luiz", "surname": "Gonçalves de Freitas", "__typename": "ArticleAuthorType" }, { "affiliation": "Center of Inf., Fed. Univ. of Pernambuco, Recife, Brazil", "fullName": "Ryan Ribeiro De Azevedo", "givenName": "Ryan", "surname": "Ribeiro De Azevedo", "__typename": "ArticleAuthorType" } ], "idPrefix": "bracis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-10-01T00:00:00", "pubType": "proceedings", "pages": "331-336", "year": "2016", "issn": null, "isbn": "978-1-5090-3566-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07839607", "articleId": "12OmNyKJiz0", "__typename": "AdjacentArticleType" }, "next": { "fno": "07839609", "articleId": "12OmNBJw9Ts", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2016/2857/0/07870197", "title": "Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870197/12OmNvq5jub", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc/2011/4612/0/4612a846", "title": "Organized Crime Structures in Co-offending Networks", "doi": null, "abstractUrl": "/proceedings-article/dasc/2011/4612a846/12OmNwDj1dV", "parentPublication": { "id": "proceedings/dasc/2011/4612/0", "title": "Dependable, Autonomic and Secure Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/citworkshops/2008/3242/0/3242a122", "title": "An Analysis of Data Mining Applications in Crime Domain", "doi": null, "abstractUrl": "/proceedings-article/citworkshops/2008/3242a122/12OmNyRxFAs", "parentPublication": { "id": "proceedings/citworkshops/2008/3242/0", "title": "Computer and Information Technology, IEEE 8th International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/snpd/2017/5504/0/08022696", "title": "A scheme of criminal law knowledge acquisition using ontology", "doi": null, "abstractUrl": "/proceedings-article/snpd/2017/08022696/12OmNzFdt3F", "parentPublication": { "id": "proceedings/snpd/2017/5504/0", "title": "2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscsic/2022/5488/0/548800a342", "title": "GAME-BC: A Graph Attention Model for Exploring Bitcoin Crime", "doi": null, "abstractUrl": "/proceedings-article/iscsic/2022/548800a342/1LvAoWvBP2M", "parentPublication": { "id": "proceedings/iscsic/2022/5488/0", "title": "2022 6th International Symposium on Computer Science and Intelligent Control (ISCSIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icphds/2020/8571/0/857100a043", "title": "Research on the judicial application of the crime of impairing the prevention and control of infectious diseases under the background of novel coronavirus epidemic", "doi": null, "abstractUrl": "/proceedings-article/icphds/2020/857100a043/1rxhpq4pQtO", "parentPublication": { "id": "proceedings/icphds/2020/8571/0", "title": "2020 International Conference on Public Health and Data Science (ICPHDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2020/2261/0/226100a150", "title": "Crime Analysis of spatial-temporal distribution based on KNN Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icise/2020/226100a150/1tnYge1XNMA", "parentPublication": { "id": "proceedings/icise/2020/2261/0", "title": "2020 International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2021/2845/0/284500a225", "title": "Crime Monitor: Monitoring Criminals from Trajectory Data", "doi": null, "abstractUrl": "/proceedings-article/mdm/2021/284500a225/1v2QCg0TgsM", "parentPublication": { "id": "proceedings/mdm/2021/2845/0", "title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09536407", "title": "CriPAV: Street-Level Crime Patterns Analysis and Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/12/09536407/1wRE7UAvlrq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2021/3827/0/382700a267", "title": "The sight of Justice. Visual knowledge mining, legal data and computational crime analysis", "doi": null, "abstractUrl": "/proceedings-article/iv/2021/382700a267/1y4oGeGNWOA", "parentPublication": { "id": "proceedings/iv/2021/3827/0", "title": "2021 25th International Conference Information Visualisation (IV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNB836KT", "title": "2017 European Intelligence and Security Informatics Conference (EISIC)", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNy3Agu7", "doi": "10.1109/EISIC.2017.10", "title": "Detecting Crime Series Based on Route Estimation and Behavioral Similarity", "normalizedTitle": "Detecting Crime Series Based on Route Estimation and Behavioral Similarity", "abstract": "A majority of crimes are committed by a minority of offenders. Previous research has provided some support for the theory that serial offenders leave behavioral traces on the crime scene which could be used to link crimes to serial offenders. The aim of this work is to investigate to what extent it is possible to use geographic route estimations and behavioral data to detect serial offenders. Experiments were conducted using behavioral data from authentic burglary reports to investigate if it was possible to find crime routes with high similarity. Further, the use of burglary reports from serial offenders to investigate to what extent it was possible to detect serial offender crime routes. The result show that crime series with the same offender on average had a higher behavioral similarity than random crime series. Sets of crimes with high similarity, but without a known offender would be interesting for law enforcement to investigate further. The algorithm is also evaluated on 9 crime series containing a maximum of 20 crimes per series. The results suggest that it is possible to detect crime series with high similarity using analysis of both geographic routes and behavioral data recorded at crime scenes.", "abstracts": [ { "abstractType": "Regular", "content": "A majority of crimes are committed by a minority of offenders. Previous research has provided some support for the theory that serial offenders leave behavioral traces on the crime scene which could be used to link crimes to serial offenders. The aim of this work is to investigate to what extent it is possible to use geographic route estimations and behavioral data to detect serial offenders. Experiments were conducted using behavioral data from authentic burglary reports to investigate if it was possible to find crime routes with high similarity. Further, the use of burglary reports from serial offenders to investigate to what extent it was possible to detect serial offender crime routes. The result show that crime series with the same offender on average had a higher behavioral similarity than random crime series. Sets of crimes with high similarity, but without a known offender would be interesting for law enforcement to investigate further. The algorithm is also evaluated on 9 crime series containing a maximum of 20 crimes per series. The results suggest that it is possible to detect crime series with high similarity using analysis of both geographic routes and behavioral data recorded at crime scenes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A majority of crimes are committed by a minority of offenders. Previous research has provided some support for the theory that serial offenders leave behavioral traces on the crime scene which could be used to link crimes to serial offenders. The aim of this work is to investigate to what extent it is possible to use geographic route estimations and behavioral data to detect serial offenders. Experiments were conducted using behavioral data from authentic burglary reports to investigate if it was possible to find crime routes with high similarity. Further, the use of burglary reports from serial offenders to investigate to what extent it was possible to detect serial offender crime routes. The result show that crime series with the same offender on average had a higher behavioral similarity than random crime series. Sets of crimes with high similarity, but without a known offender would be interesting for law enforcement to investigate further. The algorithm is also evaluated on 9 crime series containing a maximum of 20 crimes per series. The results suggest that it is possible to detect crime series with high similarity using analysis of both geographic routes and behavioral data recorded at crime scenes.", "fno": "2385a001", "keywords": [ "Law Enforcement", "Algorithm Design And Analysis", "Couplings", "Forensics", "Decision Support Systems", "DNA", "Estimation", "Crime Route Analysis", "Crime Linkage", "Residential Burglary", "Behavioral Analysis" ], "authors": [ { "affiliation": null, "fullName": "Anton Borg", "givenName": "Anton", "surname": "Borg", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Martin Boldt", "givenName": "Martin", "surname": "Boldt", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Johan Eliasson", "givenName": "Johan", "surname": "Eliasson", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-09-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2017", "issn": null, "isbn": "978-1-5386-2385-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2385z014", "articleId": "12OmNyen1wu", "__typename": "AdjacentArticleType" }, "next": { "fno": "2385a017", "articleId": "12OmNzQzqi5", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2013/5062/0/06657122", "title": "How \"Digital\" is Traditional Crime?", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657122/12OmNBTs7A9", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a060", "title": "A Computational Model for Predicting the Location of Crime Attractors on a Road Network", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a060/12OmNBpmDKW", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi-iatw/2006/2749/0/27490041", "title": "Crime Pattern Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wi-iatw/2006/27490041/12OmNC4wtz1", "parentPublication": { "id": "proceedings/wi-iatw/2006/2749/0", "title": "Web Intelligence and Intelligent Agent Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2013/5062/0/06657128", "title": "Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement", "doi": null, "abstractUrl": "/proceedings-article/eisic/2013/06657128/12OmNrGb2e4", "parentPublication": { "id": "proceedings/eisic/2013/5062/0", "title": "2013 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a070", "title": "Analyzing an Offender's Journey to Crime: A Criminal Movement Model (CriMM)", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a070/12OmNs59JOo", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2016/2857/0/07870197", "title": "Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870197/12OmNvq5jub", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a038", "title": "SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a038/12OmNwJgAET", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2014/5877/0/06921628", "title": "CRIMETRACER: Activity space based crime location prediction", "doi": null, "abstractUrl": "/proceedings-article/asonam/2014/06921628/12OmNwLOYQP", "parentPublication": { "id": "proceedings/asonam/2014/5877/0", "title": "2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2018/9400/0/08752959", "title": "Multi-Expert Estimations of Burglars&#x0027; Risk Exposure and Level of Pre-Crime Preparation Using Coded Crime Scene Data: Work in Progress", "doi": null, "abstractUrl": "/proceedings-article/eisic/2018/08752959/1bolVuBx5HW", "parentPublication": { "id": "proceedings/eisic/2018/9400/0", "title": "2018 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2021/2845/0/284500a225", "title": "Crime Monitor: Monitoring Criminals from Trajectory Data", "doi": null, "abstractUrl": "/proceedings-article/mdm/2021/284500a225/1v2QCg0TgsM", "parentPublication": { "id": "proceedings/mdm/2021/2845/0", "title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNy6qfNW", "title": "European Intelligence and Security Informatics Conference", "acronym": "eisic", "groupId": "1800545", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyY4rqf", "doi": "10.1109/EISIC.2011.34", "title": "Finding Criminal Attractors Based on Offenders' Directionality of Crimes", "normalizedTitle": "Finding Criminal Attractors Based on Offenders' Directionality of Crimes", "abstract": "According to Crime Pattern Theory, individuals all have routine daily activities which require frequent travel between several nodes, with each being used for a different purpose, such as home, work or shopping. As people move between these nodes, their familiarity with the spatial area around the nodes, as well as between nodes, increases. Offenders have the same spatial movement patterns and Awareness Spaces as regular people, hence according to theory an offender will commit the crimes in their own Awareness Space. This idea is used to predict the location of the nodes within the Awareness Space of offenders. The activities of 57,962 offenders who were charged or charges were recommended against them were used to test this idea by mapping their offense locations with respect to their home locations to determine the directions they move. Once directionality to crime was established for each offender, a unique clustering technique, based on K-Means, was used to calculate their Cardinal Directions through which the awareness nodes for all offenders were calculated. It was found that, by looking at the results of various clustering parameters, offenders tend to move towards central shopping areas in a city, and commit crimes along the way. Almost all cluster centers were within one kilometer of a shopping center. This technique of finding Criminal Attractors allows for the reconstruction of the spatial profile of offenders, which allows for narrowing the possible suspects for new crimes.", "abstracts": [ { "abstractType": "Regular", "content": "According to Crime Pattern Theory, individuals all have routine daily activities which require frequent travel between several nodes, with each being used for a different purpose, such as home, work or shopping. As people move between these nodes, their familiarity with the spatial area around the nodes, as well as between nodes, increases. Offenders have the same spatial movement patterns and Awareness Spaces as regular people, hence according to theory an offender will commit the crimes in their own Awareness Space. This idea is used to predict the location of the nodes within the Awareness Space of offenders. The activities of 57,962 offenders who were charged or charges were recommended against them were used to test this idea by mapping their offense locations with respect to their home locations to determine the directions they move. Once directionality to crime was established for each offender, a unique clustering technique, based on K-Means, was used to calculate their Cardinal Directions through which the awareness nodes for all offenders were calculated. It was found that, by looking at the results of various clustering parameters, offenders tend to move towards central shopping areas in a city, and commit crimes along the way. Almost all cluster centers were within one kilometer of a shopping center. This technique of finding Criminal Attractors allows for the reconstruction of the spatial profile of offenders, which allows for narrowing the possible suspects for new crimes.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "According to Crime Pattern Theory, individuals all have routine daily activities which require frequent travel between several nodes, with each being used for a different purpose, such as home, work or shopping. As people move between these nodes, their familiarity with the spatial area around the nodes, as well as between nodes, increases. Offenders have the same spatial movement patterns and Awareness Spaces as regular people, hence according to theory an offender will commit the crimes in their own Awareness Space. This idea is used to predict the location of the nodes within the Awareness Space of offenders. The activities of 57,962 offenders who were charged or charges were recommended against them were used to test this idea by mapping their offense locations with respect to their home locations to determine the directions they move. Once directionality to crime was established for each offender, a unique clustering technique, based on K-Means, was used to calculate their Cardinal Directions through which the awareness nodes for all offenders were calculated. It was found that, by looking at the results of various clustering parameters, offenders tend to move towards central shopping areas in a city, and commit crimes along the way. Almost all cluster centers were within one kilometer of a shopping center. This technique of finding Criminal Attractors allows for the reconstruction of the spatial profile of offenders, which allows for narrowing the possible suspects for new crimes.", "fno": "4406a086", "keywords": [ "Offender Profile", "Directionality", "Clustering", "Criminal Attractor" ], "authors": [ { "affiliation": null, "fullName": "Richard Frank", "givenName": "Richard", "surname": "Frank", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Martin A. Andresen", "givenName": "Martin A.", "surname": "Andresen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Connie Cheng", "givenName": "Connie", "surname": "Cheng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Patricia Brantingham", "givenName": "Patricia", "surname": "Brantingham", "__typename": "ArticleAuthorType" } ], "idPrefix": "eisic", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-09-01T00:00:00", "pubType": "proceedings", "pages": "86-93", "year": "2011", "issn": null, "isbn": "978-0-7695-4406-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4406a078", "articleId": "12OmNxRnvPk", "__typename": "AdjacentArticleType" }, "next": { "fno": "4406a094", "articleId": "12OmNB836MV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/eisic/2012/4782/0/4782a060", "title": "A Computational Model for Predicting the Location of Crime Attractors on a Road Network", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a060/12OmNBpmDKW", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2011/4406/0/4406a070", "title": "Analyzing an Offender's Journey to Crime: A Criminal Movement Model (CriMM)", "doi": null, "abstractUrl": "/proceedings-article/eisic/2011/4406a070/12OmNs59JOo", "parentPublication": { "id": "proceedings/eisic/2011/4406/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2012/4782/0/4782a038", "title": "SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile", "doi": null, "abstractUrl": "/proceedings-article/eisic/2012/4782a038/12OmNwJgAET", "parentPublication": { "id": "proceedings/eisic/2012/4782/0", "title": "European Intelligence and Security Informatics Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNyKa6fg", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence International Intelligence Agent Technology Workshops", "acronym": "wiiatw", "groupId": "1001412", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNzSh13t", "doi": "10.1109/WI-IATW.2006.55", "title": "Crime Pattern Detection Using Data Mining", "normalizedTitle": "Crime Pattern Detection Using Data Mining", "abstract": "Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. We applied these techniques to real crime data from a sheriff's office and validated our results. We also use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy. We also developed a weighting scheme for attributes here to deal with limitations of various out of the box clustering tools and techniques. This easy to implement data mining framework works with the geospatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for homeland security", "abstracts": [ { "abstractType": "Regular", "content": "Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. We applied these techniques to real crime data from a sheriff's office and validated our results. We also use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy. We also developed a weighting scheme for attributes here to deal with limitations of various out of the box clustering tools and techniques. This easy to implement data mining framework works with the geospatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for homeland security", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes faster will pay for itself. About 10% of the criminals commit about 50% of the crimes. Here we look at use of clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. We applied these techniques to real crime data from a sheriff's office and validated our results. We also use semi-supervised learning technique here for knowledge discovery from the crime records and to help increase the predictive accuracy. We also developed a weighting scheme for attributes here to deal with limitations of various out of the box clustering tools and techniques. This easy to implement data mining framework works with the geospatial plot of crime and helps to improve the productivity of the detectives and other law enforcement officers. It can also be applied for counter terrorism for homeland security", "fno": "04053200", "keywords": [ "Data Mining", "Learning Artificial Intelligence", "Pattern Clustering", "Police Data Processing", "Crime Pattern Detection", "Data Mining Approach", "K Means Clustering Algorithm", "Semisupervised Learning Technique", "Knowledge Discovery", "Data Mining", "Law Enforcement", "Semisupervised Learning", "Terrorism", "Computer Crime", "Data Analysis", "Intelligent Agent", "Costs", "Clustering Algorithms", "Accuracy", "Crime Patterns", "Clustering", "Data Mining", "K Means", "Law Enforcement", "Semi Supervised Learning" ], "authors": [ { "affiliation": "Florida Atlantic University/Oracle Corporation, USA", "fullName": "Shyam Varan Nath", "givenName": "Shyam Varan", "surname": "Nath", "__typename": "ArticleAuthorType" } ], "idPrefix": "wiiatw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-12-01T00:00:00", "pubType": "proceedings", "pages": "41-44", "year": "2006", "issn": null, "isbn": "0-7695-2749-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "04053194", "articleId": "12OmNzcxYXD", "__typename": "AdjacentArticleType" }, "next": { "fno": "04053203", "articleId": "1iffROaGNPi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iatw/2006/2749/0/27490041", "title": "Crime Pattern Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wi-iatw/2006/27490041/12OmNC4wtz1", "parentPublication": { "id": "proceedings/wi-iatw/2006/2749/0", "title": "Web Intelligence and Intelligent Agent Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cine/2017/2529/0/2529a001", "title": "Identity Crime Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/cine/2017/2529a001/12OmNrF2DNn", "parentPublication": { "id": "proceedings/cine/2017/2529/0", "title": "2017 3rd International Conference on Computational Intelligence and Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/smartcomp/2018/4705/0/470501a017", "title": "A Data-Driven Approach for Spatio-Temporal Crime Predictions in Smart Cities", "doi": null, "abstractUrl": "/proceedings-article/smartcomp/2018/470501a017/12OmNvTBB8k", "parentPublication": { "id": "proceedings/smartcomp/2018/4705/0", "title": "2018 IEEE International Conference on Smart Computing (SMARTCOMP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2016/2857/0/07870197", "title": "Filtering Estimated Crime Series Based on Route Calculations on Spatio-temporal Data", "doi": null, "abstractUrl": "/proceedings-article/eisic/2016/07870197/12OmNvq5jub", "parentPublication": { "id": "proceedings/eisic/2016/2857/0", "title": "2016 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2017/2385/0/2385a001", "title": "Detecting Crime Series Based on Route Estimation and Behavioral Similarity", "doi": null, "abstractUrl": "/proceedings-article/eisic/2017/2385a001/12OmNy3Agu7", "parentPublication": { "id": "proceedings/eisic/2017/2385/0", "title": "2017 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cine/2017/2529/0/2529a033", "title": "Crime Analysis Using K-Means Clustering", "doi": null, "abstractUrl": "/proceedings-article/cine/2017/2529a033/12OmNz2C1ng", "parentPublication": { "id": "proceedings/cine/2017/2529/0", "title": "2017 3rd International Conference on Computational Intelligence and Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633657", "title": "Time, Place, and Modus Operandi: A Simple Apriori Algorithm Experiment for Crime Pattern Detection", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633657/17D45VWpMz5", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/04/08869805", "title": "CrimAnalyzer: Understanding Crime Patterns in S&#x00E3;o Paulo", "doi": null, "abstractUrl": "/journal/tg/2021/04/08869805/1e9hb0tlqpy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2021/2845/0/284500a225", "title": "Crime Monitor: Monitoring Criminals from Trajectory Data", "doi": null, "abstractUrl": "/proceedings-article/mdm/2021/284500a225/1v2QCg0TgsM", "parentPublication": { "id": "proceedings/mdm/2021/2845/0", "title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsecs-icocsim/2021/1407/0/140700a453", "title": "Bangladesh Crime Reports Analysis and Prediction", "doi": null, "abstractUrl": "/proceedings-article/icsecs-icocsim/2021/140700a453/1wYlA5ZjdrG", "parentPublication": { "id": "proceedings/icsecs-icocsim/2021/1407/0", "title": "2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1n0IuIFDJNm", "title": "2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)", "acronym": "iri", "groupId": "1001046", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1n0IvuKWGWY", "doi": "10.1109/IRI49571.2020.00040", "title": "Studying the impact of streetlights on street crime rate using geo-statistics", "normalizedTitle": "Studying the impact of streetlights on street crime rate using geo-statistics", "abstract": "Lack of adequate streetlights likely affect public safety, particularly in neighborhoods with higher crime rates. Several researchers have studied the influence of streetlights on crime. However, those studies compare the crime rate during the day and not night or explore crime patterns in socially disorganized communities. This study focuses on detecting the pattern of nighttime street crime near a broken or due-for-repair streetlights. Historical crime data and data on city streetlight service requests studied in this project. Analytical approaches for this projects include the least squares linear regression model applied to determine the relationship between streetlight and crime data and Ripley's K function is used to detect crime clusters near broken streetlights. The Moran's I index is used to measuring the spatial correlation between broken streetlights and crime rates. Optimized hotspot analysis is used to predict crime locations. This study found that broken streetlights cause increasing trends of crime near them The Moran's I index's large positive value underscored the statistically-significant clustering of street crimes around broken streetlights.", "abstracts": [ { "abstractType": "Regular", "content": "Lack of adequate streetlights likely affect public safety, particularly in neighborhoods with higher crime rates. Several researchers have studied the influence of streetlights on crime. However, those studies compare the crime rate during the day and not night or explore crime patterns in socially disorganized communities. This study focuses on detecting the pattern of nighttime street crime near a broken or due-for-repair streetlights. Historical crime data and data on city streetlight service requests studied in this project. Analytical approaches for this projects include the least squares linear regression model applied to determine the relationship between streetlight and crime data and Ripley's K function is used to detect crime clusters near broken streetlights. The Moran's I index is used to measuring the spatial correlation between broken streetlights and crime rates. Optimized hotspot analysis is used to predict crime locations. This study found that broken streetlights cause increasing trends of crime near them The Moran's I index's large positive value underscored the statistically-significant clustering of street crimes around broken streetlights.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Lack of adequate streetlights likely affect public safety, particularly in neighborhoods with higher crime rates. Several researchers have studied the influence of streetlights on crime. However, those studies compare the crime rate during the day and not night or explore crime patterns in socially disorganized communities. This study focuses on detecting the pattern of nighttime street crime near a broken or due-for-repair streetlights. Historical crime data and data on city streetlight service requests studied in this project. Analytical approaches for this projects include the least squares linear regression model applied to determine the relationship between streetlight and crime data and Ripley's K function is used to detect crime clusters near broken streetlights. The Moran's I index is used to measuring the spatial correlation between broken streetlights and crime rates. Optimized hotspot analysis is used to predict crime locations. This study found that broken streetlights cause increasing trends of crime near them The Moran's I index's large positive value underscored the statistically-significant clustering of street crimes around broken streetlights.", "fno": "09191384", "keywords": [ "Data Analysis", "Geographic Information Systems", "Lightning", "Pattern Clustering", "Police Data Processing", "Regression Analysis", "Nighttime Street Crime", "Broken Repair Streetlights", "Due For Repair Streetlights", "City Streetlight Service Requests", "Crime Clusters", "Crime Locations", "Street Crime Rate", "Streetlight Impact", "Geostatistics", "Least Squares Linear Regression", "Crime Data", "Ripleys K Function", "Hotspot Analysis", "Street Crime Clustering", "Correlation", "Urban Areas", "Indexes", "Analytical Models", "Data Models", "Maintenance Engineering", "Data Mining", "Geo Statistics", "Spatial Temporal Data", "GIS", "Machine Learning", "Clustering", "Smart Cities" ], "authors": [ { "affiliation": "George Mason University,Department of Information Sciences and Technology,Fairfax,VA,USA", "fullName": "Srikanth Vadlamani", "givenName": "Srikanth", "surname": "Vadlamani", "__typename": "ArticleAuthorType" }, { "affiliation": "George Mason University,Department of Information Sciences and Technology,Fairfax,VA,USA", "fullName": "Mahdi Hashemi", "givenName": "Mahdi", "surname": "Hashemi", "__typename": "ArticleAuthorType" } ], "idPrefix": "iri", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-08-01T00:00:00", "pubType": "proceedings", "pages": "231-236", "year": "2020", "issn": null, "isbn": "978-1-7281-1054-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09191515", "articleId": "1n0Iw7KNSUw", "__typename": "AdjacentArticleType" }, "next": { "fno": "09191524", "articleId": "1n0IvaPU00g", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iiai-aai/2017/0621/0/0621b029", "title": "Using Machine Learning to Assist Crime Prevention", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2017/0621b029/12OmNANTAqC", "parentPublication": { "id": "proceedings/iiai-aai/2017/0621/0", "title": "2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800b158", "title": "Exploring Transfer Learning for Crime Prediction", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800b158/12OmNwM6A4W", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wi/2016/4470/0/4470a526", "title": "Mining Social Media Content for Crime Prediction", "doi": null, "abstractUrl": "/proceedings-article/wi/2016/4470a526/12OmNxd4txo", "parentPublication": { "id": "proceedings/wi/2016/4470/0", "title": "2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsoft/2015/8139/1/07521166", "title": "A proposal of web data mining application for mapping crime areas in the Czech Republic", "doi": null, "abstractUrl": "/proceedings-article/icsoft/2015/07521166/12OmNyrIaCI", "parentPublication": { "id": "proceedings/icsoft/2015/8139/1", "title": "2015 10th International Joint Conference on Software Technologies (ICSOFT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/2019/02/08234616", "title": "Non-Stationary Model for Crime Rate Inference Using Modern Urban Data", "doi": null, "abstractUrl": "/journal/bd/2019/02/08234616/13rRUxOvebJ", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbd/2018/8034/0/803400a177", "title": "Spatio-Temporal Pattern Analysis and Prediction for Urban Crime", "doi": null, "abstractUrl": "/proceedings-article/cbd/2018/803400a177/17D45XERmlu", "parentPublication": { "id": "proceedings/cbd/2018/8034/0", "title": "2018 Sixth International Conference on Advanced Cloud and Big Data (CBD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/asonam/2019/6868/0/09072958", "title": "Computational Method for Identifying the Boundaries of Crime with Street Profile and Discrete Calculus", "doi": null, "abstractUrl": "/proceedings-article/asonam/2019/09072958/1jjA5UeiXHq", "parentPublication": { "id": "proceedings/asonam/2019/6868/0", "title": "2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icuems/2020/8832/0/09151487", "title": "Urban Street Landscape Analysis Based on Street View Image Recognition", "doi": null, "abstractUrl": "/proceedings-article/icuems/2020/09151487/1lRlQi3DwOI", "parentPublication": { "id": "proceedings/icuems/2020/8832/0", "title": "2020 International Conference on Urban Engineering and Management Science (ICUEMS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09377984", "title": "Interpretable Hawkes Process Spatial Crime Forecasting with TV-Regularization", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09377984/1s64cNH3zVK", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09536407", "title": "CriPAV: Street-Level Crime Patterns Analysis and Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/12/09536407/1wRE7UAvlrq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1wYlqB71SXm", "title": "2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM)", "acronym": "icsecs-icocsim", "groupId": "1843065", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1wYlA5ZjdrG", "doi": "10.1109/ICSECS52883.2021.00089", "title": "Bangladesh Crime Reports Analysis and Prediction", "normalizedTitle": "Bangladesh Crime Reports Analysis and Prediction", "abstract": "The systematic method of detecting crime, evaluating crime patterns, and anticipating crime trends is known as crime analysis and prediction. Crime is inherently unexpected and causes societal disruption. As Bangladesh&#x2019;s population grows, so does the prevalence of crime, which is wreaking havoc on our society in various ways. As a result, analyzing crime data has become crucial for a better understanding of future crime patterns. Machine learning and data mining techniques can be quite useful in predicting future crime trends and patterns in this situation. Various machine learning algorithms are utilized in this study to predict future crime patterns in Bangladesh. The crime statistics are gathered from the Bangladesh Police website to analyse and predict dacoity, robbery, murder, women and child repression, kidnapping, burglary, theft, and other crimes in Bangladesh&#x2019;s various regions. Another dataset from ACLED has been used to predict different kinds of events such as battles, explosions, protests, riots, strategic developments, violence against civilians with geolocations of the events. This research might assist Bangladesh police and law enforcement authorities to predict, prevent, and solve future crimes. The performance and success rate of the project are highly satisfactory. All resources of the project can be found at https://tinyurl.com/297yykmu", "abstracts": [ { "abstractType": "Regular", "content": "The systematic method of detecting crime, evaluating crime patterns, and anticipating crime trends is known as crime analysis and prediction. Crime is inherently unexpected and causes societal disruption. As Bangladesh&#x2019;s population grows, so does the prevalence of crime, which is wreaking havoc on our society in various ways. As a result, analyzing crime data has become crucial for a better understanding of future crime patterns. Machine learning and data mining techniques can be quite useful in predicting future crime trends and patterns in this situation. Various machine learning algorithms are utilized in this study to predict future crime patterns in Bangladesh. The crime statistics are gathered from the Bangladesh Police website to analyse and predict dacoity, robbery, murder, women and child repression, kidnapping, burglary, theft, and other crimes in Bangladesh&#x2019;s various regions. Another dataset from ACLED has been used to predict different kinds of events such as battles, explosions, protests, riots, strategic developments, violence against civilians with geolocations of the events. This research might assist Bangladesh police and law enforcement authorities to predict, prevent, and solve future crimes. The performance and success rate of the project are highly satisfactory. All resources of the project can be found at https://tinyurl.com/297yykmu", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The systematic method of detecting crime, evaluating crime patterns, and anticipating crime trends is known as crime analysis and prediction. Crime is inherently unexpected and causes societal disruption. As Bangladesh’s population grows, so does the prevalence of crime, which is wreaking havoc on our society in various ways. As a result, analyzing crime data has become crucial for a better understanding of future crime patterns. Machine learning and data mining techniques can be quite useful in predicting future crime trends and patterns in this situation. Various machine learning algorithms are utilized in this study to predict future crime patterns in Bangladesh. The crime statistics are gathered from the Bangladesh Police website to analyse and predict dacoity, robbery, murder, women and child repression, kidnapping, burglary, theft, and other crimes in Bangladesh’s various regions. Another dataset from ACLED has been used to predict different kinds of events such as battles, explosions, protests, riots, strategic developments, violence against civilians with geolocations of the events. This research might assist Bangladesh police and law enforcement authorities to predict, prevent, and solve future crimes. The performance and success rate of the project are highly satisfactory. All resources of the project can be found at https://tinyurl.com/297yykmu", "fno": "140700a453", "keywords": [ "Data Mining", "Learning Artificial Intelligence", "Police Data Processing", "Anticipating Crime Trends", "Crime Analysis", "Bangladeshs Population", "Crime Data", "Future Crime Patterns", "Data Mining Techniques", "Future Crime Trends", "Crime Statistics", "Bangladesh Police Website", "Future Crimes", "Systematics", "Machine Learning Algorithms", "Law Enforcement", "Scientific Computing", "Geology", "Sociology", "Machine Learning", "Bangladesh", "Crime Prediction", "Analysis", "Bangladesh Police", "ACLED", "Crime Report" ], "authors": [ { "affiliation": "United International University,Dept. of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "Md Pavel Rahman", "givenName": "Md", "surname": "Pavel Rahman", "__typename": "ArticleAuthorType" }, { "affiliation": "United International University,Dept. of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "A. K. M Ifranul Hoque", "givenName": "A. K. M", "surname": "Ifranul Hoque", "__typename": "ArticleAuthorType" }, { "affiliation": "United International University,Dept. of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "Md. Faysal Ahmed", "givenName": "Md.", "surname": "Faysal Ahmed", "__typename": "ArticleAuthorType" }, { "affiliation": "United International University,Dept. of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "Iftekhirul Iftekhirul", "givenName": "Iftekhirul", "surname": "Iftekhirul", "__typename": "ArticleAuthorType" }, { "affiliation": "United International University,Dept. of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "Ashraful Alam", "givenName": "Ashraful", "surname": "Alam", "__typename": "ArticleAuthorType" }, { "affiliation": "United International University,Dept. of Computer Science and Engineering,Dhaka,Bangladesh", "fullName": "Nahid Hossain", "givenName": "Nahid", "surname": "Hossain", "__typename": "ArticleAuthorType" } ], "idPrefix": "icsecs-icocsim", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-08-01T00:00:00", "pubType": "proceedings", "pages": "453-458", "year": "2021", "issn": null, "isbn": "978-1-6654-1407-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "140700a447", "articleId": "1wYlDkXSvnO", "__typename": "AdjacentArticleType" }, "next": { "fno": "140700a459", "articleId": "1wYlsmDViOQ", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/wi-iatw/2006/2749/0/27490041", "title": "Crime Pattern Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wi-iatw/2006/27490041/12OmNC4wtz1", "parentPublication": { "id": "proceedings/wi-iatw/2006/2749/0", "title": "Web Intelligence and Intelligent Agent Technology, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2017/3800/0/3800b158", "title": "Exploring Transfer Learning for Crime Prediction", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2017/3800b158/12OmNwM6A4W", "parentPublication": { "id": "proceedings/icdmw/2017/3800/0", "title": "2017 IEEE International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/eisic/2017/2385/0/2385a001", "title": "Detecting Crime Series Based on Route Estimation and Behavioral Similarity", "doi": null, "abstractUrl": "/proceedings-article/eisic/2017/2385a001/12OmNy3Agu7", "parentPublication": { "id": "proceedings/eisic/2017/2385/0", "title": "2017 European Intelligence and Security Informatics Conference (EISIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cine/2017/2529/0/2529a033", "title": "Crime Analysis Using K-Means Clustering", "doi": null, "abstractUrl": "/proceedings-article/cine/2017/2529a033/12OmNz2C1ng", "parentPublication": { "id": "proceedings/cine/2017/2529/0", "title": "2017 3rd International Conference on Computational Intelligence and Networks (CINE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wiiatw/2006/2749/0/04053200", "title": "Crime Pattern Detection Using Data Mining", "doi": null, "abstractUrl": "/proceedings-article/wiiatw/2006/04053200/12OmNzSh13t", "parentPublication": { "id": "proceedings/wiiatw/2006/2749/0", "title": "2006 IEEE/WIC/ACM International Conference on Web Intelligence International Intelligence Agent Technology Workshops", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev/2016/1269/0/07760021", "title": "Using linear regression to forecast future trends in crime of Bangladesh", "doi": null, "abstractUrl": "/proceedings-article/iciev/2016/07760021/12OmNzlD9iA", "parentPublication": { "id": "proceedings/iciev/2016/1269/0", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iisa/2018/8161/0/08633657", "title": "Time, Place, and Modus Operandi: A Simple Apriori Algorithm Experiment for Crime Pattern Detection", "doi": null, "abstractUrl": "/proceedings-article/iisa/2018/08633657/17D45VWpMz5", "parentPublication": { "id": "proceedings/iisa/2018/8161/0", "title": "2018 9th International Conference on Information, Intelligence, Systems and Applications (IISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/04/08869805", "title": "CrimAnalyzer: Understanding Crime Patterns in S&#x00E3;o Paulo", "doi": null, "abstractUrl": "/journal/tg/2021/04/08869805/1e9hb0tlqpy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2020/2261/0/226100a150", "title": "Crime Analysis of spatial-temporal distribution based on KNN Algorithm", "doi": null, "abstractUrl": "/proceedings-article/icise/2020/226100a150/1tnYge1XNMA", "parentPublication": { "id": "proceedings/icise/2020/2261/0", "title": "2020 International Conference on Information Science and Education (ICISE-IE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09536407", "title": "CriPAV: Street-Level Crime Patterns Analysis and Visualization", "doi": null, "abstractUrl": "/journal/tg/2022/12/09536407/1wRE7UAvlrq", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzw8jgZ", "title": "2011 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNBOUxlu", "doi": "10.1109/VR.2011.5759503", "title": "Random dot markers", "normalizedTitle": "Random dot markers", "abstract": "We introduce a novel type of markers with randomly scattered dots for augmented reality applications. Compared with traditional square markers, our markers have several significant advantages for flexible marker design, robustness against occlusion and user interaction. Our markers do not need to have a black frame, and their shape is not limited to square because the retrieval and tracking of the markers are based on geometric feature based keypoint matching. In our demonstration, we show real-time simultaneous retrieval and tracking of the markers on a laptop.", "abstracts": [ { "abstractType": "Regular", "content": "We introduce a novel type of markers with randomly scattered dots for augmented reality applications. Compared with traditional square markers, our markers have several significant advantages for flexible marker design, robustness against occlusion and user interaction. Our markers do not need to have a black frame, and their shape is not limited to square because the retrieval and tracking of the markers are based on geometric feature based keypoint matching. In our demonstration, we show real-time simultaneous retrieval and tracking of the markers on a laptop.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We introduce a novel type of markers with randomly scattered dots for augmented reality applications. Compared with traditional square markers, our markers have several significant advantages for flexible marker design, robustness against occlusion and user interaction. Our markers do not need to have a black frame, and their shape is not limited to square because the retrieval and tracking of the markers are based on geometric feature based keypoint matching. In our demonstration, we show real-time simultaneous retrieval and tracking of the markers on a laptop.", "fno": "05759503", "keywords": [], "authors": [ { "affiliation": "Keio University", "fullName": "Hideaki Uchiyama", "givenName": "Hideaki", "surname": "Uchiyama", "__typename": "ArticleAuthorType" }, { "affiliation": "Keio University", "fullName": "Hideo Saito", "givenName": "Hideo", "surname": "Saito", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-03-01T00:00:00", "pubType": "proceedings", "pages": "271-272", "year": "2011", "issn": null, "isbn": "978-1-4577-0039-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "05759502", "articleId": "12OmNzXFoA3", "__typename": "AdjacentArticleType" }, "next": { "fno": "05759504", "articleId": "12OmNyoAA5D", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2011/0039/0/05759433", "title": "Random dot markers", "doi": null, "abstractUrl": "/proceedings-article/vr/2011/05759433/12OmNAZOJUM", "parentPublication": { "id": "proceedings/vr/2011/0039/0", "title": "2011 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a183", "title": "Detecting Markers in Blurred and Defocused Images", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a183/12OmNAsBFMb", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccce/2014/7635/0/7635a088", "title": "Multi-stereo Camera System to Enhance the Position Accuracy of Image-Guided Surgery Markers", "doi": null, "abstractUrl": "/proceedings-article/iccce/2014/7635a088/12OmNqI04VA", "parentPublication": { "id": "proceedings/iccce/2014/7635/0", "title": "2014 International Conference on Computer & Communication Engineering (ICCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2006/9753/0/04042348", "title": "Video Tracking Of 2D Face Motion During Speech", "doi": null, "abstractUrl": "/proceedings-article/isspit/2006/04042348/12OmNvCzFd9", "parentPublication": { "id": "proceedings/isspit/2006/9753/0", "title": "2006 IEEE International Symposium on Signal Processing and Information Technology", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icfhr/2010/4221/0/4221a160", "title": "Handwriting Reconstruction for a Camera Pen Using Random Dot Patterns", "doi": null, "abstractUrl": "/proceedings-article/icfhr/2010/4221a160/12OmNxaNGpm", "parentPublication": { "id": "proceedings/icfhr/2010/4221/0", "title": "Frontiers in Handwriting Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2012/2216/0/06460074", "title": "Semi-automatic tracking of markers in facial palsy", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460074/12OmNy3RRA5", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2011/2183/0/06092394", "title": "Deformable random dot markers", "doi": null, "abstractUrl": "/proceedings-article/ismar/2011/06092394/12OmNyS6RGK", "parentPublication": { "id": "proceedings/ismar/2011/2183/0", "title": "2011 10th IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545845", "title": "Transparent Random Dot Markers", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545845/17D45XERmmQ", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102813", "title": "Projection Mapping System To A Widely Dynamic Sphere With Circumferential Markers", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102813/1kwqWza3GI8", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxWuirq", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "acronym": "ismar", "groupId": "1000465", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNvk7JNU", "doi": "10.1109/ISMAR.2012.6402576", "title": "Fractal marker fields: No more scale limitations for fiduciary markers", "normalizedTitle": "Fractal marker fields: No more scale limitations for fiduciary markers", "abstract": "One limitation of existing fiduciary markers is that the camera motion is tightly limited: the marker (one of the markers) must be visible and it must be observed at a proper scale. This paper introduces a fractal structure of markers similar to matrix codes (such as QR-code or DataMatrix): the FractalMarker Field. The FMF allows for embedding markers of a virtually unlimited number of scales. At the same time, for each of the scales it guarantees a constant density of markers at that scale over the whole marker field's surface. The FractalMarker Field can provide unprecedented freedom of motion to camera-based augmented reality applications.", "abstracts": [ { "abstractType": "Regular", "content": "One limitation of existing fiduciary markers is that the camera motion is tightly limited: the marker (one of the markers) must be visible and it must be observed at a proper scale. This paper introduces a fractal structure of markers similar to matrix codes (such as QR-code or DataMatrix): the FractalMarker Field. The FMF allows for embedding markers of a virtually unlimited number of scales. At the same time, for each of the scales it guarantees a constant density of markers at that scale over the whole marker field's surface. The FractalMarker Field can provide unprecedented freedom of motion to camera-based augmented reality applications.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "One limitation of existing fiduciary markers is that the camera motion is tightly limited: the marker (one of the markers) must be visible and it must be observed at a proper scale. This paper introduces a fractal structure of markers similar to matrix codes (such as QR-code or DataMatrix): the FractalMarker Field. The FMF allows for embedding markers of a virtually unlimited number of scales. At the same time, for each of the scales it guarantees a constant density of markers at that scale over the whole marker field's surface. The FractalMarker Field can provide unprecedented freedom of motion to camera-based augmented reality applications.", "fno": "06402576", "keywords": [ "Fractals", "Cameras", "Augmented Reality", "Reliability", "Manganese", "Image Color Analysis", "Calibration" ], "authors": [ { "affiliation": "Graph@FIT, Brno University of Technology, Czech", "fullName": "Adam Herout", "givenName": "Adam", "surname": "Herout", "__typename": "ArticleAuthorType" }, { "affiliation": "Graph@FIT, Brno University of Technology, Czech", "fullName": "Michal Zacharias", "givenName": "Michal", "surname": "Zacharias", "__typename": "ArticleAuthorType" }, { "affiliation": "Graph@FIT, Brno University of Technology, Czech", "fullName": "Marketa Dubska", "givenName": "Marketa", "surname": "Dubska", "__typename": "ArticleAuthorType" }, { "affiliation": "Graph@FIT, Brno University of Technology, Czech", "fullName": "Jiri Havel", "givenName": "Jiri", "surname": "Havel", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-11-01T00:00:00", "pubType": "proceedings", "pages": "285-286", "year": "2012", "issn": null, "isbn": "978-1-4673-4660-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06402575", "articleId": "12OmNyKJigS", "__typename": "AdjacentArticleType" }, "next": null, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2011/0039/0/05759433", "title": "Random dot markers", "doi": null, "abstractUrl": "/proceedings-article/vr/2011/05759433/12OmNAZOJUM", "parentPublication": { "id": "proceedings/vr/2011/0039/0", "title": "2011 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmsvm/2010/7077/0/05558353", "title": "An Extended Marker-Based Tracking System for Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558353/12OmNAiFI7k", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2013/2869/0/06671813", "title": "Further stabilization of a microlens-array-based fiducial marker", "doi": null, "abstractUrl": "/proceedings-article/ismar/2013/06671813/12OmNCfAPL4", "parentPublication": { "id": "proceedings/ismar/2013/2869/0", "title": "2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2014/4261/0/4261a089", "title": "A Method to Automate the Calibration of a Multiple Fiducial Marker Setup", "doi": null, "abstractUrl": "/proceedings-article/svr/2014/4261a089/12OmNqJq4mR", "parentPublication": { "id": "proceedings/svr/2014/4261/0", "title": "2014 XVI Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2011/4484/0/4484a007", "title": "Stabilizing Marker-Based Visual Tracking Using Markers with Scattering Materials and Multiple Cameras", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2011/4484a007/12OmNwKoZdD", "parentPublication": { "id": "proceedings/cgiv/2011/4484/0", "title": "2011 Eighth International Conference Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836466", "title": "Mobile Augmented Reality Based on Invisible Marker", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836466/12OmNx7G5Tm", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2014/7505/0/7505a269", "title": "Classification of Markers in the ARTool Kit Library to Reduce Inter-marker Confusion", "doi": null, "abstractUrl": "/proceedings-article/fit/2014/7505a269/12OmNxvwoVo", "parentPublication": { "id": "proceedings/fit/2014/7505/0", "title": "2014 12th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuvr/2008/3259/0/3259a043", "title": "Simple Frame Marker for Image and Character Recognition", "doi": null, "abstractUrl": "/proceedings-article/isuvr/2008/3259a043/12OmNyywxAu", "parentPublication": { "id": "proceedings/isuvr/2008/3259/0", "title": "International Symposium on Ubiquitous Virtual Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2010/07/ttp2010071317", "title": "Designing Highly Reliable Fiducial Markers", "doi": null, "abstractUrl": "/journal/tp/2010/07/ttp2010071317/13rRUwIF6eS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a255", "title": "Stencil Marker: Designing Partially Transparent Markers for Stacking Augmented Reality Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a255/1pBMkhmVP7a", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz5JC0t", "title": "2011 Eighth International Conference Computer Graphics, Imaging and Visualization", "acronym": "cgiv", "groupId": "1001775", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNwKoZdD", "doi": "10.1109/CGIV.2011.32", "title": "Stabilizing Marker-Based Visual Tracking Using Markers with Scattering Materials and Multiple Cameras", "normalizedTitle": "Stabilizing Marker-Based Visual Tracking Using Markers with Scattering Materials and Multiple Cameras", "abstract": "The marker-based method in visual tracking is generally convenient, while the stability of the position and orientation estimation of the camera depends on the illumination conditions because it is processed on the basis of the camera images. However, illumination conditions are often difficult to control in practical environments. Although some solutions have been proposed for illumination changes, the methods based on image processing have unstable estimation due to specular reflection on markers. Thus, effects on illumination were avoided by using markers with scattering materials. In addition, multiple cameras were also used for stabilizing the orientation estimation when the optical axis of the camera is almost perpendicular to the marker surface.", "abstracts": [ { "abstractType": "Regular", "content": "The marker-based method in visual tracking is generally convenient, while the stability of the position and orientation estimation of the camera depends on the illumination conditions because it is processed on the basis of the camera images. However, illumination conditions are often difficult to control in practical environments. Although some solutions have been proposed for illumination changes, the methods based on image processing have unstable estimation due to specular reflection on markers. Thus, effects on illumination were avoided by using markers with scattering materials. In addition, multiple cameras were also used for stabilizing the orientation estimation when the optical axis of the camera is almost perpendicular to the marker surface.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The marker-based method in visual tracking is generally convenient, while the stability of the position and orientation estimation of the camera depends on the illumination conditions because it is processed on the basis of the camera images. However, illumination conditions are often difficult to control in practical environments. Although some solutions have been proposed for illumination changes, the methods based on image processing have unstable estimation due to specular reflection on markers. Thus, effects on illumination were avoided by using markers with scattering materials. In addition, multiple cameras were also used for stabilizing the orientation estimation when the optical axis of the camera is almost perpendicular to the marker surface.", "fno": "4484a007", "keywords": [ "Visual Tracking", "Marker Based Cue", "Augmented Reality", "Scattering Materials", "Multiple Cameras" ], "authors": [ { "affiliation": null, "fullName": "Kikuo Asai", "givenName": "Kikuo", "surname": "Asai", "__typename": "ArticleAuthorType" } ], "idPrefix": "cgiv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-08-01T00:00:00", "pubType": "proceedings", "pages": "7-12", "year": "2011", "issn": null, "isbn": "978-0-7695-4484-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4484a001", "articleId": "12OmNrH1PBa", "__typename": "AdjacentArticleType" }, "next": { "fno": "4484a013", "articleId": "12OmNzaQozu", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2011/0039/0/05759433", "title": "Random dot markers", "doi": null, "abstractUrl": "/proceedings-article/vr/2011/05759433/12OmNAZOJUM", "parentPublication": { "id": "proceedings/vr/2011/0039/0", "title": "2011 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csse/2008/3336/5/3336i816", "title": "Infrared Marker Based Augmented Reality System for Equipment Maintenance", "doi": null, "abstractUrl": "/proceedings-article/csse/2008/3336i816/12OmNBKEyAE", "parentPublication": { "id": "proceedings/csse/2008/3336/5", "title": "2008 International Conference on Computer Science and Software Engineering (CSSE 2008)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2010/9343/0/05643590", "title": "Light-weight marker hiding for augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2010/05643590/12OmNs0kyvh", "parentPublication": { "id": "proceedings/ismar/2010/9343/0", "title": "2010 IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402576", "title": "Fractal marker fields: No more scale limitations for fiduciary markers", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402576/12OmNvk7JNU", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836466", "title": "Mobile Augmented Reality Based on Invisible Marker", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836466/12OmNx7G5Tm", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2014/7505/0/7505a269", "title": "Classification of Markers in the ARTool Kit Library to Reduce Inter-marker Confusion", "doi": null, "abstractUrl": "/proceedings-article/fit/2014/7505a269/12OmNxvwoVo", "parentPublication": { "id": "proceedings/fit/2014/7505/0", "title": "2014 12th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a229", "title": "[POSTER] Lightning Markers: Synchronization-free Single-shot Detection of Imperceptible AR Markers Embedded in a High-Speed Video Display", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a229/12OmNyQphg0", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isuvr/2008/3259/0/3259a043", "title": "Simple Frame Marker for Image and Character Recognition", "doi": null, "abstractUrl": "/proceedings-article/isuvr/2008/3259a043/12OmNyywxAu", "parentPublication": { "id": "proceedings/isuvr/2008/3259/0", "title": "International Symposium on Ubiquitous Virtual Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2010/07/ttp2010071317", "title": "Designing Highly Reliable Fiducial Markers", "doi": null, "abstractUrl": "/journal/tp/2010/07/ttp2010071317/13rRUwIF6eS", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a255", "title": "Stencil Marker: Designing Partially Transparent Markers for Stacking Augmented Reality Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a255/1pBMkhmVP7a", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwErpHI", "title": "2014 12th International Conference on Frontiers of Information Technology (FIT)", "acronym": "fit", "groupId": "1800803", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNxvwoVo", "doi": "10.1109/FIT.2014.57", "title": "Classification of Markers in the ARTool Kit Library to Reduce Inter-marker Confusion", "normalizedTitle": "Classification of Markers in the ARTool Kit Library to Reduce Inter-marker Confusion", "abstract": "Fiducial markers are widely used in many Augmented Reality (AR) applications such as to manipulate AR objects, robot navigation, education and AR based games. ARTool Kit is an open source, easy to configure and well-documented tracking system which is widely used for designing marker based AR applications. The patterns inside the markers often cause inter-marker confusion in the library. Currently there is no specialized algorithm to ensure the markers distinction in the library and to reduce inter-marker confusion. In this paper we present algorithms for classification of the markers in the ARTool Kit library in a given number of distinct classes. The degrees of similarities among the markers are computed and stored in an N-by-N matrix and then kmeans algorithm is used to classify the matrix into k classes. It is recommended to use markers from different classes to reduce inter-marker confusion. The marker from a class of smaller size will have minimal confusion with others.", "abstracts": [ { "abstractType": "Regular", "content": "Fiducial markers are widely used in many Augmented Reality (AR) applications such as to manipulate AR objects, robot navigation, education and AR based games. ARTool Kit is an open source, easy to configure and well-documented tracking system which is widely used for designing marker based AR applications. The patterns inside the markers often cause inter-marker confusion in the library. Currently there is no specialized algorithm to ensure the markers distinction in the library and to reduce inter-marker confusion. In this paper we present algorithms for classification of the markers in the ARTool Kit library in a given number of distinct classes. The degrees of similarities among the markers are computed and stored in an N-by-N matrix and then kmeans algorithm is used to classify the matrix into k classes. It is recommended to use markers from different classes to reduce inter-marker confusion. The marker from a class of smaller size will have minimal confusion with others.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Fiducial markers are widely used in many Augmented Reality (AR) applications such as to manipulate AR objects, robot navigation, education and AR based games. ARTool Kit is an open source, easy to configure and well-documented tracking system which is widely used for designing marker based AR applications. The patterns inside the markers often cause inter-marker confusion in the library. Currently there is no specialized algorithm to ensure the markers distinction in the library and to reduce inter-marker confusion. In this paper we present algorithms for classification of the markers in the ARTool Kit library in a given number of distinct classes. The degrees of similarities among the markers are computed and stored in an N-by-N matrix and then kmeans algorithm is used to classify the matrix into k classes. It is recommended to use markers from different classes to reduce inter-marker confusion. The marker from a class of smaller size will have minimal confusion with others.", "fno": "7505a269", "keywords": [ "Libraries", "Augmented Reality", "Classification Algorithms", "Testing", "Cameras", "Algorithm Design And Analysis", "Computer Vision", "Fiducial Markers", "AR Tracking", "Pattern Recognition" ], "authors": [ { "affiliation": null, "fullName": "Dawar Khan", "givenName": "Dawar", "surname": "Khan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Sehat Ullah", "givenName": "Sehat", "surname": "Ullah", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ihsan Rabbi", "givenName": "Ihsan", "surname": "Rabbi", "__typename": "ArticleAuthorType" } ], "idPrefix": "fit", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-12-01T00:00:00", "pubType": "proceedings", "pages": "269-273", "year": "2014", "issn": null, "isbn": "978-1-4799-7505-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7505a263", "articleId": "12OmNqBbHPW", "__typename": "AdjacentArticleType" }, "next": { "fno": "7505a274", "articleId": "12OmNAJm0p4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/euc/2011/4552/0/4552a372", "title": "Augmented Reality Marker for Operating Home Appliances", "doi": null, "abstractUrl": "/proceedings-article/euc/2011/4552a372/12OmNAJm0lI", "parentPublication": { "id": "proceedings/euc/2011/4552/0", "title": "Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wmsvm/2010/7077/0/05558353", "title": "An Extended Marker-Based Tracking System for Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/wmsvm/2010/05558353/12OmNAiFI7k", "parentPublication": { "id": "proceedings/wmsvm/2010/7077/0", "title": "2010 Second International Conference on Modeling, Simulation and Visualization Methods (WMSVM 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402580", "title": "AR marker hiding based on image inpainting and reflection of illumination changes", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402580/12OmNC4eSrr", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2013/2869/0/06671813", "title": "Further stabilization of a microlens-array-based fiducial marker", "doi": null, "abstractUrl": "/proceedings-article/ismar/2013/06671813/12OmNCfAPL4", "parentPublication": { "id": "proceedings/ismar/2013/2869/0", "title": "2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2014/4261/0/4261a089", "title": "A Method to Automate the Calibration of a Multiple Fiducial Marker Setup", "doi": null, "abstractUrl": "/proceedings-article/svr/2014/4261a089/12OmNqJq4mR", "parentPublication": { "id": "proceedings/svr/2014/4261/0", "title": "2014 XVI Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402576", "title": "Fractal marker fields: No more scale limitations for fiduciary markers", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402576/12OmNvk7JNU", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2011/4484/0/4484a007", "title": "Stabilizing Marker-Based Visual Tracking Using Markers with Scattering Materials and Multiple Cameras", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2011/4484a007/12OmNwKoZdD", "parentPublication": { "id": "proceedings/cgiv/2011/4484/0", "title": "2011 Eighth International Conference Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836466", "title": "Mobile Augmented Reality Based on Invisible Marker", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836466/12OmNx7G5Tm", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2017/6327/0/6327a229", "title": "[POSTER] Lightning Markers: Synchronization-free Single-shot Detection of Imperceptible AR Markers Embedded in a High-Speed Video Display", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2017/6327a229/12OmNyQphg0", "parentPublication": { "id": "proceedings/ismar-adjunct/2017/6327/0", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a255", "title": "Stencil Marker: Designing Partially Transparent Markers for Stacking Augmented Reality Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a255/1pBMkhmVP7a", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNvRU0cM", "title": "2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "1810084", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNyQphg0", "doi": "10.1109/ISMAR-Adjunct.2017.75", "title": "[POSTER] Lightning Markers: Synchronization-free Single-shot Detection of Imperceptible AR Markers Embedded in a High-Speed Video Display", "normalizedTitle": "[POSTER] Lightning Markers: Synchronization-free Single-shot Detection of Imperceptible AR Markers Embedded in a High-Speed Video Display", "abstract": "This paper proposes a method of embedding AR (augmented reality) markers in a high-speed video sequence so that they are imperceptible to human eyes. The embedded markers appear for very short periods and keep changing their positions at lightning speed. By carefully designing the timings of marker display, a camera with a sufficiently short exposure time running at any frame rate is able to detect at least one marker in the image even if there is no means of synchronization between the display and the camera. Experimental results show that different types of markers such as 2D barcode markers and spatially distributed markers are able to be used with the proposed method.", "abstracts": [ { "abstractType": "Regular", "content": "This paper proposes a method of embedding AR (augmented reality) markers in a high-speed video sequence so that they are imperceptible to human eyes. The embedded markers appear for very short periods and keep changing their positions at lightning speed. By carefully designing the timings of marker display, a camera with a sufficiently short exposure time running at any frame rate is able to detect at least one marker in the image even if there is no means of synchronization between the display and the camera. Experimental results show that different types of markers such as 2D barcode markers and spatially distributed markers are able to be used with the proposed method.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper proposes a method of embedding AR (augmented reality) markers in a high-speed video sequence so that they are imperceptible to human eyes. The embedded markers appear for very short periods and keep changing their positions at lightning speed. By carefully designing the timings of marker display, a camera with a sufficiently short exposure time running at any frame rate is able to detect at least one marker in the image even if there is no means of synchronization between the display and the camera. Experimental results show that different types of markers such as 2D barcode markers and spatially distributed markers are able to be used with the proposed method.", "fno": "6327a229", "keywords": [ "Cameras", "Synchronization", "Two Dimensional Displays", "Human Computer Interaction", "Image Color Analysis", "Micromirrors", "Augmented Reality", "High Speed Displaying", "Information Hiding", "Steganography", "Augmented Reality" ], "authors": [ { "affiliation": null, "fullName": "Tsutomu Kusanagi", "givenName": "Tsutomu", "surname": "Kusanagi", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Shingo Kagami", "givenName": "Shingo", "surname": "Kagami", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Koichi Hashimoto", "givenName": "Koichi", "surname": "Hashimoto", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-10-01T00:00:00", "pubType": "proceedings", "pages": "229-234", "year": "2017", "issn": null, "isbn": "978-0-7695-6327-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "6327a223", "articleId": "12OmNzCF4RA", "__typename": "AdjacentArticleType" }, "next": { "fno": "6327a235", "articleId": "12OmNwI8cg9", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2011/0039/0/05759433", "title": "Random dot markers", "doi": null, "abstractUrl": "/proceedings-article/vr/2011/05759433/12OmNAZOJUM", "parentPublication": { "id": "proceedings/vr/2011/0039/0", "title": "2011 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402580", "title": "AR marker hiding based on image inpainting and reflection of illumination changes", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402580/12OmNC4eSrr", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2012/4660/0/06402576", "title": "Fractal marker fields: No more scale limitations for fiduciary markers", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402576/12OmNvk7JNU", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2007/3056/0/30560172", "title": "AR Display of Visual Aids for Supporting Pool Games by Online Markerless Tracking", "doi": null, "abstractUrl": "/proceedings-article/icat/2007/30560172/12OmNvoWV3Q", "parentPublication": { "id": "proceedings/icat/2007/3056/0", "title": "17th International Conference on Artificial Reality and Telexistence (ICAT 2007)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cgiv/2011/4484/0/4484a007", "title": "Stabilizing Marker-Based Visual Tracking Using Markers with Scattering Materials and Multiple Cameras", "doi": null, "abstractUrl": "/proceedings-article/cgiv/2011/4484a007/12OmNwKoZdD", "parentPublication": { "id": "proceedings/cgiv/2011/4484/0", "title": "2011 Eighth International Conference Computer Graphics, Imaging and Visualization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crv/2004/2127/0/21270145", "title": "Linear Markers for Robot Navigation with Panoramic Vision", "doi": null, "abstractUrl": "/proceedings-article/crv/2004/21270145/12OmNwl8GJu", "parentPublication": { "id": "proceedings/crv/2004/2127/0", "title": "First Canadian Conference on Computer and Robot Vision, 2004. Proceedings.", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fit/2014/7505/0/7505a269", "title": "Classification of Markers in the ARTool Kit Library to Reduce Inter-marker Confusion", "doi": null, "abstractUrl": "/proceedings-article/fit/2014/7505a269/12OmNxvwoVo", "parentPublication": { "id": "proceedings/fit/2014/7505/0", "title": "2014 12th International Conference on Frontiers of Information Technology (FIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gcis/2010/9247/3/05709358", "title": "Building an Augumented Reality-Based Product Promotion System with ARToolkit Integrated with an Adaboosted Classifier-Assisted 1-D Barcode Reader", "doi": null, "abstractUrl": "/proceedings-article/gcis/2010/05709358/12OmNxzuMOW", "parentPublication": { "id": "proceedings/gcis/2010/9247/3", "title": "2010 Second WRI Global Congress on Intelligent Systems (GCIS 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccvw/2019/5023/0/502300a832", "title": "Unsupervised Labeled Lane Markers Using Maps", "doi": null, "abstractUrl": "/proceedings-article/iccvw/2019/502300a832/1i5mEUzufXW", "parentPublication": { "id": "proceedings/iccvw/2019/5023/0", "title": "2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a255", "title": "Stencil Marker: Designing Partially Transparent Markers for Stacking Augmented Reality Objects", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a255/1pBMkhmVP7a", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCdk2Yw", "title": "Computational Intelligence and Design, International Symposium on", "acronym": "iscid", "groupId": "1002558", "volume": "1", "displayVolume": "1", "year": "2010", "__typename": "ProceedingType" }, "article": { "id": "12OmNBqMDww", "doi": "10.1109/ISCID.2010.62", "title": "Research on Product Design Driven by Reach Area", "normalizedTitle": "Research on Product Design Driven by Reach Area", "abstract": "In traditional design, ergonomic design is often used to examine in product design. If the ergonomic examination has serious problem, it needs to modify the size of the product structure that extend the design cycle. Using the computer-aided ergonomics technology, product design driven by human body posture system framework has been constructed in this paper. This article analyzes the operating posture and has constructed the human body operating space through reach area. The shape and size of the working area obtained is used to restrain the product idea mold size. Namely, the ergonomic factor is considered in the initial period of product design, reduced the design cost and increased the design efficiency and the security.", "abstracts": [ { "abstractType": "Regular", "content": "In traditional design, ergonomic design is often used to examine in product design. If the ergonomic examination has serious problem, it needs to modify the size of the product structure that extend the design cycle. Using the computer-aided ergonomics technology, product design driven by human body posture system framework has been constructed in this paper. This article analyzes the operating posture and has constructed the human body operating space through reach area. The shape and size of the working area obtained is used to restrain the product idea mold size. Namely, the ergonomic factor is considered in the initial period of product design, reduced the design cost and increased the design efficiency and the security.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In traditional design, ergonomic design is often used to examine in product design. If the ergonomic examination has serious problem, it needs to modify the size of the product structure that extend the design cycle. Using the computer-aided ergonomics technology, product design driven by human body posture system framework has been constructed in this paper. This article analyzes the operating posture and has constructed the human body operating space through reach area. The shape and size of the working area obtained is used to restrain the product idea mold size. Namely, the ergonomic factor is considered in the initial period of product design, reduced the design cost and increased the design efficiency and the security.", "fno": "4198a178", "keywords": [ "Product Design", "Ergonomics", "Human Body Posture", "Console" ], "authors": [ { "affiliation": null, "fullName": "Bo Chen", "givenName": "Bo", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Li Deng", "givenName": "Li", "surname": "Deng", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ling Li", "givenName": "Ling", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "iscid", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2010-10-01T00:00:00", "pubType": "proceedings", "pages": "178-181", "year": "2010", "issn": null, "isbn": "978-0-7695-4198-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4198a174", "articleId": "12OmNwdbV7X", "__typename": "AdjacentArticleType" }, "next": { "fno": "4198a182", "articleId": "12OmNwCsdMe", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fg/2002/1602/0/16020077", "title": "Recognition of Human Body Posture from a Cloud of 3D Data Points using Wavelet Transform Coefficients", "doi": null, "abstractUrl": "/proceedings-article/fg/2002/16020077/12OmNBbJTqo", "parentPublication": { "id": "proceedings/fg/2002/1602/0", "title": "Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2011/0039/0/05759498", "title": "\"Left Arm Up!\" Interactive Yoga training in virtual environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2011/05759498/12OmNBqdrcX", "parentPublication": { "id": "proceedings/vr/2011/0039/0", "title": "2011 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsem/2010/4223/1/4223a089", "title": "The Effect of User-Centered Principles on Industrial Product Design", "doi": null, "abstractUrl": "/proceedings-article/icsem/2010/4223a089/12OmNxGSm1p", "parentPublication": { "id": "proceedings/icsem/2010/4223/1", "title": "2010 International Conference on System Science, Engineering Design and Manufacturing Informatization", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icbake/2011/4512/0/4512a087", "title": "Comfortable Pushing/Pulling Force Exertion for the Design of Consumer Products", "doi": null, "abstractUrl": "/proceedings-article/icbake/2011/4512a087/12OmNyuPKXD", "parentPublication": { "id": "proceedings/icbake/2011/4512/0", "title": "Biometrics and Kansei Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cad-graphics/2013/2576/0/06815057", "title": "The Study and Application of the Product Image Survey and Retrieval System Based on Kansei Engineering", "doi": null, "abstractUrl": "/proceedings-article/cad-graphics/2013/06815057/12OmNzAohVE", "parentPublication": { "id": "proceedings/cad-graphics/2013/2576/0", "title": "2013 International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2010/02/mex2010020020", "title": "Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors", "doi": null, "abstractUrl": "/magazine/ex/2010/02/mex2010020020/13rRUytnsSC", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/inciscos/2018/7612/0/761200a042", "title": "Mobile Application for Ergonomic Analysis of the Sitting Posture of the Torso", "doi": null, "abstractUrl": "/proceedings-article/inciscos/2018/761200a042/17D45VWpMz6", "parentPublication": { "id": "proceedings/inciscos/2018/7612/0", "title": "2018 International Conference on Information Systems and Computer Science (INCISCOS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/7206/0/720600a027", "title": "Improved Ergonomic Risk Factor Assessment Using OpenSim and Inertial Measurement Units", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/720600a027/181W9nHlku6", "parentPublication": { "id": "proceedings/chase/2018/7206/0", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/03/08826009", "title": "Automatic Sitting Pose Generation for Ergonomic Ratings of Chairs", "doi": null, "abstractUrl": "/journal/tg/2021/03/08826009/1eTOD4tcaSk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a463", "title": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a463/1oZBBL1XVcs", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCcKQA7", "title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)", "acronym": "csci", "groupId": "1803739", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNwIpNpZ", "doi": "10.1109/CSCI.2015.116", "title": "User-Centric Workflow Ergonomics in Industrial Environments: Concept and Architecture of an Assistance System", "normalizedTitle": "User-Centric Workflow Ergonomics in Industrial Environments: Concept and Architecture of an Assistance System", "abstract": "Changes in demographic developments come along with an ageing workforce and a higher retirement age. Particularly in the industrial working environment, poor workplace ergonomics can limit the workers' quality of health and thus their ability to work until they reach their statutory retirement age. This paper presents the conceptual design of an assistance system that captures information from workers' bearings based on on-body sensors. A real-time analysis of the captured sensor data enables giving feedback to workers at the assembly site as soon as they get into an ergonomic unhealthy position during workflow execution. Workflow managers benefit from a holistic evaluation of the captured ergonomic data. By this means, critical workflow activities that are characterized by a high degree of malpositions can be identified. Based on this information, workflow managers have the possibility to optimize workflows in an ergonomic-friendly way. Furthermore, the presented approach enables a differentiated evaluation of established methods of ergonomic feedback like OWAS or EAWS.", "abstracts": [ { "abstractType": "Regular", "content": "Changes in demographic developments come along with an ageing workforce and a higher retirement age. Particularly in the industrial working environment, poor workplace ergonomics can limit the workers' quality of health and thus their ability to work until they reach their statutory retirement age. This paper presents the conceptual design of an assistance system that captures information from workers' bearings based on on-body sensors. A real-time analysis of the captured sensor data enables giving feedback to workers at the assembly site as soon as they get into an ergonomic unhealthy position during workflow execution. Workflow managers benefit from a holistic evaluation of the captured ergonomic data. By this means, critical workflow activities that are characterized by a high degree of malpositions can be identified. Based on this information, workflow managers have the possibility to optimize workflows in an ergonomic-friendly way. Furthermore, the presented approach enables a differentiated evaluation of established methods of ergonomic feedback like OWAS or EAWS.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Changes in demographic developments come along with an ageing workforce and a higher retirement age. Particularly in the industrial working environment, poor workplace ergonomics can limit the workers' quality of health and thus their ability to work until they reach their statutory retirement age. This paper presents the conceptual design of an assistance system that captures information from workers' bearings based on on-body sensors. A real-time analysis of the captured sensor data enables giving feedback to workers at the assembly site as soon as they get into an ergonomic unhealthy position during workflow execution. Workflow managers benefit from a holistic evaluation of the captured ergonomic data. By this means, critical workflow activities that are characterized by a high degree of malpositions can be identified. Based on this information, workflow managers have the possibility to optimize workflows in an ergonomic-friendly way. Furthermore, the presented approach enables a differentiated evaluation of established methods of ergonomic feedback like OWAS or EAWS.", "fno": "9795a754", "keywords": [ "Demography", "Employee Welfare", "Ergonomics", "Occupational Health", "User Interfaces", "Workflow Management Software", "User Centric Workflow Ergonomics", "Industrial Environments", "Assistance System", "Demographic Developments", "Retirement Age", "Workers Bearings", "On Body Sensors", "Workflow Management", "Ergonomics", "Ontologies", "Monitoring", "Employment", "Sensor Systems", "Semantics", "Ergonomic Assistance System", "Workflow Flexibility", "Workflow Ergonomics", "Sensor Network", "Workplace Environment Monitoring" ], "authors": [ { "affiliation": "Institute for Information Systems (IWi), German Research Center for Artificial Intelligence, Germany", "fullName": "Christina Di Valentin", "givenName": "Christina", "surname": "Di Valentin", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Information Systems (IWi), German Research Center for Artificial Intelligence, Germany", "fullName": "Andreas Emrich", "givenName": "Andreas", "surname": "Emrich", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Information Systems (IWi), German Research Center for Artificial Intelligence, Germany", "fullName": "Dirk Werth", "givenName": "Dirk", "surname": "Werth", "__typename": "ArticleAuthorType" }, { "affiliation": "Institute for Information Systems (IWi), German Research Center for Artificial Intelligence, Germany", "fullName": "Peter Loos", "givenName": "Peter", "surname": "Loos", "__typename": "ArticleAuthorType" } ], "idPrefix": "csci", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-12-01T00:00:00", "pubType": "proceedings", "pages": "754-759", "year": "2015", "issn": null, "isbn": "978-1-4673-9795-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "9795a749", "articleId": "12OmNz61djw", "__typename": "AdjacentArticleType" }, "next": { "fno": "9795a760", "articleId": "12OmNqG0SWR", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ease/2010/6535/0/05457822", "title": "Dynamic Workflow Management and Monitoring Using DDS", "doi": null, "abstractUrl": "/proceedings-article/ease/2010/05457822/12OmNBuL1fo", "parentPublication": { "id": "proceedings/ease/2010/6535/0", "title": "2010 7th IEEE International Conference and Workshops on Engineering of Autonomic and Autonomous Systems (EASe 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2008/3380/0/04736876", "title": "Capturing Workflow Event Data for Monitoring, Performance Analysis, and Management of Scientific Workflows", "doi": null, "abstractUrl": "/proceedings-article/e-science/2008/04736876/12OmNvmG7ZK", "parentPublication": { "id": "proceedings/e-science/2008/3380/0", "title": "2008 IEEE Fourth International Conference on eScience", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icws/2016/2675/0/2675a324", "title": "Big Data Analytic Service Discovery Using Social Service Network with Domain Ontology and Workflow Awareness", "doi": null, "abstractUrl": "/proceedings-article/icws/2016/2675a324/12OmNyen1u3", "parentPublication": { "id": "proceedings/icws/2016/2675/0", "title": "2016 IEEE International Conference on Web Services (ICWS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/e-science/2018/9156/0/915600a156", "title": "An Algebra for Robust Workflow Transformations", "doi": null, "abstractUrl": "/proceedings-article/e-science/2018/915600a156/17D45WrVgfz", "parentPublication": { "id": "proceedings/e-science/2018/9156/0", "title": "2018 IEEE 14th International Conference on e-Science (e-Science)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912348", "title": "ErgoExplorer: Interactive Ergonomic Risk Assessment from Video Collections", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912348/1HeiX5L0HGo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsc/2020/6332/0/633200a025", "title": "Managing Machine Learning Workflow Components", "doi": null, "abstractUrl": "/proceedings-article/icsc/2020/633200a025/1iffyKhfa8g", "parentPublication": { "id": "proceedings/icsc/2020/6332/0", "title": "2020 IEEE 14th International Conference on Semantic Computing (ICSC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzlUKpG", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "acronym": "crc", "groupId": "1817824", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNwudQQt", "doi": "10.1109/CRC.2017.14", "title": "Investigation into Ergonomics in Ladder of the Hard Sleeper Using JACK", "normalizedTitle": "Investigation into Ergonomics in Ladder of the Hard Sleeper Using JACK", "abstract": "Ergonomic simulation was involved in the process from theoretical analysis to actual application for ladders of the hard sleeper, with a horizontally fixed beds and vertically fixed ladders. This new design was intended to re-layout sleeper spaces and rearrangement of ladders and beds that is in favor of the passenger task and intends to serve for the ladders as climbing tools. Extra benefits are raised by safety and comfort. This design is on the basis of Chinese anthropometry. During this design process, the results of the design decisions were evaluated using a computer-aided ergonomics analysis software Jack. The Jack system has been used to analyze climbing postures, accessibility and visibility of virtual passengers, using ergonomics results to improve the new design.", "abstracts": [ { "abstractType": "Regular", "content": "Ergonomic simulation was involved in the process from theoretical analysis to actual application for ladders of the hard sleeper, with a horizontally fixed beds and vertically fixed ladders. This new design was intended to re-layout sleeper spaces and rearrangement of ladders and beds that is in favor of the passenger task and intends to serve for the ladders as climbing tools. Extra benefits are raised by safety and comfort. This design is on the basis of Chinese anthropometry. During this design process, the results of the design decisions were evaluated using a computer-aided ergonomics analysis software Jack. The Jack system has been used to analyze climbing postures, accessibility and visibility of virtual passengers, using ergonomics results to improve the new design.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Ergonomic simulation was involved in the process from theoretical analysis to actual application for ladders of the hard sleeper, with a horizontally fixed beds and vertically fixed ladders. This new design was intended to re-layout sleeper spaces and rearrangement of ladders and beds that is in favor of the passenger task and intends to serve for the ladders as climbing tools. Extra benefits are raised by safety and comfort. This design is on the basis of Chinese anthropometry. During this design process, the results of the design decisions were evaluated using a computer-aided ergonomics analysis software Jack. The Jack system has been used to analyze climbing postures, accessibility and visibility of virtual passengers, using ergonomics results to improve the new design.", "fno": "0677a167", "keywords": [ "Anthropometry", "Design Engineering", "Ergonomics", "Ladders", "Hard Sleeper", "Horizontally Fixed Beds", "Vertically Fixed Ladders", "Re Layout Sleeper Spaces", "Design Decisions", "Jack System", "Ergonomic Simulation", "Theoretical Analysis", "Computer Aided Ergonomics Analysis Software", "Chinese Anthropometry", "Virtual Passengers", "Ergonomics", "Analytical Models", "Solid Modeling", "Lifting Equipment", "Load Modeling", "Tools", "Three Dimensional Displays", "JACK", "Ergonomic Simulation", "Ladder Of The Hard Sleeper" ], "authors": [ { "affiliation": null, "fullName": "Zhang Yong", "givenName": "Zhang", "surname": "Yong", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xu Ping", "givenName": "Xu", "surname": "Ping", "__typename": "ArticleAuthorType" } ], "idPrefix": "crc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-07-01T00:00:00", "pubType": "proceedings", "pages": "167-170", "year": "2017", "issn": null, "isbn": "978-1-5386-0677-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "0677a162", "articleId": "12OmNBuL1mi", "__typename": "AdjacentArticleType" }, "next": { "fno": "0677a171", "articleId": "12OmNxYbSZv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2009/3735/7/05359990", "title": "A New Data Visualisation Methodology for Evaluating Product Design with Digital Human Models Integrated with Scanned Body and Captured Motion", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/05359990/12OmNwD1q2k", "parentPublication": { "id": "proceedings/fskd/2009/3735/7", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2017/0677/0/0677a171", "title": "Ergonomic Aspect and Design of Hand Tools in Ceramic Industry Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a171/12OmNxYbSZv", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccad/1988/0869/0/00122518", "title": "Taking advantage of optimal on-chip parallelism for parallel discrete-event simulation", "doi": null, "abstractUrl": "/proceedings-article/iccad/1988/00122518/12OmNyQ7Gb6", "parentPublication": { "id": "proceedings/iccad/1988/0869/0", "title": "1988 IEEE International Conference on Computer-Aided Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/infcom/1990/2049/0/00091326", "title": "The advantage of dynamic tuning in distributed asymmetric systems", "doi": null, "abstractUrl": "/proceedings-article/infcom/1990/00091326/12OmNyuPKSe", "parentPublication": { "id": "proceedings/infcom/1990/2049/0", "title": "IEEE INFOCOM '90", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2017/2820/0/2820a281", "title": "Virtual Simulator Ergo Truck of Crew Operations During the Removal of Equipment from Fire Trucks", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2017/2820a281/12OmNzUgdcM", "parentPublication": { "id": "proceedings/mcsi/2017/2820/0", "title": "2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fgcn/2014/7779/0/07024365", "title": "Simulation and Modeling Investigation into Catastrophic Front-Side Bursting under Hypervelocity Impact on Pressure Vessels", "doi": null, "abstractUrl": "/proceedings-article/fgcn/2014/07024365/12OmNzvQHSN", "parentPublication": { "id": "proceedings/fgcn/2014/7779/0", "title": "2014 8th International Conference on Future Generation Communication and Networking (FGCN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2016/06/07130656", "title": "Ergonomics-Inspired Reshaping and Exploration of Collections of Models", "doi": null, "abstractUrl": "/journal/tg/2016/06/07130656/13rRUy2YLT4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNz61d8H", "title": "2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "acronym": "mcsi", "groupId": "1811864", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNzUgdcM", "doi": "10.1109/MCSI.2017.52", "title": "Virtual Simulator Ergo Truck of Crew Operations During the Removal of Equipment from Fire Trucks", "normalizedTitle": "Virtual Simulator Ergo Truck of Crew Operations During the Removal of Equipment from Fire Trucks", "abstract": "This work presents the construction and implementation of a virtual simulator for the ergonomic study of the firemen' performance at the time of removal of firemen equipment from fire truck. The problem is discussed in order to achieve the best value of ergonomic indicators for firemen during anti-fire action. The equipment can be located on the fore truck in a different ways. We are looking for the best way to do it from the point of view of ergonomics. Firefighters must equipment in a short time, causing high physical strain on their bodies. Virtual simulation will allow us to measure the physical loads of firemen' bodies in different types of actions without real firemen activity. It is possible to receive several permissible solutions and then evaluate them in a virtual simulation environment. Then it can then be taken into account a number of additional factors that are important for fireman and ergonomics. The basic modules of the simulator and their properties are shown. Selected sequence views of simulation experiments were also illustrated.", "abstracts": [ { "abstractType": "Regular", "content": "This work presents the construction and implementation of a virtual simulator for the ergonomic study of the firemen' performance at the time of removal of firemen equipment from fire truck. The problem is discussed in order to achieve the best value of ergonomic indicators for firemen during anti-fire action. The equipment can be located on the fore truck in a different ways. We are looking for the best way to do it from the point of view of ergonomics. Firefighters must equipment in a short time, causing high physical strain on their bodies. Virtual simulation will allow us to measure the physical loads of firemen' bodies in different types of actions without real firemen activity. It is possible to receive several permissible solutions and then evaluate them in a virtual simulation environment. Then it can then be taken into account a number of additional factors that are important for fireman and ergonomics. The basic modules of the simulator and their properties are shown. Selected sequence views of simulation experiments were also illustrated.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This work presents the construction and implementation of a virtual simulator for the ergonomic study of the firemen' performance at the time of removal of firemen equipment from fire truck. The problem is discussed in order to achieve the best value of ergonomic indicators for firemen during anti-fire action. The equipment can be located on the fore truck in a different ways. We are looking for the best way to do it from the point of view of ergonomics. Firefighters must equipment in a short time, causing high physical strain on their bodies. Virtual simulation will allow us to measure the physical loads of firemen' bodies in different types of actions without real firemen activity. It is possible to receive several permissible solutions and then evaluate them in a virtual simulation environment. Then it can then be taken into account a number of additional factors that are important for fireman and ergonomics. The basic modules of the simulator and their properties are shown. Selected sequence views of simulation experiments were also illustrated.", "fno": "2820a281", "keywords": [ "Digital Simulation", "Ergonomics", "Fires", "Public Administration", "Fire Truck", "Ergonomic Study", "Firemen Performance", "Firemen Equipment", "Ergonomic Indicators", "Anti Fire Action", "Ergonomics", "Firemen Activity", "Virtual Simulation Environment", "Virtual Simulator Ergo Truck", "Data Models", "Ergonomics", "Fires", "Tools", "Load Modeling", "Solid Modeling", "Artificial Intelligence", "Fire Operation", "Ergonomics", "Simulation Model", "Simulation Eksperiments" ], "authors": [ { "affiliation": null, "fullName": "Tadeusz Nowicki", "givenName": "Tadeusz", "surname": "Nowicki", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Łukasz Matuszelański", "givenName": "Łukasz", "surname": "Matuszelański", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jaroslaw Koszela", "givenName": "Jaroslaw", "surname": "Koszela", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Roman Wantoch-Rekowski", "givenName": "Roman", "surname": "Wantoch-Rekowski", "__typename": "ArticleAuthorType" } ], "idPrefix": "mcsi", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-08-01T00:00:00", "pubType": "proceedings", "pages": "281-288", "year": "2017", "issn": null, "isbn": "978-1-5386-2820-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "2820a270", "articleId": "12OmNBhpS0r", "__typename": "AdjacentArticleType" }, "next": { "fno": "2820a289", "articleId": "12OmNzZWbQi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/crc/2017/0677/0/0677a167", "title": "Investigation into Ergonomics in Ladder of the Hard Sleeper Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a167/12OmNwudQQt", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2017/0677/0/0677a171", "title": "Ergonomic Aspect and Design of Hand Tools in Ceramic Industry Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a171/12OmNxYbSZv", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icitbs/2015/0464/0/0464a446", "title": "Heavy Truck EPS System Simulation Based on PSO Optimization Fuzzy Control", "doi": null, "abstractUrl": "/proceedings-article/icitbs/2015/0464a446/12OmNzYwcgm", "parentPublication": { "id": "proceedings/icitbs/2015/0464/0", "title": "2015 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a538", "title": "Subjective and Objective Comprehensive Evaluation of Cockpit Operation Efficiency Based on Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a538/17D45WHONqc", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a527", "title": "Study on Ride Comfort of the Articulated Dump Truck", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a527/17D45Xq6dAp", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/7206/0/720600a027", "title": "Improved Ergonomic Risk Factor Assessment Using OpenSim and Inertial Measurement Units", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/720600a027/181W9nHlku6", "parentPublication": { "id": "proceedings/chase/2018/7206/0", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiccsa/2021/0969/0/09686871", "title": "Virtual Process Simulation in Health Care: Potentials and Challenges", "doi": null, "abstractUrl": "/proceedings-article/aiccsa/2021/09686871/1AsbasKAN44", "parentPublication": { "id": "proceedings/aiccsa/2021/0969/0", "title": "2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089629", "title": "Visualization and evaluation of ergonomic visual field parameters in first person virtual environments", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089629/1jIxcLPaFR6", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a463", "title": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a463/1oZBBL1XVcs", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09537299", "title": "ERGOBOSS: onomic ptimization of dy-upporting urfaces<bold/><bold/><bold/><bold/><bold/>", "doi": null, "abstractUrl": "/journal/tg/2022/12/09537299/1wTivGVoPbW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "17D45VtKiss", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "acronym": "icisce", "groupId": "1807704", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "17D45WHONqc", "doi": "10.1109/ICISCE.2018.00118", "title": "Subjective and Objective Comprehensive Evaluation of Cockpit Operation Efficiency Based on Virtual Reality", "normalizedTitle": "Subjective and Objective Comprehensive Evaluation of Cockpit Operation Efficiency Based on Virtual Reality", "abstract": "The ergonomic design of the aircraft cockpit directly affects the pilots operating experience, which is related to the comfort, convenience and flight safety of the aircraft. The subjective and objective comprehensive evaluation method of the operating efficiency in the cockpit, based on virtual reality, is proposed in this paper. It combines the advantages of both the physical and virtual prototypes to achieve the qualitative and quantitative evaluation of the ergonomics. Firstly, this paper defines the component of the virtual cockpit modelling and the mapping relationship between real space and virtual space. This demonstrates the virtual reality model of the cockpit and constructs the foundation for the ergonomic analysis. As a result, the subjective and objective evaluation indexes are put forward, establishing a comprehensive evaluation process of \"subjective qualitative and objective quantitative\" and achieving a comprehensive assessment oriented to the ergonomics. Finally, the effectiveness of the proposed evaluation method in this paper is verified by ergonomic analysis of the joystick.", "abstracts": [ { "abstractType": "Regular", "content": "The ergonomic design of the aircraft cockpit directly affects the pilots operating experience, which is related to the comfort, convenience and flight safety of the aircraft. The subjective and objective comprehensive evaluation method of the operating efficiency in the cockpit, based on virtual reality, is proposed in this paper. It combines the advantages of both the physical and virtual prototypes to achieve the qualitative and quantitative evaluation of the ergonomics. Firstly, this paper defines the component of the virtual cockpit modelling and the mapping relationship between real space and virtual space. This demonstrates the virtual reality model of the cockpit and constructs the foundation for the ergonomic analysis. As a result, the subjective and objective evaluation indexes are put forward, establishing a comprehensive evaluation process of \"subjective qualitative and objective quantitative\" and achieving a comprehensive assessment oriented to the ergonomics. Finally, the effectiveness of the proposed evaluation method in this paper is verified by ergonomic analysis of the joystick.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The ergonomic design of the aircraft cockpit directly affects the pilots operating experience, which is related to the comfort, convenience and flight safety of the aircraft. The subjective and objective comprehensive evaluation method of the operating efficiency in the cockpit, based on virtual reality, is proposed in this paper. It combines the advantages of both the physical and virtual prototypes to achieve the qualitative and quantitative evaluation of the ergonomics. Firstly, this paper defines the component of the virtual cockpit modelling and the mapping relationship between real space and virtual space. This demonstrates the virtual reality model of the cockpit and constructs the foundation for the ergonomic analysis. As a result, the subjective and objective evaluation indexes are put forward, establishing a comprehensive evaluation process of \"subjective qualitative and objective quantitative\" and achieving a comprehensive assessment oriented to the ergonomics. Finally, the effectiveness of the proposed evaluation method in this paper is verified by ergonomic analysis of the joystick.", "fno": "550000a538", "keywords": [ "Aircraft Instrumentation", "Ergonomics", "Fuzzy Set Theory", "Interactive Devices", "Virtual Prototyping", "Virtual Reality", "Ergonomic Analysis", "Subjective Evaluation Indexes", "Objective Evaluation Indexes", "Comprehensive Evaluation Process", "Comprehensive Assessment", "Subjective Comprehensive Evaluation", "Cockpit Operation Efficiency", "Ergonomic Design", "Aircraft Cockpit", "Flight Safety", "Subjective Evaluation Method", "Objective Comprehensive Evaluation Method", "Operating Efficiency", "Physical Prototypes", "Virtual Prototypes", "Qualitative Evaluation", "Quantitative Evaluation", "Virtual Cockpit Modelling", "Virtual Space", "Virtual Reality Model", "Joystick", "Solid Modeling", "Virtual Reality", "Ergonomics", "Computational Modeling", "Prototypes", "Atmospheric Modeling", "Aircraft", "Virtual Reality", "Comprehensive Assessment", "Cockpit Modeling" ], "authors": [ { "affiliation": null, "fullName": "Jiazhen Pang", "givenName": "Jiazhen", "surname": "Pang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Yu Fang", "givenName": "Yu", "surname": "Fang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Baoning Ji", "givenName": "Baoning", "surname": "Ji", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jianhan Wang", "givenName": "Jianhan", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icisce", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-07-01T00:00:00", "pubType": "proceedings", "pages": "538-543", "year": "2018", "issn": null, "isbn": "978-1-5386-5500-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "550000a533", "articleId": "17D45VtKiuY", "__typename": "AdjacentArticleType" }, "next": { "fno": "550000a544", "articleId": "17D45XuDNFk", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isvri/2011/0054/0/05759615", "title": "MRStudio: A mixed reality display system for aircraft cockpit", "doi": null, "abstractUrl": "/proceedings-article/isvri/2011/05759615/12OmNC3FGg8", "parentPublication": { "id": "proceedings/isvri/2011/0054/0", "title": "2011 IEEE International Symposium on VR Innovation (ISVRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2017/0677/0/0677a167", "title": "Investigation into Ergonomics in Ladder of the Hard Sleeper Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a167/12OmNwudQQt", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2017/0677/0/0677a171", "title": "Ergonomic Aspect and Design of Hand Tools in Ceramic Industry Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a171/12OmNxYbSZv", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2013/4795/0/06549376", "title": "Touch experience in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2013/06549376/12OmNy2agRt", "parentPublication": { "id": "proceedings/vr/2013/4795/0", "title": "2013 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsi/2017/2820/0/2820a281", "title": "Virtual Simulator Ergo Truck of Crew Operations During the Removal of Equipment from Fire Trucks", "doi": null, "abstractUrl": "/proceedings-article/mcsi/2017/2820a281/12OmNzUgdcM", "parentPublication": { "id": "proceedings/mcsi/2017/2820/0", "title": "2017 Fourth International Conference on Mathematics and Computers in Sciences and in Industry (MCSI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icst/2020/5778/0/09159065", "title": "CDST: A Toolkit for Testing Cockpit Display Systems", "doi": null, "abstractUrl": "/proceedings-article/icst/2020/09159065/1m3oPKvjLVu", "parentPublication": { "id": "proceedings/icst/2020/5778/0", "title": "2020 IEEE 13th International Conference on Software Testing, Validation and Verification (ICST)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiea/2020/8288/0/828800a556", "title": "Application of Comfort Evaluation and Visual Field Checking in FSC Cockpit Layout Design", "doi": null, "abstractUrl": "/proceedings-article/aiea/2020/828800a556/1nTujrf1SVi", "parentPublication": { "id": "proceedings/aiea/2020/8288/0", "title": "2020 International Conference on Artificial Intelligence and Electromechanical Automation (AIEA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a463", "title": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a463/1oZBBL1XVcs", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aivr/2020/7463/0/746300a218", "title": "Comfort of Aircraft Seats for Customers of Size using Digital Human Model in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/aivr/2020/746300a218/1qpzCpOPwcM", "parentPublication": { "id": "proceedings/aivr/2020/7463/0", "title": "2020 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09537299", "title": "ERGOBOSS: onomic ptimization of dy-upporting urfaces<bold/><bold/><bold/><bold/><bold/>", "doi": null, "abstractUrl": "/journal/tg/2022/12/09537299/1wTivGVoPbW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jIx7fmpQ9a", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jIxcLPaFR6", "doi": "10.1109/VR46266.2020.00062", "title": "Visualization and evaluation of ergonomic visual field parameters in first person virtual environments", "normalizedTitle": "Visualization and evaluation of ergonomic visual field parameters in first person virtual environments", "abstract": "Especially in the field of mechanical engineering, the market pressure for small and medium-sized enterprises increases because of faster developments and more complex designs. Nevertheless, standards and ergonomic safety regulations must be observed. In recent years, various applications were presented to help users understand and comply with inconvenient requirements. However, the time-consuming tools are primarily for ergonomics experts and often overwhelm engineers from small and medium-sized enterprises. We present an immersive concept that allows inexperienced users to quickly assess the ergonomic parameters of the visual field, represented by easy-to-understand visualizations. The solution is compared with standard market and scientific approaches.", "abstracts": [ { "abstractType": "Regular", "content": "Especially in the field of mechanical engineering, the market pressure for small and medium-sized enterprises increases because of faster developments and more complex designs. Nevertheless, standards and ergonomic safety regulations must be observed. In recent years, various applications were presented to help users understand and comply with inconvenient requirements. However, the time-consuming tools are primarily for ergonomics experts and often overwhelm engineers from small and medium-sized enterprises. We present an immersive concept that allows inexperienced users to quickly assess the ergonomic parameters of the visual field, represented by easy-to-understand visualizations. The solution is compared with standard market and scientific approaches.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Especially in the field of mechanical engineering, the market pressure for small and medium-sized enterprises increases because of faster developments and more complex designs. Nevertheless, standards and ergonomic safety regulations must be observed. In recent years, various applications were presented to help users understand and comply with inconvenient requirements. However, the time-consuming tools are primarily for ergonomics experts and often overwhelm engineers from small and medium-sized enterprises. We present an immersive concept that allows inexperienced users to quickly assess the ergonomic parameters of the visual field, represented by easy-to-understand visualizations. The solution is compared with standard market and scientific approaches.", "fno": "09089629", "keywords": [ "Ergonomics", "Tools", "Solid Modeling", "Visualization", "Prototypes", "Three Dimensional Displays", "Virtual Environments", "Human Centered Computing", "Ergonomics Human Centered Computing", "Virtual Reality Human Centered Computing", "User Centered Design Human Centered Computing", "Assistance" ], "authors": [ { "affiliation": "Technische Universität,Dresden", "fullName": "Tobias Günther", "givenName": "Tobias", "surname": "Günther", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität,Dresden", "fullName": "Inga-Lisa Hilgers", "givenName": "Inga-Lisa", "surname": "Hilgers", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität,Dresden", "fullName": "Rainer Groh", "givenName": "Rainer", "surname": "Groh", "__typename": "ArticleAuthorType" }, { "affiliation": "Technische Universität,Dresden", "fullName": "Martin Schmauder", "givenName": "Martin", "surname": "Schmauder", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "416-424", "year": "2020", "issn": null, "isbn": "978-1-7281-5608-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09089475", "articleId": "1jIx9ixQvzq", "__typename": "AdjacentArticleType" }, "next": { "fno": "09089620", "articleId": "1jIxaTvTkm4", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/bife/2013/4777/0/4777a291", "title": "The Development of Multi-level Capital Market - Promote the Development of Small and Medium Enterprises", "doi": null, "abstractUrl": "/proceedings-article/bife/2013/4777a291/12OmNwg1Ugu", "parentPublication": { "id": "proceedings/bife/2013/4777/0", "title": "2013 Sixth International Conference on Business Intelligence and Financial Engineering (BIFE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2017/0677/0/0677a171", "title": "Ergonomic Aspect and Design of Hand Tools in Ceramic Industry Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a171/12OmNxYbSZv", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dcve/2014/5217/0/07160930", "title": "Collaborative virtual environments for ergonomics: embedding the design engineer role in the loop", "doi": null, "abstractUrl": "/proceedings-article/3dcve/2014/07160930/12OmNyen1vD", "parentPublication": { "id": "proceedings/3dcve/2014/5217/0", "title": "2014 International Workshop on Collaborative Virtual Environments (3DCVE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/haptics/2010/6821/0/05444613", "title": "Active Handrest for precision manipulation and ergonomic support", "doi": null, "abstractUrl": "/proceedings-article/haptics/2010/05444613/12OmNyyO8KO", "parentPublication": { "id": "proceedings/haptics/2010/6821/0", "title": "2010 IEEE Haptics Symposium (Formerly known as Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2010/4077/3/4077e057", "title": "Research on Operational Mode of Small and Medium-Sized Logistics Enterprises Symbiotic System", "doi": null, "abstractUrl": "/proceedings-article/icicta/2010/4077e057/12OmNzIl3Ej", "parentPublication": { "id": "proceedings/icicta/2010/4077/3", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2018/5500/0/550000a538", "title": "Subjective and Objective Comprehensive Evaluation of Cockpit Operation Efficiency Based on Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/icisce/2018/550000a538/17D45WHONqc", "parentPublication": { "id": "proceedings/icisce/2018/5500/0", "title": "2018 5th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a430", "title": "Immersive Analytics for Ergonomics Evaluation in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a430/1CJdUt8sMYU", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2022/9792/0/09912904", "title": "GRETA: erGonomic stREss Tracking pAd", "doi": null, "abstractUrl": "/proceedings-article/iscc/2022/09912904/1HBK8dpm7M4", "parentPublication": { "id": "proceedings/iscc/2022/9792/0", "title": "2022 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiotcs/2022/3410/0/341000a138", "title": "BP Neural Network Algorithm-based Innovation Management Model Analysis System for E-commerce Enterprises", "doi": null, "abstractUrl": "/proceedings-article/aiotcs/2022/341000a138/1MuZMJwhIB2", "parentPublication": { "id": "proceedings/aiotcs/2022/3410/0", "title": "2022 International Conference on Artificial Intelligence of Things and Crowdsensing (AIoTCs)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a463", "title": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a463/1oZBBL1XVcs", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1oZBzHKi4UM", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "acronym": "svr", "groupId": "1800426", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1oZBBL1XVcs", "doi": "10.1109/SVR51698.2020.00074", "title": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "normalizedTitle": "Ergonomic Analysis supported by Virtual Reality: a Systematic Literature Review", "abstract": "Technological advances fomented the production process automation, however, in manufacturing industries many activities require manual operations. Research has shown that ergonomic conditions have a direct influence on the safety of employees, on the cost and quality of production. This study aims to characterize the current knowledge about the use of VR for the analysis of ergonomic problems related to people's interactions with his workplace. Based on a systematic review of the literature (RSL) performed on databases ScienceDirect, IEEE Xplore and SpringerLink, which identified twelve studies. The results indicate that most studies are related to automotive industry and are applied to ergonomic analysis for workstations and new process development; the methodologies used are diverse and vary according to need. Further research is needed to investigate how VR can support the analysis of ergonomics in more specific tasks, such as the force applied by the operator in assembling parts, or in the assessment of ergonomic risks already in the product development stage.", "abstracts": [ { "abstractType": "Regular", "content": "Technological advances fomented the production process automation, however, in manufacturing industries many activities require manual operations. Research has shown that ergonomic conditions have a direct influence on the safety of employees, on the cost and quality of production. This study aims to characterize the current knowledge about the use of VR for the analysis of ergonomic problems related to people's interactions with his workplace. Based on a systematic review of the literature (RSL) performed on databases ScienceDirect, IEEE Xplore and SpringerLink, which identified twelve studies. The results indicate that most studies are related to automotive industry and are applied to ergonomic analysis for workstations and new process development; the methodologies used are diverse and vary according to need. Further research is needed to investigate how VR can support the analysis of ergonomics in more specific tasks, such as the force applied by the operator in assembling parts, or in the assessment of ergonomic risks already in the product development stage.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Technological advances fomented the production process automation, however, in manufacturing industries many activities require manual operations. Research has shown that ergonomic conditions have a direct influence on the safety of employees, on the cost and quality of production. This study aims to characterize the current knowledge about the use of VR for the analysis of ergonomic problems related to people's interactions with his workplace. Based on a systematic review of the literature (RSL) performed on databases ScienceDirect, IEEE Xplore and SpringerLink, which identified twelve studies. The results indicate that most studies are related to automotive industry and are applied to ergonomic analysis for workstations and new process development; the methodologies used are diverse and vary according to need. Further research is needed to investigate how VR can support the analysis of ergonomics in more specific tasks, such as the force applied by the operator in assembling parts, or in the assessment of ergonomic risks already in the product development stage.", "fno": "923100a463", "keywords": [ "Ergonomics", "Manufacturing Industries", "Occupational Health", "Product Development", "Virtual Reality", "Ergonomic Analysis", "Virtual Reality", "Technological Advances", "Production Process Automation", "Manufacturing Industries", "Manual Operations", "Ergonomic Conditions", "VR", "Ergonomic Problems", "Systematic Review", "Process Development", "Ergonomic Risks", "Product Development Stage", "Ergonomics", "Solid Modeling", "Virtual Reality", "Tools", "Workstations", "Employment", "Automotive Engineering", "Virtual Reality", "Ergonomics", "Industry", "Workplaces" ], "authors": [ { "affiliation": "Universitário SENAI CIMATEC,Dpt. Pós-graduação Centro,Salvador,Brazil", "fullName": "Adailton Gonçalves da Silva", "givenName": "Adailton Gonçalves da", "surname": "Silva", "__typename": "ArticleAuthorType" }, { "affiliation": "Universitário SENAI CIMATEC,Dpt. de Modelagem Computacional Centro,Salvador,Brazil", "fullName": "Ingrid Winkler", "givenName": "Ingrid", "surname": "Winkler", "__typename": "ArticleAuthorType" }, { "affiliation": "Universitário SENAI CIMATEC,Dpt. Indústria Criativa Centro,Salvador,Brazil", "fullName": "Marcus Mendes Gomes", "givenName": "Marcus Mendes", "surname": "Gomes", "__typename": "ArticleAuthorType" }, { "affiliation": "Universidade Federal da Bahia,Dpt. Engenharia Elétrica,Salvador,Brazil", "fullName": "Ubiratan De Melo Pinto Jr.", "givenName": "Ubiratan", "surname": "De Melo Pinto", "__typename": "ArticleAuthorType" } ], "idPrefix": "svr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "463-468", "year": "2020", "issn": null, "isbn": "978-1-7281-9231-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "923100a453", "articleId": "1oZBDk3EOPK", "__typename": "AdjacentArticleType" }, "next": { "fno": "923100a469", "articleId": "1oZBCeXe9m8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/dac/1984/0542/0/01585799", "title": "Ergonomic Studies in Computer Aided Design", "doi": null, "abstractUrl": "/proceedings-article/dac/1984/01585799/12OmNvDZEVE", "parentPublication": { "id": "proceedings/dac/1984/0542/0", "title": "21st Design Automation Conference Proceedings", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2013/5001/0/06655762", "title": "The Relationship between Requirements Engineering and Virtual Reality Systems: A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2013/06655762/12OmNwDSdds", "parentPublication": { "id": "proceedings/svr/2013/5001/0", "title": "2013 XV Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2015/9795/0/9795a754", "title": "User-Centric Workflow Ergonomics in Industrial Environments: Concept and Architecture of an Assistance System", "doi": null, "abstractUrl": "/proceedings-article/csci/2015/9795a754/12OmNwIpNpZ", "parentPublication": { "id": "proceedings/csci/2015/9795/0", "title": "2015 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2017/0677/0/0677a171", "title": "Ergonomic Aspect and Design of Hand Tools in Ceramic Industry Using JACK", "doi": null, "abstractUrl": "/proceedings-article/crc/2017/0677a171/12OmNxYbSZv", "parentPublication": { "id": "proceedings/crc/2017/0677/0", "title": "2017 2nd International Conference on Cybernetics, Robotics and Control (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/chase/2018/7206/0/720600a027", "title": "Improved Ergonomic Risk Factor Assessment Using OpenSim and Inertial Measurement Units", "doi": null, "abstractUrl": "/proceedings-article/chase/2018/720600a027/181W9nHlku6", "parentPublication": { "id": "proceedings/chase/2018/7206/0", "title": "2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/01/09912348", "title": "ErgoExplorer: Interactive Ergonomic Risk Assessment from Video Collections", "doi": null, "abstractUrl": "/journal/tg/2023/01/09912348/1HeiX5L0HGo", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/03/08826009", "title": "Automatic Sitting Pose Generation for Ergonomic Ratings of Chairs", "doi": null, "abstractUrl": "/journal/tg/2021/03/08826009/1eTOD4tcaSk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a067", "title": "Virtual Reality on Product Usability Testing: A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a067/1oZBCPBt7AA", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a001", "title": "Virtual Reality and Augmented reality applications in agriculture: a literature review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a001/1oZBDcFweTC", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2020/9231/0/923100a339", "title": "Automotive Marketing Research and Virtual Reality: A Systematic Literature Review", "doi": null, "abstractUrl": "/proceedings-article/svr/2020/923100a339/1oZBEqevCKs", "parentPublication": { "id": "proceedings/svr/2020/9231/0", "title": "2020 22nd Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCf1Dp1", "title": "Visualization Conference, IEEE", "acronym": "ieee-vis", "groupId": "1000796", "volume": "0", "displayVolume": "0", "year": "2002", "__typename": "ProceedingType" }, "article": { "id": "12OmNBcAGMn", "doi": "10.1109/VISUAL.2002.1183788", "title": "Face-based Luminance Matching for Perceptual Colormap Generation", "normalizedTitle": "Face-based Luminance Matching for Perceptual Colormap Generation", "abstract": "Most systems used for creating and displaying colormap-based visualizations are not photometrically calibrated. That is, the relationship between RGB input levels and perceived luminance is usually not known, due to variations in the monitor, hardware configuration, and the viewing environment. However, the luminance component of perceptually based colormaps should be controlled, due to the central role that luminance plays in our visual processing. We address this problem with a simple and effective method for performing luminance matching on an uncalibrated monitor. The method is akin to the minimally distinct border technique (a previous method of luminance matching used for measuring luminous efficiency), but our method relies on the brain's highly developed ability to distinguish human faces. We present a user study showing that our method produces equivalent results to the minimally distinct border technique, but with significantly improved precision. We demonstrate how results from our luminance matching method can be directly applied to create new univariate colormaps.", "abstracts": [ { "abstractType": "Regular", "content": "Most systems used for creating and displaying colormap-based visualizations are not photometrically calibrated. That is, the relationship between RGB input levels and perceived luminance is usually not known, due to variations in the monitor, hardware configuration, and the viewing environment. However, the luminance component of perceptually based colormaps should be controlled, due to the central role that luminance plays in our visual processing. We address this problem with a simple and effective method for performing luminance matching on an uncalibrated monitor. The method is akin to the minimally distinct border technique (a previous method of luminance matching used for measuring luminous efficiency), but our method relies on the brain's highly developed ability to distinguish human faces. We present a user study showing that our method produces equivalent results to the minimally distinct border technique, but with significantly improved precision. We demonstrate how results from our luminance matching method can be directly applied to create new univariate colormaps.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most systems used for creating and displaying colormap-based visualizations are not photometrically calibrated. That is, the relationship between RGB input levels and perceived luminance is usually not known, due to variations in the monitor, hardware configuration, and the viewing environment. However, the luminance component of perceptually based colormaps should be controlled, due to the central role that luminance plays in our visual processing. We address this problem with a simple and effective method for performing luminance matching on an uncalibrated monitor. The method is akin to the minimally distinct border technique (a previous method of luminance matching used for measuring luminous efficiency), but our method relies on the brain's highly developed ability to distinguish human faces. We present a user study showing that our method produces equivalent results to the minimally distinct border technique, but with significantly improved precision. We demonstrate how results from our luminance matching method can be directly applied to create new univariate colormaps.", "fno": "7498kindlman", "keywords": [ "Colormaps", "Color Scales", "Isoluminance", "Brightness Matching", "Perceptually Based Visualization" ], "authors": [ { "affiliation": "University of Utah", "fullName": "Gordon Kindlmann", "givenName": "Gordon", "surname": "Kindlmann", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida", "fullName": "Erik Reinhard", "givenName": "Erik", "surname": "Reinhard", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Utah", "fullName": "Sarah Creem", "givenName": "Sarah", "surname": "Creem", "__typename": "ArticleAuthorType" } ], "idPrefix": "ieee-vis", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2002-10-01T00:00:00", "pubType": "proceedings", "pages": "null", "year": "2002", "issn": "1070-2385", "isbn": "0-7803-7498-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "7498sheffer", "articleId": "12OmNylsZUq", "__typename": "AdjacentArticleType" }, "next": { "fno": "7498jiang", "articleId": "12OmNrNh0Nj", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/asap/1997/7958/0/79580479", "title": "A flexible VLSI architecture for variable block size segment matching with luminance correction", "doi": null, "abstractUrl": "/proceedings-article/asap/1997/79580479/12OmNCga1ON", "parentPublication": { "id": "proceedings/asap/1997/7958/0", "title": "Proceedings IEEE International Conference on Application-Specific Systems, Architectures and Processors", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2001/7200/0/7200rogowitz", "title": "The \"Which Blair Project\": A Quick Visual Method for Evaluating Perceptual Color Maps", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2001/7200rogowitz/12OmNvAiSft", "parentPublication": { "id": "proceedings/ieee-vis/2001/7200/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/1995/7042/0/70420591", "title": "Face detection by fuzzy pattern matching", "doi": null, "abstractUrl": "/proceedings-article/iccv/1995/70420591/12OmNxHJ9rY", "parentPublication": { "id": "proceedings/iccv/1995/7042/0", "title": "Computer Vision, IEEE International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/1999/06/i0557", "title": "Face Detection From Color Images Using a Fuzzy Pattern Matching Method", "doi": null, "abstractUrl": "/journal/tp/1999/06/i0557/13rRUwbs1Tu", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2014/06/mcg2014060083", "title": "Random Per-Element Luminance Modulation for Improved Visual Tracking", "doi": null, "abstractUrl": "/magazine/cg/2014/06/mcg2014060083/13rRUypp5am", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciev-&-icivpr/2018/5163/0/08641063", "title": "Color Image Enhancement Using Luminance Histogram Equalization and Two-Factor Saturation Control", "doi": null, "abstractUrl": "/proceedings-article/iciev-&-icivpr/2018/08641063/17PYElLxuGp", "parentPublication": { "id": "proceedings/iciev-&-icivpr/2018/5163/0", "title": "2018 Joint 7th International Conference on Informatics, Electronics & Vision (ICIEV) and 2018 2nd International Conference on Imaging, Vision & Pattern Recognition (icIVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a477", "title": "Digital Precompensation for Luminance Nonuniformities in Augmented Reality Head Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a477/1J7WkpqbbYA", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scivis/2018/6882/0/08823772", "title": "Ordering Perceptions about Perceptual Order", "doi": null, "abstractUrl": "/proceedings-article/scivis/2018/08823772/1d5kxFjYlSE", "parentPublication": { "id": "proceedings/scivis/2018/6882/0", "title": "2018 IEEE Scientific Visualization Conference (SciVis)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/crc/2019/4620/0/462000a118", "title": "RGB Compensation Based on Background Shadow Subtraction for Low-Luminance Pill Recognition", "doi": null, "abstractUrl": "/proceedings-article/crc/2019/462000a118/1iTuIEDye1G", "parentPublication": { "id": "proceedings/crc/2019/4620/0", "title": "2019 4th International Conference on Control, Robotics and Cybernetics (CRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09395231", "title": "Deep Colormap Extraction From Visualizations", "doi": null, "abstractUrl": "/journal/tg/2022/12/09395231/1syq9xMMQY8", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxV4itF", "title": "2017 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNBQ2W0V", "doi": "10.1109/VR.2017.7892318", "title": "Observation of mirror reflection and voluntary self-touch enhance self-recognition for a telexistence robot", "normalizedTitle": "Observation of mirror reflection and voluntary self-touch enhance self-recognition for a telexistence robot", "abstract": "In this paper, we analyze the subjective feelings about the body of the operator of a telexistence system. We investigate whether a mirror reflection and self-touch affect body ownership and agency for a surrogate robot avatar in a virtual reality experiment. Results showed that the presence of tactile sensations synchronized with the view of self-touch events enhanced mirror self-recognition.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we analyze the subjective feelings about the body of the operator of a telexistence system. We investigate whether a mirror reflection and self-touch affect body ownership and agency for a surrogate robot avatar in a virtual reality experiment. Results showed that the presence of tactile sensations synchronized with the view of self-touch events enhanced mirror self-recognition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we analyze the subjective feelings about the body of the operator of a telexistence system. We investigate whether a mirror reflection and self-touch affect body ownership and agency for a surrogate robot avatar in a virtual reality experiment. Results showed that the presence of tactile sensations synchronized with the view of self-touch events enhanced mirror self-recognition.", "fno": "07892318", "keywords": [ "Mirrors", "Robot Sensing Systems", "Delays", "Face", "Virtual Reality", "Correlation", "Telexistence", "Body Ownership", "Agency", "Self Touch", "Mirror Recognition" ], "authors": [ { "affiliation": "The University of Tokyo, Japan", "fullName": "Yasuyuki Inoue", "givenName": "Yasuyuki", "surname": "Inoue", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tokyo, Japan", "fullName": "Fumihiro Kato", "givenName": "Fumihiro", "surname": "Kato", "__typename": "ArticleAuthorType" }, { "affiliation": "Keio University, Japan", "fullName": "Mhd Yamen Saraiji", "givenName": "Mhd Yamen", "surname": "Saraiji", "__typename": "ArticleAuthorType" }, { "affiliation": "Keio University, Japan", "fullName": "Charith Lasantha Fernando", "givenName": "Charith Lasantha", "surname": "Fernando", "__typename": "ArticleAuthorType" }, { "affiliation": "The University of Tokyo, Japan", "fullName": "Susumu Tachi", "givenName": "Susumu", "surname": "Tachi", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-01-01T00:00:00", "pubType": "proceedings", "pages": "345-346", "year": "2017", "issn": "2375-5334", "isbn": "978-1-5090-6647-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07892317", "articleId": "12OmNApcufx", "__typename": "AdjacentArticleType" }, "next": { "fno": "07892319", "articleId": "12OmNyv7mbV", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2013/2869/0/06671803", "title": "Kinect for interactive AR anatomy learning", "doi": null, "abstractUrl": "/proceedings-article/ismar/2013/06671803/12OmNCd2rmp", "parentPublication": { "id": "proceedings/ismar/2013/2869/0", "title": "2013 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isvri/2011/0054/0/05759612", "title": "Vision-based cutaneous sensor to measure both tactile and thermal information for telexistence", "doi": null, "abstractUrl": "/proceedings-article/isvri/2011/05759612/12OmNCmpcGg", "parentPublication": { "id": "proceedings/isvri/2011/0054/0", "title": "2011 IEEE International Symposium on VR Innovation (ISVRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2015/7082/0/07177468", "title": "Mirror mirror on the wall… An intelligent multisensory mirror for well-being self-assessment", "doi": null, "abstractUrl": "/proceedings-article/icme/2015/07177468/12OmNxbEtLF", "parentPublication": { "id": "proceedings/icme/2015/7082/0", "title": "2015 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icise/2017/4879/0/4879a074", "title": "A Mirror World-Based Robot Control System", "doi": null, "abstractUrl": "/proceedings-article/icise/2017/4879a074/12OmNyQpgN2", "parentPublication": { "id": "proceedings/icise/2017/4879/0", "title": "2017 Second International Conference on Information Systems Engineering (ICISE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2013/2246/0/2246a003", "title": "Virtual reality and telexistence", "doi": null, "abstractUrl": "/proceedings-article/cw/2013/2246a003/12OmNyUFfKK", "parentPublication": { "id": "proceedings/cw/2013/2246/0", "title": "2013 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2016/5696/0/07950249", "title": "S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments", "doi": null, "abstractUrl": "/proceedings-article/msn/2016/07950249/12OmNzTYC3O", "parentPublication": { "id": "proceedings/msn/2016/5696/0", "title": "2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icat/2013/11/0/06728901", "title": "Experiencing ones own hand in telexistence manipulation with a 15 DOF anthropomorphic robot hand and a flexible master glove", "doi": null, "abstractUrl": "/proceedings-article/icat/2013/06728901/12OmNzd7bDG", "parentPublication": { "id": "proceedings/icat/2013/11/0", "title": "2013 23rd International Conference on Artificial Reality and Telexistence (ICAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2022/6814/0/681400a102", "title": "Assistive Telexistence System Using Motion Blending", "doi": null, "abstractUrl": "/proceedings-article/cw/2022/681400a102/1I6RQLXc4Fi", "parentPublication": { "id": "proceedings/cw/2022/6814/0", "title": "2022 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2023/4839/0/483900a407", "title": "Telexistence-Based Remote Maintenance for Marine Engineers", "doi": null, "abstractUrl": "/proceedings-article/vrw/2023/483900a407/1MSefnz473W", "parentPublication": { "id": "proceedings/vrw/2023/4839/null", "title": "2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798104", "title": "Walking Experience Under Equivalent Gravity Condition on Scale Conversion Telexistence", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798104/1cJ0GEEyqf6", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13bd1eJgoia", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13bd1sx4Zt3", "doi": "10.1109/VR.2018.8447562", "title": "In Limbo: The Effect of Gradual Visual Transition Between Real and Virtual on Virtual Body Ownership Illusion and Presence", "normalizedTitle": "In Limbo: The Effect of Gradual Visual Transition Between Real and Virtual on Virtual Body Ownership Illusion and Presence", "abstract": "We present a study of the relative effects of gradual versus instantaneous transition between one's own body and a virtual surrogate body, and between one's real-world environment and a virtual environment. The approach uses a stereo camera attached to an HMD to provide the illusions of virtual body ownership and spatial presence in VR. We conducted the study in a static environment which is similar to the traditional rubber hand experiment platform. Since our transition method is a blending scheme between real and virtual contexts, our study investigates the direct use of real-world information during the transition to increase the dominant visual illusion in a virtual space. We also investigate the use of a conceptual stage, called Limbo, which is a transition phase that evokes anticipation of the virtual world, providing a psychological link between the real and virtual before we enter a totally virtual space. Our study of the transition effect shows that the Limbo state has a significant influence in one's illusions of virtual body ownership (VBOI) and presence.", "abstracts": [ { "abstractType": "Regular", "content": "We present a study of the relative effects of gradual versus instantaneous transition between one's own body and a virtual surrogate body, and between one's real-world environment and a virtual environment. The approach uses a stereo camera attached to an HMD to provide the illusions of virtual body ownership and spatial presence in VR. We conducted the study in a static environment which is similar to the traditional rubber hand experiment platform. Since our transition method is a blending scheme between real and virtual contexts, our study investigates the direct use of real-world information during the transition to increase the dominant visual illusion in a virtual space. We also investigate the use of a conceptual stage, called Limbo, which is a transition phase that evokes anticipation of the virtual world, providing a psychological link between the real and virtual before we enter a totally virtual space. Our study of the transition effect shows that the Limbo state has a significant influence in one's illusions of virtual body ownership (VBOI) and presence.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We present a study of the relative effects of gradual versus instantaneous transition between one's own body and a virtual surrogate body, and between one's real-world environment and a virtual environment. The approach uses a stereo camera attached to an HMD to provide the illusions of virtual body ownership and spatial presence in VR. We conducted the study in a static environment which is similar to the traditional rubber hand experiment platform. Since our transition method is a blending scheme between real and virtual contexts, our study investigates the direct use of real-world information during the transition to increase the dominant visual illusion in a virtual space. We also investigate the use of a conceptual stage, called Limbo, which is a transition phase that evokes anticipation of the virtual world, providing a psychological link between the real and virtual before we enter a totally virtual space. Our study of the transition effect shows that the Limbo state has a significant influence in one's illusions of virtual body ownership (VBOI) and presence.", "fno": "08447562", "keywords": [ "Avatars", "Virtual Reality", "Transition Phase", "Virtual World", "Totally Virtual Space", "Transition Effect", "Limbo State", "Gradual Visual Transition", "Virtual Body Ownership Illusion", "Relative Effects", "Virtual Surrogate Body", "Real World Environment", "Virtual Environment", "Stereo Camera", "Spatial Presence", "Static Environment", "Traditional Rubber Hand Experiment Platform", "Virtual Contexts", "Real World Information", "Dominant Visual Illusion", "Resists", "Visualization", "Cameras", "Virtual Reality", "Legged Locomotion", "Rubber", "Electronic Mail", "Transition", "Virtual Body Ownership", "Presence", "Perception", "User Study I 3 7 Computer Graphics Three Dimensional Graphics And Realism X 2015 Virtual Reality", "H 5 1 Information Interfaces And Presentation Multimedia Information Systems X 2015 Artificial", "Augmented", "Virtual Realities H 5 1 Information Interfaces And Presentation User Interfaces X 2015 User Centered Design" ], "authors": [ { "affiliation": "SREAL Lab, University of Central Florida", "fullName": "Sungchul Jung", "givenName": "Sungchul", "surname": "Jung", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida", "fullName": "Pamela J. Wisniewski", "givenName": "Pamela J.", "surname": "Wisniewski", "__typename": "ArticleAuthorType" }, { "affiliation": "SREAL Lab, University of Central Florida", "fullName": "Charles E. Hughes", "givenName": "Charles E.", "surname": "Hughes", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "267-272", "year": "2018", "issn": null, "isbn": "978-1-5386-3365-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08448287", "articleId": "13bd1fWcuDr", "__typename": "AdjacentArticleType" }, "next": { "fno": "08448293", "articleId": "13bd1AIBM1S", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2009/3943/0/04811034", "title": "Virtual Reality in Physical Mirrors", "doi": null, "abstractUrl": "/proceedings-article/vr/2009/04811034/12OmNrMZpGM", "parentPublication": { "id": "proceedings/vr/2009/3943/0", "title": "2009 IEEE Virtual Reality Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892227", "title": "Guided head rotation and amplified head rotation: Evaluating semi-natural travel and viewing techniques in virtual reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892227/12OmNwseEYz", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892237", "title": "Exploring the effect of vibrotactile feedback through the floor on social presence in an immersive virtual environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892237/12OmNzh5z4G", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446282", "title": "Illusory Body Ownership Between Different Body Parts: Synchronization of Right Thumb and Right Arm", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446282/13bd1gQYgE6", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040597", "title": "Drumming in Immersive Virtual Reality: The Body Shapes the Way We Play", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040597/13rRUwbs20V", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2017/04/07833192", "title": "A Psychophysical Experiment Regarding Components of the Plausibility Illusion", "doi": null, "abstractUrl": "/journal/tg/2017/04/07833192/13rRUxly8SZ", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/01/08809840", "title": "NaviBoard and NaviChair: Limited Translation Combined with Full Rotation for Efficient Virtual Locomotion", "doi": null, "abstractUrl": "/journal/tg/2021/01/08809840/1cHE3iFCYpy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798346", "title": "Scrambled Body: A Method to Compare Full Body Illusion and Illusory Body Ownership of Body Parts", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798346/1cJ0NSIEQda", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797960", "title": "A Study on the Sense of Burden and Body Ownership on Virtual Slope", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797960/1cJ10VN7wGs", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a729", "title": "[DC] The Effect of Modulating The Step Length of an Embodied Self-Avatars on Gait Symmetry During Treadmill Walking", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a729/1tnXoIo36uY", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J7W6LmbCw0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "acronym": "ismar-adjunct", "groupId": "9973799", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J7WokaCAHm", "doi": "10.1109/ISMAR-Adjunct57072.2022.00205", "title": "The Effect of Out-of-Body Experience and Tactile Feedback on the Sense of Embodiment in Virtual Reality", "normalizedTitle": "The Effect of Out-of-Body Experience and Tactile Feedback on the Sense of Embodiment in Virtual Reality", "abstract": "The out-of-body experience (OBE) is generated from sensory disintegration. In virtual reality (VR), we can provide OBE to people by switching the first-person perspective (1PP) to third-person perspective (3PP). Generally, 1PP is the choice for high body ownership and presence. In addition, it is known from prior research that tactile feedback under 1PP can also provide a better immersive experience. However, it is underexplored whether the combination of 3PP and tactile feedback could affect the sense of embodiment in immersive environments. Thus, we plan to conduct a 2 (OBE: 1PP vs. 3PP) x 2 (Tactile Feedback: with vs. without tactile feedback) VR study to discover the effect of OBE in terms of perspectives and Tactile Feedback (TF). Out study plans to examine the six dimensions of the sense of embodiment: body ownership, agency, tactile sensations, location of the body, external appearance, and response to external stimuli. We will also discuss directions for future studies regarding different perspectives in VR.", "abstracts": [ { "abstractType": "Regular", "content": "The out-of-body experience (OBE) is generated from sensory disintegration. In virtual reality (VR), we can provide OBE to people by switching the first-person perspective (1PP) to third-person perspective (3PP). Generally, 1PP is the choice for high body ownership and presence. In addition, it is known from prior research that tactile feedback under 1PP can also provide a better immersive experience. However, it is underexplored whether the combination of 3PP and tactile feedback could affect the sense of embodiment in immersive environments. Thus, we plan to conduct a 2 (OBE: 1PP vs. 3PP) x 2 (Tactile Feedback: with vs. without tactile feedback) VR study to discover the effect of OBE in terms of perspectives and Tactile Feedback (TF). Out study plans to examine the six dimensions of the sense of embodiment: body ownership, agency, tactile sensations, location of the body, external appearance, and response to external stimuli. We will also discuss directions for future studies regarding different perspectives in VR.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The out-of-body experience (OBE) is generated from sensory disintegration. In virtual reality (VR), we can provide OBE to people by switching the first-person perspective (1PP) to third-person perspective (3PP). Generally, 1PP is the choice for high body ownership and presence. In addition, it is known from prior research that tactile feedback under 1PP can also provide a better immersive experience. However, it is underexplored whether the combination of 3PP and tactile feedback could affect the sense of embodiment in immersive environments. Thus, we plan to conduct a 2 (OBE: 1PP vs. 3PP) x 2 (Tactile Feedback: with vs. without tactile feedback) VR study to discover the effect of OBE in terms of perspectives and Tactile Feedback (TF). Out study plans to examine the six dimensions of the sense of embodiment: body ownership, agency, tactile sensations, location of the body, external appearance, and response to external stimuli. We will also discuss directions for future studies regarding different perspectives in VR.", "fno": "536500a919", "keywords": [ "Haptic Interfaces", "User Experience", "Virtual Reality", "Body Ownership", "External Appearance", "First Person Perspective", "High Body Ownership", "Immersive Environments", "Immersive Experience", "OBE", "Out Of Body Experience", "Sensory Disintegration", "Tactile Feedback", "Tactile Sensations", "Third Person Perspective", "Virtual Reality", "Tactile Sensors", "External Stimuli", "Switches", "Immersive Experience", "Virtual Reality", "Out Of Body Experience", "Tactile Feedback", "RHI", "The Sense Of Embodiment" ], "authors": [ { "affiliation": "Purdue University", "fullName": "Dixuan Cui", "givenName": "Dixuan", "surname": "Cui", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismar-adjunct", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "919-922", "year": "2022", "issn": null, "isbn": "978-1-6654-5365-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "536500a917", "articleId": "1J7W9AhUVt6", "__typename": "AdjacentArticleType" }, "next": { "fno": "536500a923", "articleId": "1J7WtZdBjig", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/3dui/2007/0907/0/04142855", "title": "Tactile Feedback at the Finger Tips for Improved Direct Interaction in Immersive Environments", "doi": null, "abstractUrl": "/proceedings-article/3dui/2007/04142855/12OmNBWi6KF", "parentPublication": { "id": "proceedings/3dui/2007/0907/0", "title": "2007 IEEE Symposium on 3D User Interfaces", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/pive/2012/1218/0/06229793", "title": "Applying “out of the body” funneling and saltation to interaction with virtual and augmented objects", "doi": null, "abstractUrl": "/proceedings-article/pive/2012/06229793/12OmNrJRPoT", "parentPublication": { "id": "proceedings/pive/2012/1218/0", "title": "2012 IEEE VR Workshop on Perceptual Illusions in Virtual Environments", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iswc/2011/0774/0/05959583", "title": "AirTouch: Synchronizing In-air Hand Gesture and On-body Tactile Feedback to Augment Mobile Gesture Interaction", "doi": null, "abstractUrl": "/proceedings-article/iswc/2011/05959583/12OmNwkzumy", "parentPublication": { "id": "proceedings/iswc/2011/0774/0", "title": "2011 15th Annual International Symposium on Wearable Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iros/1995/7108/2/71082084", "title": "Edge tracking using tactile servo", "doi": null, "abstractUrl": "/proceedings-article/iros/1995/71082084/12OmNzzfTm1", "parentPublication": { "id": "proceedings/iros/1995/7108/2", "title": "Intelligent Robots and Systems, IEEE/RSJ International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2016/02/07466833", "title": "Neuromimetic Event-Based Detection for Closed-Loop Tactile Feedback Control of Upper Limb Prostheses", "doi": null, "abstractUrl": "/journal/th/2016/02/07466833/13rRUwcAqqr", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/th/2012/03/tth2012030252", "title": "A High Performance Tactile Feedback Display and Its Integration in Teleoperation", "doi": null, "abstractUrl": "/journal/th/2012/03/tth2012030252/13rRUwjoNx9", "parentPublication": { "id": "trans/th", "title": "IEEE Transactions on Haptics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a001", "title": "Estimating the Just Noticeable Difference of Tactile Feedback in Oculus Quest 2 Controllers", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a001/1JrRdMd6OZi", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2023/05/10049651", "title": "Upper Body Thermal Referral and Tactile Masking for Localized Feedback", "doi": null, "abstractUrl": "/journal/tg/2023/05/10049651/1KYot9Va1na", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a054", "title": "The Effects of Body Tracking Fidelity on Embodiment of an Inverse-Kinematic Avatar for Male Participants", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a054/1pyswgi4b7y", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a350", "title": "Investigating Remote Tactile Feedback for Mid-Air Text-Entry in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a350/1pysyvL4CwU", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cJ7cliz0S4", "title": "2018 3rd International Conference on Control, Robotics and Cybernetics (CRC)", "acronym": "crc-2018", "groupId": "1817824", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "1dlwvlK4RSU", "doi": "10.1109/CRC.2018.00020", "title": "Design of a Wearable Walking Aid Based on Anthropometric Measurement of Cerebral Palsy Children in Malaysia", "normalizedTitle": "Design of a Wearable Walking Aid Based on Anthropometric Measurement of Cerebral Palsy Children in Malaysia", "abstract": "Children suffering from cerebral palsy (CP) tend to have difficulties in moving around, as the condition would affect their walking gait posture. A suitable walking aid would help CP children to maintain balance and body posture during standing and walking. Due to their condition, CP children often have different anthropometric measurement or body sizes compared to children without disabilities. This is one of the biggest challenges as designing assistive devices such as the walking aid, would require suitable dimensions, otherwise it would not fit and cause discomfort, or might further deteriorate the condition of the CP child. This paper describes the work done to acquire anthropometric measurement from CP children in Malaysia and utilizing these measurements in designing the wearable walking aid.", "abstracts": [ { "abstractType": "Regular", "content": "Children suffering from cerebral palsy (CP) tend to have difficulties in moving around, as the condition would affect their walking gait posture. A suitable walking aid would help CP children to maintain balance and body posture during standing and walking. Due to their condition, CP children often have different anthropometric measurement or body sizes compared to children without disabilities. This is one of the biggest challenges as designing assistive devices such as the walking aid, would require suitable dimensions, otherwise it would not fit and cause discomfort, or might further deteriorate the condition of the CP child. This paper describes the work done to acquire anthropometric measurement from CP children in Malaysia and utilizing these measurements in designing the wearable walking aid.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Children suffering from cerebral palsy (CP) tend to have difficulties in moving around, as the condition would affect their walking gait posture. A suitable walking aid would help CP children to maintain balance and body posture during standing and walking. Due to their condition, CP children often have different anthropometric measurement or body sizes compared to children without disabilities. This is one of the biggest challenges as designing assistive devices such as the walking aid, would require suitable dimensions, otherwise it would not fit and cause discomfort, or might further deteriorate the condition of the CP child. This paper describes the work done to acquire anthropometric measurement from CP children in Malaysia and utilizing these measurements in designing the wearable walking aid.", "fno": "773800a057", "keywords": [ "Anthropometry", "Ergonomics", "Gait Analysis", "Handicapped Aids", "Medical Disorders", "Paediatrics", "Walking Aid", "Anthropometric Measurement", "Standing Walking", "Body Posture", "CP Children", "Walking Gait Posture", "Cerebral Palsy Children", "Wearable Walking Aid", "Legged Locomotion", "Weight Measurement", "Size Measurement", "Length Measurement", "Prototypes", "Assistive Devices", "Shape Measurement", "Cerebral Palsy", "Anthropometric Measurement", "Assistive Device" ], "authors": [ { "affiliation": "Universiti Tenaga Nasional", "fullName": "Adzly Anuar", "givenName": "Adzly", "surname": "Anuar", "__typename": "ArticleAuthorType" }, { "affiliation": "Universiti Tenaga Nasional", "fullName": "Farid Mahamud", "givenName": "Farid", "surname": "Mahamud", "__typename": "ArticleAuthorType" }, { "affiliation": "Universiti Tenaga Nasional", "fullName": "Juniza Md Saad", "givenName": "Juniza", "surname": "Md Saad", "__typename": "ArticleAuthorType" }, { "affiliation": "Universiti Tenaga Nasional", "fullName": "Kesavan Rana Singam", "givenName": "Kesavan", "surname": "Rana Singam", "__typename": "ArticleAuthorType" } ], "idPrefix": "crc-2018", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-09-01T00:00:00", "pubType": "proceedings", "pages": "57-60", "year": "2018", "issn": null, "isbn": "978-1-5386-7738-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "773800a053", "articleId": "1cJ7cZaVbO0", "__typename": "AdjacentArticleType" }, "next": { "fno": "773800a061", "articleId": "1cJ7cAhC7Be", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/case/2011/1732/0/06042501", "title": "A new electrically driven walking frame for both passive and active mobility support", "doi": null, "abstractUrl": "/proceedings-article/case/2011/06042501/12OmNApLGPB", "parentPublication": { "id": "proceedings/case/2011/1732/0", "title": "2011 IEEE International Conference on Automation Science and Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mnrao/1994/6435/0/00346252", "title": "Lower limb kinematics of human walking with the medial axis transformation", "doi": null, "abstractUrl": "/proceedings-article/mnrao/1994/00346252/12OmNBtl1sY", "parentPublication": { "id": "proceedings/mnrao/1994/6435/0", "title": "Proceedings of 1994 IEEE Workshop on Motion of Non-rigid and Articulated Objects", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/socpar/2009/3879/0/3879a580", "title": "Application of Hybrid Multi-resolution Wavelet Decomposition Method in Detecting Human Walking Gait Events", "doi": null, "abstractUrl": "/proceedings-article/socpar/2009/3879a580/12OmNClQ0vy", "parentPublication": { "id": "proceedings/socpar/2009/3879/0", "title": "Soft Computing and Pattern Recognition, International Conference of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ichi/2013/5089/0/5089a258", "title": "Mining Association Rules for Neurobehavioral and Motor Disorders in Children Diagnosed with Cerebral Palsy", "doi": null, "abstractUrl": "/proceedings-article/ichi/2013/5089a258/12OmNroij89", "parentPublication": { "id": "proceedings/ichi/2013/5089/0", "title": "2013 IEEE International Conference on Healthcare Informatics (ICHI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ised/2010/4294/0/4294a153", "title": "CePal: An InfraRed Based Remote Control for Cerebral Palsy Patients", "doi": null, "abstractUrl": "/proceedings-article/ised/2010/4294a153/12OmNx7XGYU", "parentPublication": { "id": "proceedings/ised/2010/4294/0", "title": "2010 International Symposium on Electronic System Design", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0/07363248", "title": "Estimation of Physical Activity Walking in Different Slopes Based on Accelerometer Approach", "doi": null, "abstractUrl": "/proceedings-article/cit-iucc-dasc-picom/2015/07363248/12OmNxYL5cW", "parentPublication": { "id": "proceedings/cit-iucc-dasc-picom/2015/0154/0", "title": "2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bibm/2021/0126/0/09669310", "title": "MMDA: Disease Analysis Model Based on Anthropometric Measurement", "doi": null, "abstractUrl": "/proceedings-article/bibm/2021/09669310/1A9VZGvRqwg", "parentPublication": { "id": "proceedings/bibm/2021/0126/0", "title": "2021 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a847", "title": "Auditory Feedback to Make Walking in Virtual Reality More Accessible", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a847/1JrR8Ihk9Tq", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apwc-on-cse/2018/1390/0/139000a295", "title": "Gait analysis in Spastic Hemiplegia and Diplegia cerebral palsy using a wearable activity tracking device - a data quality analysis for deep convolutional neural networks", "doi": null, "abstractUrl": "/proceedings-article/apwc-on-cse/2018/139000a295/1dPoNqyzVNS", "parentPublication": { "id": "proceedings/apwc-on-cse/2018/1390/0", "title": "2018 5th Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a264", "title": "Towards an AR game for walking rehabilitation: Preliminary study of the impact of augmented feedback modalities on walking speed", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a264/1pBMjJvQae4", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jIxhEnA8IE", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jIxkrgIlEY", "doi": "10.1109/VRW50115.2020.00138", "title": "Rhythmic proprioceptive stimulation improves embodiment in a walking avatar when added to visual stimulation", "normalizedTitle": "Rhythmic proprioceptive stimulation improves embodiment in a walking avatar when added to visual stimulation", "abstract": "Synchronicity between user&#x2019;s movements and that of their self-avatar leads to a subjective illusion of embodiment over the virtual avatar. Tendon vibrations can be used to produce a perception of movement, in the absence of any voluntary movements. Such stimulations have been combined with virtual reality to induce the ownership illusion. In this study we investigate the ability of using a virtual self-avatar combined with tendon vibrations to give standing users the impression of walking physically. The vibrations, applied on 24 participants, had different levels of complexity and congruency with the avatar&#x2019;s movements. Overall, results suggest that the pattern of vibrations is not crucial to produce ownership illusion.", "abstracts": [ { "abstractType": "Regular", "content": "Synchronicity between user&#x2019;s movements and that of their self-avatar leads to a subjective illusion of embodiment over the virtual avatar. Tendon vibrations can be used to produce a perception of movement, in the absence of any voluntary movements. Such stimulations have been combined with virtual reality to induce the ownership illusion. In this study we investigate the ability of using a virtual self-avatar combined with tendon vibrations to give standing users the impression of walking physically. The vibrations, applied on 24 participants, had different levels of complexity and congruency with the avatar&#x2019;s movements. Overall, results suggest that the pattern of vibrations is not crucial to produce ownership illusion.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Synchronicity between user’s movements and that of their self-avatar leads to a subjective illusion of embodiment over the virtual avatar. Tendon vibrations can be used to produce a perception of movement, in the absence of any voluntary movements. Such stimulations have been combined with virtual reality to induce the ownership illusion. In this study we investigate the ability of using a virtual self-avatar combined with tendon vibrations to give standing users the impression of walking physically. The vibrations, applied on 24 participants, had different levels of complexity and congruency with the avatar’s movements. Overall, results suggest that the pattern of vibrations is not crucial to produce ownership illusion.", "fno": "09090634", "keywords": [ "Avatars", "Vibrations", "Legged Locomotion", "Visualization", "Tendons", "Complexity Theory", "Embodiment", "Illusion", "Vibrators", "Proprioception H 5 1 Information Interfaces And Presentation Multimedia Information Systems X 2014 Artificial", "Augmented", "And Virtual Realities H 5 2 Information Interfaces And Presentation User Interfaces X 2014 Evaluation Methodology", "Embodiment Illusion Vibrators Proprioception H 5 1 Information Interfaces And Presentation Multimedia Information Systems", "Artificial Augmented And Virtual Realities", "H 5 2 Information Interfaces And Presentation User Interfaces", "Evaluation Methodology" ], "authors": [ { "affiliation": "Ecole de technologie supérieure,Montreal,Canada", "fullName": "Kean Kouakoua", "givenName": "Kean", "surname": "Kouakoua", "__typename": "ArticleAuthorType" }, { "affiliation": "Université de Montréal,Montreal,Canada", "fullName": "Cyril Duclos", "givenName": "Cyril", "surname": "Duclos", "__typename": "ArticleAuthorType" }, { "affiliation": "Ecole de technologie supérieure,Montreal,Canada", "fullName": "Rachid Aissaoui", "givenName": "Rachid", "surname": "Aissaoui", "__typename": "ArticleAuthorType" }, { "affiliation": "Université de Montréal,Montreal,Canada", "fullName": "Sylvie Nadeau", "givenName": "Sylvie", "surname": "Nadeau", "__typename": "ArticleAuthorType" }, { "affiliation": "Ecole de technologie supérieure,Montreal,Canada", "fullName": "David R. Labbe", "givenName": "David R.", "surname": "Labbe", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "573-574", "year": "2020", "issn": null, "isbn": "978-1-7281-6532-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09090479", "articleId": "1jIxlrWEUmc", "__typename": "AdjacentArticleType" }, "next": { "fno": "09090444", "articleId": "1jIxr4u5rFK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2015/1727/0/07223377", "title": "Avatar embodiment realism and virtual fitness training", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223377/12OmNCcKQFn", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040591", "title": "An Evaluation of Self-Avatar Eye Movement for Virtual Embodiment", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040591/13rRUyYBlgz", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a792", "title": "Perception of Symmetry of Actual and Modulated Self-Avatar Gait Movements During Treadmill Walking", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a792/1CJe47o4BRm", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/5555/01/09911682", "title": "Effect of Vibrations on Impression of Walking and Embodiment With First- and Third-Person Avatar", "doi": null, "abstractUrl": "/journal/tg/5555/01/09911682/1HeiWQWKlTG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797832", "title": "Tendon Vibration Increases Vision-induced Kinesthetic Illusions in a Virtual Environment", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797832/1cJ0Z4AOHN6", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798263", "title": "EEG Can Be Used to Measure Embodiment When Controlling a Walking Self-Avatar", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798263/1cJ1gj5NtQc", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2019/2297/0/229700a128", "title": "Combining Tendon Vibration and Visual Stimulation Enhances Kinesthetic Illusions", "doi": null, "abstractUrl": "/proceedings-article/cw/2019/229700a128/1fHklRh3t3W", "parentPublication": { "id": "proceedings/cw/2019/2297/0", "title": "2019 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090412", "title": "Modulating The Gait Of A Real-Time Self-Avatar To Induce Changes In Stride Length During Treadmill Walking", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090412/1jIxkYhRpKg", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090453", "title": "Perception of Walking Self-body Avatar Enhances Virtual-walking Sensation", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090453/1jIxoojmMy4", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a729", "title": "[DC] The Effect of Modulating The Step Length of an Embodied Self-Avatars on Gait Symmetry During Treadmill Walking", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a729/1tnXoIo36uY", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1FwF6rOD2ec", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "acronym": "icde", "groupId": "1000178", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1FwFC7U2nJK", "doi": "10.1109/ICDE53745.2022.00073", "title": "Efficient Participant Contribution Evaluation for Horizontal and Vertical Federated Learning", "normalizedTitle": "Efficient Participant Contribution Evaluation for Horizontal and Vertical Federated Learning", "abstract": "Federated Learning (FL) enables multiple partici-pants to collaboratively train a model in a privacy-preserving way. The performance of the FL model heavily depends on the quality of participants&#x0027; local data, which makes measuring the contributions of participants an essential task for various purposes, e.g., participant selection and reward allocation. The Shapley value is widely adopted by previous work for contribution assessment, which, however, requires repeatedly leave-one-out retraining and thus incurs the prohibitive cost for FL. In this paper, we propose a highly efficient approach, named DIG-FL, to estimate the Shapley value of each participant without any model retraining. It&#x0027;s worth noting that our approach is applicable to both vertical federated learning (VFL) and horizontal federated learning (HFL), and we provide concrete design for VFL and HFL. In addition, we propose a DIG-FL based reweight mechanism to improve the model training in terms of accuracy and convergence speed by dynamically adjusting the weights of participants according to their per-epoch contributions, and theoretically analyze the convergence speed. Our extensive evaluations on 14 public datasets show that the estimated Shapley value is very close to the actual Shapley value with Pearson&#x0027;s correlation coefficient up to 0.987, while the cost is orders of magnitude smaller than state-of-the-art methods. When there are more than 80&#x0025; participants holding low-quality data, by dynamically adjusting the weights, DIG-FL can effectively accelerate the convergence and improve the model accuracy.", "abstracts": [ { "abstractType": "Regular", "content": "Federated Learning (FL) enables multiple partici-pants to collaboratively train a model in a privacy-preserving way. The performance of the FL model heavily depends on the quality of participants&#x0027; local data, which makes measuring the contributions of participants an essential task for various purposes, e.g., participant selection and reward allocation. The Shapley value is widely adopted by previous work for contribution assessment, which, however, requires repeatedly leave-one-out retraining and thus incurs the prohibitive cost for FL. In this paper, we propose a highly efficient approach, named DIG-FL, to estimate the Shapley value of each participant without any model retraining. It&#x0027;s worth noting that our approach is applicable to both vertical federated learning (VFL) and horizontal federated learning (HFL), and we provide concrete design for VFL and HFL. In addition, we propose a DIG-FL based reweight mechanism to improve the model training in terms of accuracy and convergence speed by dynamically adjusting the weights of participants according to their per-epoch contributions, and theoretically analyze the convergence speed. Our extensive evaluations on 14 public datasets show that the estimated Shapley value is very close to the actual Shapley value with Pearson&#x0027;s correlation coefficient up to 0.987, while the cost is orders of magnitude smaller than state-of-the-art methods. When there are more than 80&#x0025; participants holding low-quality data, by dynamically adjusting the weights, DIG-FL can effectively accelerate the convergence and improve the model accuracy.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Federated Learning (FL) enables multiple partici-pants to collaboratively train a model in a privacy-preserving way. The performance of the FL model heavily depends on the quality of participants' local data, which makes measuring the contributions of participants an essential task for various purposes, e.g., participant selection and reward allocation. The Shapley value is widely adopted by previous work for contribution assessment, which, however, requires repeatedly leave-one-out retraining and thus incurs the prohibitive cost for FL. In this paper, we propose a highly efficient approach, named DIG-FL, to estimate the Shapley value of each participant without any model retraining. It's worth noting that our approach is applicable to both vertical federated learning (VFL) and horizontal federated learning (HFL), and we provide concrete design for VFL and HFL. In addition, we propose a DIG-FL based reweight mechanism to improve the model training in terms of accuracy and convergence speed by dynamically adjusting the weights of participants according to their per-epoch contributions, and theoretically analyze the convergence speed. Our extensive evaluations on 14 public datasets show that the estimated Shapley value is very close to the actual Shapley value with Pearson's correlation coefficient up to 0.987, while the cost is orders of magnitude smaller than state-of-the-art methods. When there are more than 80% participants holding low-quality data, by dynamically adjusting the weights, DIG-FL can effectively accelerate the convergence and improve the model accuracy.", "fno": "088300a911", "keywords": [ "Data Privacy", "Learning Artificial Intelligence", "VFL", "Horizontal Federated Learning", "HFL", "DIG FL Based Reweight Mechanism", "Model Training", "Convergence Speed", "Shapley Value", "Privacy Preserving Way", "FL Model", "Participant Contribution Evaluation", "Vertical Federated Learning", "Training", "Costs", "Atmospheric Measurements", "Training Data", "Collaborative Work", "Particle Measurements", "Data Models" ], "authors": [ { "affiliation": "University of Science and Technology of China,School of Computer Science and Technology,Hefei,China", "fullName": "Junhao Wang", "givenName": "Junhao", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Science and Technology of China,School of Computer Science and Technology,Hefei,China", "fullName": "Lan Zhang", "givenName": "Lan", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Science and Technology of China,School of Computer Science and Technology,Hefei,China", "fullName": "Anran Li", "givenName": "Anran", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Science and Technology of China,School of Computer Science and Technology,Hefei,China", "fullName": "Xuanke You", "givenName": "Xuanke", "surname": "You", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Science and Technology of China,School of Computer Science and Technology,Hefei,China", "fullName": "Haoran Cheng", "givenName": "Haoran", "surname": "Cheng", "__typename": "ArticleAuthorType" } ], "idPrefix": "icde", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-05-01T00:00:00", "pubType": "proceedings", "pages": "911-923", "year": "2022", "issn": null, "isbn": "978-1-6654-0883-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "088300a898", "articleId": "1FwFgG7iniE", "__typename": "AdjacentArticleType" }, "next": { "fno": "088300a924", "articleId": "1FwFDooH2PS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "mags/ex/2022/04/09760086", "title": "Contribution- and Participation-Based Federated Learning on Non-IID Data", "doi": null, "abstractUrl": "/magazine/ex/2022/04/09760086/1CHsDKW7Lk4", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09783035", "title": "Adaptive Vertical Federated Learning on Unbalanced Features", "doi": null, "abstractUrl": "/journal/td/2022/12/09783035/1DIx3huthja", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0/945700a927", "title": "Distributed Consensus Problem in Federated Learning Paradigm", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2021/945700a927/1DNCtfeGQ12", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2021/9457/0", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/5555/01/09797864", "title": "FedFAIM: A Model Performance-based Fair Incentive Mechanism for Federated Learning", "doi": null, "abstractUrl": "/journal/bd/5555/01/09797864/1EfIVf8p3bO", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300c440", "title": "Improving Fairness for Data Valuation in Horizontal Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300c440/1FwFIMltYBO", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2022/8137/0/813700a407", "title": "TIFF: Tokenized Incentive for Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/cloud/2022/813700a407/1G6lbv6gIkU", "parentPublication": { "id": "proceedings/cloud/2022/8137/0", "title": "2022 IEEE 15th International Conference on Cloud Computing (CLOUD)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/5555/01/09866779", "title": "Efficient Asynchronous Multi-Participant Vertical Federated Learning", "doi": null, "abstractUrl": "/journal/bd/5555/01/09866779/1G7UcDGZEHu", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859921", "title": "Cascade Vertical Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859921/1G9EGNOVOuY", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2022/5408/0/09925313", "title": "Participant Selection for Hierarchical Federated Learning in Edge Clouds", "doi": null, "abstractUrl": "/proceedings-article/nas/2022/09925313/1I09PEIIXmw", "parentPublication": { "id": "proceedings/nas/2022/5408/0", "title": "2022 IEEE International Conference on Networking, Architecture and Storage (NAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2020/4380/0/438000a707", "title": "Multi-party Private Set Intersection in Vertical Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2020/438000a707/1r54cvnIPFm", "parentPublication": { "id": "proceedings/trustcom/2020/4380/0", "title": "2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1HriKl24EXS", "title": "2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)", "acronym": "icdcs", "groupId": "1000213", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1Hrj5bKb04w", "doi": "10.1109/ICDCS54860.2022.00084", "title": "Toward Cleansing Backdoored Neural Networks in Federated Learning", "normalizedTitle": "Toward Cleansing Backdoored Neural Networks in Federated Learning", "abstract": "Malicious clients can attack federated learning systems using compromised data during the training phase, including backdoor samples. The compromised global model will perform well on the validation dataset designed for the task, but a small subset of data with backdoor patterns may trigger the model to make a wrong prediction. In this work, we propose a new and effective method to mitigate backdoor attacks in federated learning after the training phase. Through federated pruning method, we remove redundant neurons and \"backdoor neurons\", which trigger misbehavior upon recognizing backdoor patterns while keeping silent when the input data is clean. The second optional fine-tuning process is designed to recover the pruning damage to the test accuracy on benign datasets. In the last step, we eliminate backdoor attacks by limiting the extreme values of inputs and neural network neurons&#x2019; weights. Experiments using our defenses mechanism against the state-of-the-art Distributed Backdoor Attacks on CIFAR-10 show promising results; the averaged attack success rate drops more than 70% with less than 2% loss of test accuracy on the validation dataset. Our defense method has also outperformed the state-of-the-art pruning defense against backdoor attacks in the federated learning scenario.", "abstracts": [ { "abstractType": "Regular", "content": "Malicious clients can attack federated learning systems using compromised data during the training phase, including backdoor samples. The compromised global model will perform well on the validation dataset designed for the task, but a small subset of data with backdoor patterns may trigger the model to make a wrong prediction. In this work, we propose a new and effective method to mitigate backdoor attacks in federated learning after the training phase. Through federated pruning method, we remove redundant neurons and \"backdoor neurons\", which trigger misbehavior upon recognizing backdoor patterns while keeping silent when the input data is clean. The second optional fine-tuning process is designed to recover the pruning damage to the test accuracy on benign datasets. In the last step, we eliminate backdoor attacks by limiting the extreme values of inputs and neural network neurons&#x2019; weights. Experiments using our defenses mechanism against the state-of-the-art Distributed Backdoor Attacks on CIFAR-10 show promising results; the averaged attack success rate drops more than 70% with less than 2% loss of test accuracy on the validation dataset. Our defense method has also outperformed the state-of-the-art pruning defense against backdoor attacks in the federated learning scenario.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Malicious clients can attack federated learning systems using compromised data during the training phase, including backdoor samples. The compromised global model will perform well on the validation dataset designed for the task, but a small subset of data with backdoor patterns may trigger the model to make a wrong prediction. In this work, we propose a new and effective method to mitigate backdoor attacks in federated learning after the training phase. Through federated pruning method, we remove redundant neurons and \"backdoor neurons\", which trigger misbehavior upon recognizing backdoor patterns while keeping silent when the input data is clean. The second optional fine-tuning process is designed to recover the pruning damage to the test accuracy on benign datasets. In the last step, we eliminate backdoor attacks by limiting the extreme values of inputs and neural network neurons’ weights. Experiments using our defenses mechanism against the state-of-the-art Distributed Backdoor Attacks on CIFAR-10 show promising results; the averaged attack success rate drops more than 70% with less than 2% loss of test accuracy on the validation dataset. Our defense method has also outperformed the state-of-the-art pruning defense against backdoor attacks in the federated learning scenario.", "fno": "717700a820", "keywords": [ "Learning Artificial Intelligence", "Neural Nets", "Pattern Classification", "Security Of Data", "Federated Pruning Method", "Backdoor Patterns", "Backdoor Attacks", "Neural Network Neurons", "Validation Dataset", "Federated Learning Scenario", "Backdoored Neural Networks", "Federated Learning Systems", "Compromised Data", "Training Phase", "Backdoor Samples", "Compromised Global Model", "CIFAR 10", "Training", "Federated Learning", "Computational Modeling", "Neurons", "Predictive Models", "Data Models", "Pattern Recognition", "Federated Learning", "Backdoor Attack", "Federated Model Pruning", "Machine Learning Security" ], "authors": [ { "affiliation": "Pennsylvania State University,Computer Science and Engineering", "fullName": "Chen Wu", "givenName": "Chen", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "North Carolina State University,Computer Science", "fullName": "Xian Yang", "givenName": "Xian", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Pennsylvania State University,Computer Science and Engineering", "fullName": "Sencun Zhu", "givenName": "Sencun", "surname": "Zhu", "__typename": "ArticleAuthorType" }, { "affiliation": "Pennsylvania State University, L3S Research Center,Information Sciences and Technology,Germany", "fullName": "Prasenjit Mitra", "givenName": "Prasenjit", "surname": "Mitra", "__typename": "ArticleAuthorType" } ], "idPrefix": "icdcs", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "820-830", "year": "2022", "issn": null, "isbn": "978-1-6654-7177-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "717700a809", "articleId": "1HriLnqKozm", "__typename": "AdjacentArticleType" }, "next": { "fno": "717700a831", "articleId": "1Hrj5246Z68", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cvpr/2022/6946/0/694600n3348", "title": "Few-shot Backdoor Defense Using Shapley Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600n3348/1H0NEdDbsYg", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2022/5408/0/09925353", "title": "Distributed Swift and Stealthy Backdoor Attack on Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/nas/2022/09925353/1I09Oag28py", "parentPublication": { "id": "proceedings/nas/2022/5408/0", "title": "2022 IEEE International Conference on Networking, Architecture and Storage (NAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956655", "title": "Enhancing Robustness in Federated Learning by Supervised Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956655/1IHpgysFJYc", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/bd/5555/01/09963704", "title": "SBPA: Sybil-Based Backdoor Poisoning Attacks for Distributed Big Data in AIoT-Based Federated Learning System", "doi": null, "abstractUrl": "/journal/bd/5555/01/09963704/1Iz0KYsRYB2", "parentPublication": { "id": "trans/bd", "title": "IEEE Transactions on Big Data", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b196", "title": "Optimized Client-side Detection of Model Poisoning Attacks in Federated learning", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b196/1LSPfQoE93y", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300b875", "title": "An Empirical Evaluation of Deep Neural Networks in Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300b875/1LSPtD5pZzG", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2022/6457/0/645700a347", "title": "Breaking Distributed Backdoor Defenses for Federated Learning in Non-IID Settings", "doi": null, "abstractUrl": "/proceedings-article/msn/2022/645700a347/1LUtLyiOwJa", "parentPublication": { "id": "proceedings/msn/2022/6457/0", "title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2022/6457/0/645700a178", "title": "Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints", "doi": null, "abstractUrl": "/proceedings-article/msn/2022/645700a178/1LUtTswDmpi", "parentPublication": { "id": "proceedings/msn/2022/6457/0", "title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aipr/2020/8243/0/09425293", "title": "Optimizing Deep Learning Based Intrusion Detection Systems Defense Against White-Box and Backdoor Adversarial Attacks Through a Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/aipr/2020/09425293/1tuzYl2nNks", "parentPublication": { "id": "proceedings/aipr/2020/8243/0", "title": "2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2021/4513/0/451300a852", "title": "BaFFLe: Backdoor Detection via Feedback-based Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2021/451300a852/1xqyZHylA8E", "parentPublication": { "id": "proceedings/icdcs/2021/4513/0", "title": "2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1I09L5JMFyM", "title": "2022 IEEE International Conference on Networking, Architecture and Storage (NAS)", "acronym": "nas", "groupId": "1001813", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1I09PEIIXmw", "doi": "10.1109/NAS55553.2022.9925313", "title": "Participant Selection for Hierarchical Federated Learning in Edge Clouds", "normalizedTitle": "Participant Selection for Hierarchical Federated Learning in Edge Clouds", "abstract": "Federated learning (FL) has been emerging as a new distributed machine learning paradigm recently. Although FL can protect the data privacy of participants by keeping their training data on local devices, there are recent works raising new privacy concerns especially when workers or the parameter server of FL are untrustworthy or malicious. One effective way to solve the problem is using hierarchical federated learning (HFL) where a few middle-layer aggregators (or called group leaders) are used to aggregate local model updates from workers and send group model updates to the parameter server. In this paper, we consider the participant selection problem of HFL in an edge cloud with multiple FL models, where each model needs to select one parameter server, a few group leaders and a certain amount of workers from edge servers to jointly perform HFL. We first formulate this problem as a non-linear integer programming, aiming to minimize the total learning cost of all models while satisfying the constrained edge resources. We then design a three-stage algorithm by decoupling the original problem into three sub-problems and solving them iteratively. Simulations with real-world datasets and FL models confirm that our proposed algorithm can efficiently reduce the average total learning cost in edge cloud compared with existing methods.", "abstracts": [ { "abstractType": "Regular", "content": "Federated learning (FL) has been emerging as a new distributed machine learning paradigm recently. Although FL can protect the data privacy of participants by keeping their training data on local devices, there are recent works raising new privacy concerns especially when workers or the parameter server of FL are untrustworthy or malicious. One effective way to solve the problem is using hierarchical federated learning (HFL) where a few middle-layer aggregators (or called group leaders) are used to aggregate local model updates from workers and send group model updates to the parameter server. In this paper, we consider the participant selection problem of HFL in an edge cloud with multiple FL models, where each model needs to select one parameter server, a few group leaders and a certain amount of workers from edge servers to jointly perform HFL. We first formulate this problem as a non-linear integer programming, aiming to minimize the total learning cost of all models while satisfying the constrained edge resources. We then design a three-stage algorithm by decoupling the original problem into three sub-problems and solving them iteratively. Simulations with real-world datasets and FL models confirm that our proposed algorithm can efficiently reduce the average total learning cost in edge cloud compared with existing methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Federated learning (FL) has been emerging as a new distributed machine learning paradigm recently. Although FL can protect the data privacy of participants by keeping their training data on local devices, there are recent works raising new privacy concerns especially when workers or the parameter server of FL are untrustworthy or malicious. One effective way to solve the problem is using hierarchical federated learning (HFL) where a few middle-layer aggregators (or called group leaders) are used to aggregate local model updates from workers and send group model updates to the parameter server. In this paper, we consider the participant selection problem of HFL in an edge cloud with multiple FL models, where each model needs to select one parameter server, a few group leaders and a certain amount of workers from edge servers to jointly perform HFL. We first formulate this problem as a non-linear integer programming, aiming to minimize the total learning cost of all models while satisfying the constrained edge resources. We then design a three-stage algorithm by decoupling the original problem into three sub-problems and solving them iteratively. Simulations with real-world datasets and FL models confirm that our proposed algorithm can efficiently reduce the average total learning cost in edge cloud compared with existing methods.", "fno": "09925313", "keywords": [ "Cloud Computing", "Data Privacy", "Integer Programming", "Learning Artificial Intelligence", "Training Data", "Local Devices", "Privacy Concerns", "Parameter Server", "Hierarchical Federated Learning", "HFL", "Middle Layer Aggregators", "Called Group Leaders", "Local Model Updates", "Group Model Updates", "Participant Selection Problem", "Edge Cloud", "Multiple FL Models", "Edge Servers", "Constrained Edge Resources", "Average Total Learning Cost", "Distributed Machine", "Training", "Integer Programming", "Data Privacy", "Costs", "Federated Learning", "Training Data", "Computer Architecture", "Participant Selection", "Federated Learning", "Edge Computing" ], "authors": [ { "affiliation": "Temple University,Department of Computer and Information Sciences,Philadelphia,USA", "fullName": "Xinliang Wei", "givenName": "Xinliang", "surname": "Wei", "__typename": "ArticleAuthorType" }, { "affiliation": "Temple University,Department of Computer and Information Sciences,Philadelphia,USA", "fullName": "Jiyao Liu", "givenName": "Jiyao", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Temple University,Department of Computer and Information Sciences,Philadelphia,USA", "fullName": "Xinghua Shi", "givenName": "Xinghua", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "Temple University,Department of Computer and Information Sciences,Philadelphia,USA", "fullName": "Yu Wang", "givenName": "Yu", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "nas", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "1-8", "year": "2022", "issn": null, "isbn": "978-1-6654-5408-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09925512", "articleId": "1I09NgZmyaI", "__typename": "AdjacentArticleType" }, "next": { "fno": "09925513", "articleId": "1I09M4qxjO0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/trustcom/2021/1658/0/165800b124", "title": "Dynamic Edge Association in Hierarchical Federated Learning Networks", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b124/1BBzguqdjjy", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/12/09809926", "title": "Context-Aware Online Client Selection for Hierarchical Federated Learning", "doi": null, "abstractUrl": "/journal/td/2022/12/09809926/1EzE30JsJHO", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2022/0883/0/088300a911", "title": "Efficient Participant Contribution Evaluation for Horizontal and Vertical Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/icde/2022/088300a911/1FwFC7U2nJK", "parentPublication": { "id": "proceedings/icde/2022/0883/0", "title": "2022 IEEE 38th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sec/2022/8611/0/861100a349", "title": "Energy-aware Edge Federated Learning for Enhanced Reliability and Sustainability", "doi": null, "abstractUrl": "/proceedings-article/sec/2022/861100a349/1JC1kUMlDva", "parentPublication": { "id": "proceedings/sec/2022/8611/0", "title": "2022 IEEE/ACM 7th Symposium on Edge Computing (SEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000a537", "title": "Joint Participant Selection and Learning Scheduling for Multi-Model Federated Edge Learning", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000a537/1JeEczCTrq0", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tc/5555/01/10025677", "title": "Privacy-Enhanced Decentralized Federated Learning at Dynamic Edge", "doi": null, "abstractUrl": "/journal/tc/5555/01/10025677/1KdUSqKKwAo", "parentPublication": { "id": "trans/tc", "title": "IEEE Transactions on Computers", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/2022/7300/0/730000a010", "title": "Next Generation Federated Learning for Edge Devices: An Overview", "doi": null, "abstractUrl": "/proceedings-article/cic/2022/730000a010/1Lu4lNRjkIM", "parentPublication": { "id": "proceedings/cic/2022/7300/0", "title": "2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/03/09479786", "title": "Decentralized Edge Intelligence: A Dynamic Resource Allocation Framework for Hierarchical Federated Learning", "doi": null, "abstractUrl": "/journal/td/2022/03/09479786/1v65R6tVA9W", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2021/4513/0/451300a024", "title": "SHARE: Shaping Data Distribution at Edge for Communication-Efficient Hierarchical Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2021/451300a024/1xqz5axES7C", "parentPublication": { "id": "proceedings/icdcs/2021/4513/0", "title": "2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2021/2744/0/09631391", "title": "Reducing Communication Overhead of Federated Learning through Clustering Analysis", "doi": null, "abstractUrl": "/proceedings-article/iscc/2021/09631391/1zmvLO4jAAg", "parentPublication": { "id": "proceedings/iscc/2021/2744/0", "title": "2021 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LSP7qPzqTK", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "acronym": "hpcc-dss-smartcity-dependsys", "groupId": "10074610", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LSPfQoE93y", "doi": "10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00188", "title": "Optimized Client-side Detection of Model Poisoning Attacks in Federated learning", "normalizedTitle": "Optimized Client-side Detection of Model Poisoning Attacks in Federated learning", "abstract": "Recent studies have shown that federated learning is vulnerable to a new type of poisoning attack, called model poisoning attack. One or more malicious clients send crafted local model updates to the server to poison the global model. The training data between federated learning clients is non-IID, which makes the updates submitted by the clients various. The poisoned update from the malicious client can be hidden between various benign updates. Many anomaly detection mechanisms are limited. Client detection is a flexible detection method suitable for non-IID data distribution in federated learning. The core idea of client-side detection is to evaluate the model using various client-side data, which is used for training and detecting model poisoning attacks. However, the effectiveness of this scheme depends on the authenticity of the report returned by the client. Malicious clients can return false reports to evade detection. In this paper, we adopt the idea of group testing and use the COMP algorithm to improve the detection process. We conduct experiments in settings with different proportions of malicious clients. Experimental results show that our scheme can tolerate a higher proportion of malicious clients. In the CIFAR-10 based semantic backdoor attack, our scheme is effective when the proportion of malicious clients is 20&#x0025;. In MNIST-based semantic backdoor attacks, our scheme is effective when the proportion of malicious clients is 25&#x0025;.", "abstracts": [ { "abstractType": "Regular", "content": "Recent studies have shown that federated learning is vulnerable to a new type of poisoning attack, called model poisoning attack. One or more malicious clients send crafted local model updates to the server to poison the global model. The training data between federated learning clients is non-IID, which makes the updates submitted by the clients various. The poisoned update from the malicious client can be hidden between various benign updates. Many anomaly detection mechanisms are limited. Client detection is a flexible detection method suitable for non-IID data distribution in federated learning. The core idea of client-side detection is to evaluate the model using various client-side data, which is used for training and detecting model poisoning attacks. However, the effectiveness of this scheme depends on the authenticity of the report returned by the client. Malicious clients can return false reports to evade detection. In this paper, we adopt the idea of group testing and use the COMP algorithm to improve the detection process. We conduct experiments in settings with different proportions of malicious clients. Experimental results show that our scheme can tolerate a higher proportion of malicious clients. In the CIFAR-10 based semantic backdoor attack, our scheme is effective when the proportion of malicious clients is 20&#x0025;. In MNIST-based semantic backdoor attacks, our scheme is effective when the proportion of malicious clients is 25&#x0025;.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent studies have shown that federated learning is vulnerable to a new type of poisoning attack, called model poisoning attack. One or more malicious clients send crafted local model updates to the server to poison the global model. The training data between federated learning clients is non-IID, which makes the updates submitted by the clients various. The poisoned update from the malicious client can be hidden between various benign updates. Many anomaly detection mechanisms are limited. Client detection is a flexible detection method suitable for non-IID data distribution in federated learning. The core idea of client-side detection is to evaluate the model using various client-side data, which is used for training and detecting model poisoning attacks. However, the effectiveness of this scheme depends on the authenticity of the report returned by the client. Malicious clients can return false reports to evade detection. In this paper, we adopt the idea of group testing and use the COMP algorithm to improve the detection process. We conduct experiments in settings with different proportions of malicious clients. Experimental results show that our scheme can tolerate a higher proportion of malicious clients. In the CIFAR-10 based semantic backdoor attack, our scheme is effective when the proportion of malicious clients is 20%. In MNIST-based semantic backdoor attacks, our scheme is effective when the proportion of malicious clients is 25%.", "fno": "199300b196", "keywords": [ "Client Server Systems", "Computer Network Security", "Learning Artificial Intelligence", "Called Model Poisoning Attack", "Client Detection", "Client Side Data", "Detecting Model Poisoning Attacks", "Federated Learning Clients", "Local Model Updates", "Malicious Client", "Optimized Client Side", "Poisoned Update", "Training", "Toxicology", "Federated Learning", "Semantics", "Training Data", "Data Models", "Robustness", "Federated Learning", "Model Poisoning Attack", "Group Testing" ], "authors": [ { "affiliation": "School of computer science and technology Harbin Institute of Technology,Shenzhen,China", "fullName": "Guoxi Zhang", "givenName": "Guoxi", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Cyberspace Security Research Center Peng Cheng Laboratory,Shenzhen,China", "fullName": "Jiangang Shu", "givenName": "Jiangang", "surname": "Shu", "__typename": "ArticleAuthorType" }, { "affiliation": "City University of Hong Kong,Department of Computer Science,Hong Kong,China", "fullName": "Xiaohua Jia", "givenName": "Xiaohua", "surname": "Jia", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-dss-smartcity-dependsys", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "1196-1201", "year": "2022", "issn": null, "isbn": "979-8-3503-1993-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "199300b188", "articleId": "1LSPG6ZBJXq", "__typename": "AdjacentArticleType" }, "next": { "fno": "199300b202", "articleId": "1LSPtalXteM", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "trans/tq/2022/04/09681241", "title": "DNS Poisoning of Operating System Caches: Attacks and Mitigations", "doi": null, "abstractUrl": "/journal/tq/2022/04/09681241/1A8cqiEjfDG", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/tps-isa/2021/1623/0/162300a146", "title": "Perception Poisoning Attacks in Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/tps-isa/2021/162300a146/1CzenWbGKTm", "parentPublication": { "id": "proceedings/tps-isa/2021/1623/0", "title": "2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sp/2023/9336/0/933600a326", "title": "FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information", "doi": null, "abstractUrl": "/proceedings-article/sp/2023/933600a326/1He7Y3q8FMY", "parentPublication": { "id": "proceedings/sp/2023/9336/0/", "title": "2023 IEEE Symposium on Security and Privacy (SP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956655", "title": "Enhancing Robustness in Federated Learning by Supervised Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956655/1IHpgysFJYc", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0/09927914", "title": "Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/dasc-picom-cbdcom-cyberscitech/2022/09927914/1J4Cn2OWIes", "parentPublication": { "id": "proceedings/dasc-picom-cbdcom-cyberscitech/2022/6297/0", "title": "2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mass/2022/7180/0/718000a693", "title": "Evaluation of Various Defense Techniques Against Targeted Poisoning Attacks in Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/mass/2022/718000a693/1JeE01s9xO8", "parentPublication": { "id": "proceedings/mass/2022/7180/0", "title": "2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nana/2022/6131/0/613100a483", "title": "FedDBG: Privacy-Preserving Dynamic Benchmark Gradient in Federated Learning Against Poisoning Attacks", "doi": null, "abstractUrl": "/proceedings-article/nana/2022/613100a483/1JwPFZKCkAE", "parentPublication": { "id": "proceedings/nana/2022/6131/0", "title": "2022 International Conference on Networking and Network Applications (NaNA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10020528", "title": "Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10020528/1KfRAUTz5cI", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/2021/05/09066920", "title": "Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection", "doi": null, "abstractUrl": "/journal/tq/2021/05/09066920/1j1lGtJ3A1q", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a224", "title": "Fair Detection of Poisoning Attacks in Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a224/1pP3ChevBzG", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LUtGPch8kM", "title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)", "acronym": "msn", "groupId": "10076543", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LUtH1eeYak", "doi": "10.1109/MSN57253.2022.00085", "title": "Anomaly Detection Through Unsupervised Federated Learning", "normalizedTitle": "Anomaly Detection Through Unsupervised Federated Learning", "abstract": "Federated learning (FL) is proving to be one of the most promising paradigms for leveraging distributed resources, enabling a set of clients to collaboratively train a machine learning model while keeping the data decentralized. The explosive growth of interest in the topic has led to rapid advancements in several core aspects like communication efficiency, handling non-IID data, privacy, and security capabilities. However, the majority of FL works only deal with supervised tasks, assuming that clients&#x0027; training sets are labeled. To leverage the enormous unlabeled data on distributed edge devices, in this paper, we aim to extend the FL paradigm to unsupervised tasks by addressing the problem of anomaly detection (AD) in decentralized settings. In particular, we propose a novel method in which, through a preprocessing phase, clients are grouped into communities, each having similar majority (i.e., inlier) patterns. Subsequently, each community of clients trains the same anomaly detection model (i.e., autoencoders) in a federated fashion. The resulting model is then shared and used to detect anomalies within the clients of the same community that joined the corresponding federated process. Experiments show that our method is robust, and it can detect communities consistent with the ideal partitioning in which groups of clients having the same inlier patterns are known. Furthermore, the performance is significantly better than those in which clients train models exclusively on local data and comparable with federated models of ideal communities&#x0027; partition.", "abstracts": [ { "abstractType": "Regular", "content": "Federated learning (FL) is proving to be one of the most promising paradigms for leveraging distributed resources, enabling a set of clients to collaboratively train a machine learning model while keeping the data decentralized. The explosive growth of interest in the topic has led to rapid advancements in several core aspects like communication efficiency, handling non-IID data, privacy, and security capabilities. However, the majority of FL works only deal with supervised tasks, assuming that clients&#x0027; training sets are labeled. To leverage the enormous unlabeled data on distributed edge devices, in this paper, we aim to extend the FL paradigm to unsupervised tasks by addressing the problem of anomaly detection (AD) in decentralized settings. In particular, we propose a novel method in which, through a preprocessing phase, clients are grouped into communities, each having similar majority (i.e., inlier) patterns. Subsequently, each community of clients trains the same anomaly detection model (i.e., autoencoders) in a federated fashion. The resulting model is then shared and used to detect anomalies within the clients of the same community that joined the corresponding federated process. Experiments show that our method is robust, and it can detect communities consistent with the ideal partitioning in which groups of clients having the same inlier patterns are known. Furthermore, the performance is significantly better than those in which clients train models exclusively on local data and comparable with federated models of ideal communities&#x0027; partition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Federated learning (FL) is proving to be one of the most promising paradigms for leveraging distributed resources, enabling a set of clients to collaboratively train a machine learning model while keeping the data decentralized. The explosive growth of interest in the topic has led to rapid advancements in several core aspects like communication efficiency, handling non-IID data, privacy, and security capabilities. However, the majority of FL works only deal with supervised tasks, assuming that clients' training sets are labeled. To leverage the enormous unlabeled data on distributed edge devices, in this paper, we aim to extend the FL paradigm to unsupervised tasks by addressing the problem of anomaly detection (AD) in decentralized settings. In particular, we propose a novel method in which, through a preprocessing phase, clients are grouped into communities, each having similar majority (i.e., inlier) patterns. Subsequently, each community of clients trains the same anomaly detection model (i.e., autoencoders) in a federated fashion. The resulting model is then shared and used to detect anomalies within the clients of the same community that joined the corresponding federated process. Experiments show that our method is robust, and it can detect communities consistent with the ideal partitioning in which groups of clients having the same inlier patterns are known. Furthermore, the performance is significantly better than those in which clients train models exclusively on local data and comparable with federated models of ideal communities' partition.", "fno": "645700a495", "keywords": [ "Data Handling", "Data Privacy", "Learning Artificial Intelligence", "Unsupervised Learning", "Anomaly Detection Model", "Clients", "Corresponding Federated Process", "Decentralized Settings", "Distributed Edge Devices", "Enormous Unlabeled Data", "Federated Fashion", "Federated Models", "FL Paradigm", "Leveraging Distributed Resources", "Machine Learning Model", "Non IID Data", "Promising Paradigms", "Supervised Tasks", "Unsupervised Federated Learning", "Unsupervised Tasks", "Training", "Federated Learning", "Image Edge Detection", "Distributed Databases", "Data Models", "Explosives", "Sensors", "Federated Learning", "Unsupervised", "Anomaly Detection" ], "authors": [ { "affiliation": "Scuola Normale Superiore,Pisa,Italy", "fullName": "Mirko Nardi", "givenName": "Mirko", "surname": "Nardi", "__typename": "ArticleAuthorType" }, { "affiliation": "IIT-CNR,Pisa,Italy", "fullName": "Lorenzo Valerio", "givenName": "Lorenzo", "surname": "Valerio", "__typename": "ArticleAuthorType" }, { "affiliation": "IIT-CNR,Pisa,Italy", "fullName": "Andrea Passarella", "givenName": "Andrea", "surname": "Passarella", "__typename": "ArticleAuthorType" } ], "idPrefix": "msn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "495-501", "year": "2022", "issn": null, "isbn": "978-1-6654-6457-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "645700a490", "articleId": "1LUtL9cJvFu", "__typename": "AdjacentArticleType" }, "next": { "fno": "645700a502", "articleId": "1LUtVt1J5BK", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdcs/2022/7177/0/717700a809", "title": "Aligning before Aggregating: Enabling Cross-domain Federated Learning via Consistent Feature Extraction", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2022/717700a809/1HriLnqKozm", "parentPublication": { "id": "proceedings/icdcs/2022/7177/0", "title": "2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2022/7177/0/717700a570", "title": "ContextFL: Context-aware Federated Learning by Estimating the Training and Reporting Phases of Mobile Clients", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2022/717700a570/1Hrj5UEukXm", "parentPublication": { "id": "proceedings/icdcs/2022/7177/0", "title": "2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956655", "title": "Enhancing Robustness in Federated Learning by Supervised Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956655/1IHpgysFJYc", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956464", "title": "Towards Scalable and Efficient Client Selection for Federated Object Detection", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956464/1IHqkZLuy8E", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tq/5555/01/10032626", "title": "Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully", "doi": null, "abstractUrl": "/journal/tq/5555/01/10032626/1KnSwkPR5bW", "parentPublication": { "id": "trans/tq", "title": "IEEE Transactions on Dependable and Secure Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/sc/5555/01/10054499", "title": "Coalitional Federated Learning: Improving Communication and Training on Non-IID Data with Selfish Clients", "doi": null, "abstractUrl": "/journal/sc/5555/01/10054499/1L8lL7goB7q", "parentPublication": { "id": "trans/sc", "title": "IEEE Transactions on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpads/2022/7315/0/731500a296", "title": "FLForest: Byzantine-robust Federated Learning through Isolated Forest", "doi": null, "abstractUrl": "/proceedings-article/icpads/2022/731500a296/1LRlOQPEG3K", "parentPublication": { "id": "proceedings/icpads/2023/7315/0", "title": "2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a303", "title": "FedTADBench: Federated Time-series Anomaly Detection Benchmark", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a303/1LSPvq3J3pu", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2022/6457/0/645700a171", "title": "CFedPer: Clustered Federated Learning with Two-Stages Optimization for Personalization", "doi": null, "abstractUrl": "/proceedings-article/msn/2022/645700a171/1LUtTPSzcUo", "parentPublication": { "id": "proceedings/msn/2022/6457/0", "title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cic/2022/7300/0/730000a010", "title": "Next Generation Federated Learning for Edge Devices: An Overview", "doi": null, "abstractUrl": "/proceedings-article/cic/2022/730000a010/1Lu4lNRjkIM", "parentPublication": { "id": "proceedings/cic/2022/7300/0", "title": "2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1LUtGPch8kM", "title": "2022 18th International Conference on Mobility, Sensing and Networking (MSN)", "acronym": "msn", "groupId": "10076543", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1LUtJX02ZrO", "doi": "10.1109/MSN57253.2022.00117", "title": "Node Selection Strategy Design Based on Reputation Mechanism for Hierarchical Federated Learning", "normalizedTitle": "Node Selection Strategy Design Based on Reputation Mechanism for Hierarchical Federated Learning", "abstract": "With the rapid development of Internet of Things (IoT) and 5G wireless communication technology, a large amount of data is generated at the edge of the network. The combination of mobile edge computing (MEC) and federated learning has become a key technology to improve performance and protect users&#x0027; privacy data in mobile networks. The selection of nodes for Hierarchical Federated Learning (HFL) affects the quality of model training. In this paper, we investigate the optimization problem of node selection accuracy in HFL. In order to improve the quality of model training, we design an algorithm of node selection based on reputation (NSRA). In NSRA, the edge server selects the node with high reputation prediction value to participate in the model training, and the node selects the neighbor node with high transmission capacity to cooperate. D2D communication is adopted for node cooperation. Through extensive simulations, it is verified the performance of NSRA. The mutual trust between nodes is enhanced, so the ideal prediction effect is achieved. We also observe that compared with RSA, the accuracy is improved by 11.48&#x0025; and 19.38&#x0025; in MNIST and CIFAR-10, respectively.", "abstracts": [ { "abstractType": "Regular", "content": "With the rapid development of Internet of Things (IoT) and 5G wireless communication technology, a large amount of data is generated at the edge of the network. The combination of mobile edge computing (MEC) and federated learning has become a key technology to improve performance and protect users&#x0027; privacy data in mobile networks. The selection of nodes for Hierarchical Federated Learning (HFL) affects the quality of model training. In this paper, we investigate the optimization problem of node selection accuracy in HFL. In order to improve the quality of model training, we design an algorithm of node selection based on reputation (NSRA). In NSRA, the edge server selects the node with high reputation prediction value to participate in the model training, and the node selects the neighbor node with high transmission capacity to cooperate. D2D communication is adopted for node cooperation. Through extensive simulations, it is verified the performance of NSRA. The mutual trust between nodes is enhanced, so the ideal prediction effect is achieved. We also observe that compared with RSA, the accuracy is improved by 11.48&#x0025; and 19.38&#x0025; in MNIST and CIFAR-10, respectively.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the rapid development of Internet of Things (IoT) and 5G wireless communication technology, a large amount of data is generated at the edge of the network. The combination of mobile edge computing (MEC) and federated learning has become a key technology to improve performance and protect users' privacy data in mobile networks. The selection of nodes for Hierarchical Federated Learning (HFL) affects the quality of model training. In this paper, we investigate the optimization problem of node selection accuracy in HFL. In order to improve the quality of model training, we design an algorithm of node selection based on reputation (NSRA). In NSRA, the edge server selects the node with high reputation prediction value to participate in the model training, and the node selects the neighbor node with high transmission capacity to cooperate. D2D communication is adopted for node cooperation. Through extensive simulations, it is verified the performance of NSRA. The mutual trust between nodes is enhanced, so the ideal prediction effect is achieved. We also observe that compared with RSA, the accuracy is improved by 11.48% and 19.38% in MNIST and CIFAR-10, respectively.", "fno": "645700a718", "keywords": [ "5 G Mobile Communication", "Cellular Radio", "Computer Network Security", "Data Privacy", "Edge Computing", "Internet Of Things", "Learning Artificial Intelligence", "Mobile Computing", "Mobile Radio", "Telecommunication Computing", "Communication Technology", "Edge Server", "HFL", "Hierarchical Federated Learning", "High Reputation Prediction Value", "Mobile Networks", "Model Training", "Neighbor Node", "Node Cooperation", "Node Selection Accuracy", "Node Selection Strategy Design", "NSRA", "Reputation Mechanism", "Users", "Training", "Wireless Communication", "Federated Learning", "Simulation", "Predictive Models", "Prediction Algorithms", "Device To Device Communication", "Node Selection", "Hierarchical Federated Learning HFL", "Reputation Mechanism", "Mobile Edge Computing MEC", "Device To Device D 2 D" ], "authors": [ { "affiliation": "Beijing Information Science and Technology University,Beijing Key Laboratory of Internet Culture and Digital Dissemination Research", "fullName": "Shen Xin", "givenName": "Shen", "surname": "Xin", "__typename": "ArticleAuthorType" }, { "affiliation": "Beijing Information Science and Technology University,Beijing Key Laboratory of Internet Culture and Digital Dissemination Research", "fullName": "Li Zhuo", "givenName": "Li", "surname": "Zhuo", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Computer Science, Beijing Information Science and Technology University", "fullName": "Chen Xin", "givenName": "Chen", "surname": "Xin", "__typename": "ArticleAuthorType" } ], "idPrefix": "msn", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-12-01T00:00:00", "pubType": "proceedings", "pages": "718-722", "year": "2022", "issn": null, "isbn": "978-1-6654-6457-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "645700a713", "articleId": "1LUtRwMKstW", "__typename": "AdjacentArticleType" }, "next": { "fno": "645700a723", "articleId": "1LUtNvKid2w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicse/2015/0454/0/0454a194", "title": "Assessment of Node Reputation in MP2P Based on Fuzzy Comprehensive Evaluation", "doi": null, "abstractUrl": "/proceedings-article/icicse/2015/0454a194/12OmNBO3KgA", "parentPublication": { "id": "proceedings/icicse/2015/0454/0", "title": "2015 Eighth International Conference on Internet Computing for Science and Engineering (ICICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ncm/2009/3769/0/3769a457", "title": "A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks", "doi": null, "abstractUrl": "/proceedings-article/ncm/2009/3769a457/12OmNyrqzyC", "parentPublication": { "id": "proceedings/ncm/2009/3769/0", "title": "Networked Computing and Advanced Information Management, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wgec/2009/3899/0/3899a007", "title": "A Reputation Mechanism to Stimulate Node Cooperation in Ad Hoc Networks", "doi": null, "abstractUrl": "/proceedings-article/wgec/2009/3899a007/12OmNzWx0c0", "parentPublication": { "id": "proceedings/wgec/2009/3899/0", "title": "Genetic and Evolutionary Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/trustcom/2021/1658/0/165800b124", "title": "Dynamic Edge Association in Hierarchical Federated Learning Networks", "doi": null, "abstractUrl": "/proceedings-article/trustcom/2021/165800b124/1BBzguqdjjy", "parentPublication": { "id": "proceedings/trustcom/2021/1658/0", "title": "2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ic/2023/02/09937185", "title": "Social-Aware Federated Learning: Challenges and Opportunities in Collaborative Data Training", "doi": null, "abstractUrl": "/magazine/ic/2023/02/09937185/1I05zXvoZgs", "parentPublication": { "id": "mags/ic", "title": "IEEE Internet Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nas/2022/5408/0/09925313", "title": "Participant Selection for Hierarchical Federated Learning in Edge Clouds", "doi": null, "abstractUrl": "/proceedings-article/nas/2022/09925313/1I09PEIIXmw", "parentPublication": { "id": "proceedings/nas/2022/5408/0", "title": "2022 IEEE International Conference on Networking, Architecture and Storage (NAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a036", "title": "A Chunked Local Aggregation Strategy in Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a036/1MrG0DM2FX2", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdcs/2021/4513/0/451300a024", "title": "SHARE: Shaping Data Distribution at Edge for Communication-Efficient Hierarchical Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/icdcs/2021/451300a024/1xqz5axES7C", "parentPublication": { "id": "proceedings/icdcs/2021/4513/0", "title": "2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/td/2022/11/09665214", "title": "Reputation-Aware Hedonic Coalition Formation for Efficient Serverless Hierarchical Federated Learning", "doi": null, "abstractUrl": "/journal/td/2022/11/09665214/1zJiRAt4cKY", "parentPublication": { "id": "trans/td", "title": "IEEE Transactions on Parallel & Distributed Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0/357400a753", "title": "Optimization for Node Cooperation in Hierarchical Federated Learning", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2021/357400a753/1zxLmbarIc0", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2021/3574/0", "title": "2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvNZWX", "title": "Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume III: Decision Support and Knowledge Based Systems Track", "acronym": "hicss", "groupId": "1000730", "volume": "3", "displayVolume": "0", "year": "1988", "__typename": "ProceedingType" }, "article": { "id": "12OmNwEJ0Jb", "doi": "10.1109/HICSS.1988.11931", "title": "A framework of a decision critic and advisor", "normalizedTitle": "A framework of a decision critic and advisor", "abstract": "An approach is presented for improving the performance of decision-makers. It consists of supplementing decision-support systems with a decision critic and advisor (DECAD). The function of DECAD is to 'look over the shoulder' of the decision-maker, criticizing his or her actions and giving advice when appropriate. DECAD is a knowledge-based system with an architecture built around the artificial-intelligence notion of plan.<>", "abstracts": [ { "abstractType": "Regular", "content": "An approach is presented for improving the performance of decision-makers. It consists of supplementing decision-support systems with a decision critic and advisor (DECAD). The function of DECAD is to 'look over the shoulder' of the decision-maker, criticizing his or her actions and giving advice when appropriate. DECAD is a knowledge-based system with an architecture built around the artificial-intelligence notion of plan.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "An approach is presented for improving the performance of decision-makers. It consists of supplementing decision-support systems with a decision critic and advisor (DECAD). The function of DECAD is to 'look over the shoulder' of the decision-maker, criticizing his or her actions and giving advice when appropriate. DECAD is a knowledge-based system with an architecture built around the artificial-intelligence notion of plan.", "fno": "00011931", "keywords": [ "Decision Support Systems", "Expert Systems", "Decision Critic", "Decision Makers", "Decision Support Systems", "Advisor", "DECAD", "Knowledge Based System", "Artificial Intelligence", "Plan", "Decision Support Systems", "Decision Making", "Artificial Intelligence", "Humans", "Expert Systems", "Uncertainty", "Data Analysis", "Problem Solving", "Learning" ], "authors": [ { "affiliation": "Oakland Univ., Rochester, MI, USA", "fullName": "F. Mili", "givenName": "F.", "surname": "Mili", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "1988-01-01T00:00:00", "pubType": "proceedings", "pages": "381,382,383,384,385,386", "year": "1988", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00011930", "articleId": "12OmNy2Jt7x", "__typename": "AdjacentArticleType" }, "next": { "fno": "00011932", "articleId": "12OmNzC5Ttl", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ease/2010/6535/0/05457818", "title": "Improving the Efficiency of Self-Organizing Emergent Systems by an Advisor", "doi": null, "abstractUrl": "/proceedings-article/ease/2010/05457818/12OmNAsBFOL", "parentPublication": { "id": "proceedings/ease/2010/6535/0", "title": "2010 7th IEEE International Conference and Workshops on Engineering of Autonomic and Autonomous Systems (EASe 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/acsat/2013/2758/0/2758a025", "title": "Software Maintenance Expert Base Decision Support (SoXDeS) Framework", "doi": null, "abstractUrl": "/proceedings-article/acsat/2013/2758a025/12OmNBkfRhC", "parentPublication": { "id": "proceedings/acsat/2013/2758/0", "title": "2013 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/caia/1994/5550/0/00323626", "title": "A decision support system for leasing/purchasing decisions", "doi": null, "abstractUrl": "/proceedings-article/caia/1994/00323626/12OmNrAMES7", "parentPublication": { "id": "proceedings/caia/1994/5550/0", "title": "Proceedings of the Tenth Conference on Artificial Intelligence for Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisis/2010/3967/0/3967a734", "title": "An Intelligent Advisor to Suggest Strategies in Economic Policy Decisions", "doi": null, "abstractUrl": "/proceedings-article/cisis/2010/3967a734/12OmNwBT1oR", "parentPublication": { "id": "proceedings/cisis/2010/3967/0", "title": "2010 International Conference on Complex, Intelligent and Software Intensive Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1991/9999/4/00184041", "title": "The conceptualization and development of organizational decision support systems", "doi": null, "abstractUrl": "/proceedings-article/hicss/1991/00184041/12OmNxG1yXG", "parentPublication": { "id": "proceedings/hicss/1991/9999/4", "title": "Proceedings of the Twenty-Fourth Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cloud/2012/4755/0/4755a949", "title": "Facilitating Business-Oriented Cloud Transformation Decision with Cloud Transformation Advisor", "doi": null, "abstractUrl": "/proceedings-article/cloud/2012/4755a949/12OmNyoAA3L", "parentPublication": { "id": "proceedings/cloud/2012/4755/0", "title": "2012 IEEE Fifth International Conference on Cloud Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1994/5090/3/00323355", "title": "Evaluation of a generic expert system for corporate real estate disposition", "doi": null, "abstractUrl": "/proceedings-article/hicss/1994/00323355/12OmNzcxZrL", "parentPublication": { "id": "proceedings/hicss/1994/5090/5", "title": "Proceedings of the Twenty-Seventh Annual Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiaws/1991/2240/0/00236596", "title": "Case-based reasoning for financial decision making", "doi": null, "abstractUrl": "/proceedings-article/aiaws/1991/00236596/12OmNzd7bzx", "parentPublication": { "id": "proceedings/aiaws/1991/2240/0", "title": "Proceedings First International Conference on Artificial Intelligence Applications on Wall Street", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/5555/01/10007887", "title": "Multi-Agent Attention Double Actor-Critic Framework for Intelligent Traffic Light Control in Urban Scenarios With Hybrid Traffic", "doi": null, "abstractUrl": "/journal/tm/5555/01/10007887/1JH49ExKUhy", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cseps/2021/2618/0/261800a112", "title": "Multi-agent cross prompt mechanism based on Actor-Critic gradient strategy", "doi": null, "abstractUrl": "/proceedings-article/cseps/2021/261800a112/1wiQQd9CiRy", "parentPublication": { "id": "proceedings/cseps/2021/2618/0", "title": "2021 International Conference on Control Science and Electric Power Systems (CSEPS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNzgNXZA", "title": "2012 Fifth International Joint Conference on Computational Sciences and Optimization (CSO)", "acronym": "cso", "groupId": "1002829", "volume": "0", "displayVolume": "0", "year": "2012", "__typename": "ProceedingType" }, "article": { "id": "12OmNwekjFF", "doi": "10.1109/CSO.2012.157", "title": "Bridging Theories and Practices: An Evaluation Framework of Small and Medium Sized Enterprises' (SMEs) Decision-making in China", "normalizedTitle": "Bridging Theories and Practices: An Evaluation Framework of Small and Medium Sized Enterprises' (SMEs) Decision-making in China", "abstract": "Although the growth of SMEs is in vogue in the economical literature, the decision making inside the small business is a comparatively less studied theme. By synthesizing leading decision theories and taking into account of SMEs' characteristics in China's context, this paper develops an evaluation framework of decision-making in SMEs with four main components: environment, organization, decision-maker and process.", "abstracts": [ { "abstractType": "Regular", "content": "Although the growth of SMEs is in vogue in the economical literature, the decision making inside the small business is a comparatively less studied theme. By synthesizing leading decision theories and taking into account of SMEs' characteristics in China's context, this paper develops an evaluation framework of decision-making in SMEs with four main components: environment, organization, decision-maker and process.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Although the growth of SMEs is in vogue in the economical literature, the decision making inside the small business is a comparatively less studied theme. By synthesizing leading decision theories and taking into account of SMEs' characteristics in China's context, this paper develops an evaluation framework of decision-making in SMEs with four main components: environment, organization, decision-maker and process.", "fno": "06274818", "keywords": [ "Decision Making", "Small To Medium Enterprises", "Small And Medium Sized Enterprises", "SME", "Decision Making", "China", "Economical Literature", "Decision Making", "Decision Theory", "Organizations", "Educational Institutions", "Industries", "Biological System Modeling", "Decision Theory", "Decision Making", "Evaluation Framework", "SM Es" ], "authors": [ { "affiliation": null, "fullName": "Yanhai Zhao", "givenName": "Yanhai", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ye Yao", "givenName": "Ye", "surname": "Yao", "__typename": "ArticleAuthorType" } ], "idPrefix": "cso", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2012-06-01T00:00:00", "pubType": "proceedings", "pages": "687-690", "year": "2012", "issn": null, "isbn": "978-1-4673-1365-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06274817", "articleId": "12OmNAlvHCR", "__typename": "AdjacentArticleType" }, "next": { "fno": "06274819", "articleId": "12OmNzC5TpY", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/hicss/2015/7367/0/7367e544", "title": "IT Governance Theories and the Reality of SMEs: Bridging the Gap", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367e544/12OmNAo45Ty", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2013/4892/0/4892e236", "title": "Outsourcing Decisions of Small and Medium-Sized Enterprises: A Multiple-Case Study Approach in the German Software Industry", "doi": null, "abstractUrl": "/proceedings-article/hicss/2013/4892e236/12OmNBQC88q", "parentPublication": { "id": "proceedings/hicss/2013/4892/0", "title": "2013 46th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2009/3583/2/3583b602", "title": "The Application of Fuzzy Control in Strategic Decision-Making of Small and Medium Enterprises", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2009/3583b602/12OmNCbU32o", "parentPublication": { "id": "proceedings/icmtma/2009/3583/2", "title": "2009 International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997e386", "title": "Research on Electronic Commerce Application Decision-making in China SMEs", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997e386/12OmNs0kytU", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/models/2015/6908/0/07338268", "title": "Toward overcoming accidental complexity in organisational decision-making", "doi": null, "abstractUrl": "/proceedings-article/models/2015/07338268/12OmNxiKs2F", "parentPublication": { "id": "proceedings/models/2015/6908/0", "title": "2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2018/7016/2/701602a032", "title": "Baseline Mechanisms for Enterprise Governance of IT in SMEs", "doi": null, "abstractUrl": "/proceedings-article/cbi/2018/701602a032/13l5OcWjjKf", "parentPublication": { "id": "proceedings/cbi/2018/7016/2", "title": "2018 IEEE 20th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csde/2022/5305/0/10089346", "title": "Cloud ERP adoption in SMEs of New Zealand Retail Industry: exploring CSFs and risks", "doi": null, "abstractUrl": "/proceedings-article/csde/2022/10089346/1M7Lf3jzqne", "parentPublication": { "id": "proceedings/csde/2022/5305/0", "title": "2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icemme/2019/5588/0/558800a368", "title": "The Formation Mechanism of SMEs' Credit Risk Under Supply Chain Finance Based on Game Theory", "doi": null, "abstractUrl": "/proceedings-article/icemme/2019/558800a368/1hrLnboAeLC", "parentPublication": { "id": "proceedings/icemme/2019/5588/0", "title": "2019 International Conference on Economic Management and Model Engineering (ICEMME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itca/2020/0378/0/037800a178", "title": "Credit decision algorithm for SMEs based on data mining", "doi": null, "abstractUrl": "/proceedings-article/itca/2020/037800a178/1tpBaKTscx2", "parentPublication": { "id": "proceedings/itca/2020/0378/0", "title": "2020 2nd International Conference on Information Technology and Computer Application (ITCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/edocw/2021/4488/0/448800a289", "title": "A Reinforcement Learning Platform for Small and Medium-sized Enterprises in Logistics", "doi": null, "abstractUrl": "/proceedings-article/edocw/2021/448800a289/1yZ5xTMUVsQ", "parentPublication": { "id": "proceedings/edocw/2021/4488/0", "title": "2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwB2dY7", "title": "2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems (MODELS)", "acronym": "models", "groupId": "1810366", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNxiKs2F", "doi": "10.1109/MODELS.2015.7338268", "title": "Toward overcoming accidental complexity in organisational decision-making", "normalizedTitle": "Toward overcoming accidental complexity in organisational decision-making", "abstract": "This paper takes a practitioner's perspective on the problem of organisational decision-making. Industry practice follows a refinement based iterative method for organizational decision-making. However, existing enterprise modelling tools are not complete with respect to the needs of organizational decision-making. As a result, today, a decision maker is forced to use a chain of non-interoperable tools supporting paradigmatically diverse modelling languages with the onus of their co-ordinated use lying entirely on the decision maker. This paper argues the case for a model-based approach to overcome this accidental complexity. A bridge meta-model, specifying relationships across models created by individual tools, ensures integration and a method, describing what should be done when and how, and ensures better tool integration. Validation of the proposed solution using a case study is presented with current limitations and possible means of overcoming them outlined.", "abstracts": [ { "abstractType": "Regular", "content": "This paper takes a practitioner's perspective on the problem of organisational decision-making. Industry practice follows a refinement based iterative method for organizational decision-making. However, existing enterprise modelling tools are not complete with respect to the needs of organizational decision-making. As a result, today, a decision maker is forced to use a chain of non-interoperable tools supporting paradigmatically diverse modelling languages with the onus of their co-ordinated use lying entirely on the decision maker. This paper argues the case for a model-based approach to overcome this accidental complexity. A bridge meta-model, specifying relationships across models created by individual tools, ensures integration and a method, describing what should be done when and how, and ensures better tool integration. Validation of the proposed solution using a case study is presented with current limitations and possible means of overcoming them outlined.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "This paper takes a practitioner's perspective on the problem of organisational decision-making. Industry practice follows a refinement based iterative method for organizational decision-making. However, existing enterprise modelling tools are not complete with respect to the needs of organizational decision-making. As a result, today, a decision maker is forced to use a chain of non-interoperable tools supporting paradigmatically diverse modelling languages with the onus of their co-ordinated use lying entirely on the decision maker. This paper argues the case for a model-based approach to overcome this accidental complexity. A bridge meta-model, specifying relationships across models created by individual tools, ensures integration and a method, describing what should be done when and how, and ensures better tool integration. Validation of the proposed solution using a case study is presented with current limitations and possible means of overcoming them outlined.", "fno": "07338268", "keywords": [ "Decision Making", "Complexity Theory", "Analytical Models", "Industries", "Bridges", "Organizations", "Method", "Organizational Decision Making", "Enterprise Modeling Tools", "Meta Modelling" ], "authors": [ { "affiliation": "Tata Consultancy Services Research, Pune, India", "fullName": "Vinay Kulkarni", "givenName": "Vinay", "surname": "Kulkarni", "__typename": "ArticleAuthorType" }, { "affiliation": "Tata Consultancy Services Research, Pune, India", "fullName": "Souvik Barat", "givenName": "Souvik", "surname": "Barat", "__typename": "ArticleAuthorType" }, { "affiliation": "Middlesex University, London, UK", "fullName": "Tony Clark", "givenName": "Tony", "surname": "Clark", "__typename": "ArticleAuthorType" }, { "affiliation": "Middlesex University, London, UK", "fullName": "Balbir Barn", "givenName": "Balbir", "surname": "Barn", "__typename": "ArticleAuthorType" } ], "idPrefix": "models", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-09-01T00:00:00", "pubType": "proceedings", "pages": "368-377", "year": "2015", "issn": null, "isbn": "978-1-4673-6908-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07338267", "articleId": "12OmNx9nGEm", "__typename": "AdjacentArticleType" }, "next": { "fno": "07338269", "articleId": "12OmNCxtyN8", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/smrlo/2016/9941/0/9941a575", "title": "Application for Decision-Making in Transportation Logistics Function: Supply Chain Colombian Green Coffee", "doi": null, "abstractUrl": "/proceedings-article/smrlo/2016/9941a575/12OmNqBtiH3", "parentPublication": { "id": "proceedings/smrlo/2016/9941/0", "title": "2016 Second International Symposium on Stochastic Models in Reliability Engineering, Life Science and Operations Management (SMRLO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uic-atc-scalcom-cbdcom-iop-smartworld/2016/2771/0/07816944", "title": "Fuzzy Petri Net Method for Hesitant Decision Making", "doi": null, "abstractUrl": "/proceedings-article/uic-atc-scalcom-cbdcom-iop-smartworld/2016/07816944/12OmNwFid5m", "parentPublication": { "id": "proceedings/uic-atc-scalcom-cbdcom-iop-smartworld/2016/2771/0", "title": "2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2012/1365/0/06274818", "title": "Bridging Theories and Practices: An Evaluation Framework of Small and Medium Sized Enterprises' (SMEs) Decision-making in China", "doi": null, "abstractUrl": "/proceedings-article/cso/2012/06274818/12OmNwekjFF", "parentPublication": { "id": "proceedings/cso/2012/1365/0", "title": "2012 Fifth International Joint Conference on Computational Sciences and Optimization (CSO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/1996/7324/3/00493188", "title": "Knowledge acquisition for an organisational memory system", "doi": null, "abstractUrl": "/proceedings-article/hicss/1996/00493188/12OmNx4gUlj", "parentPublication": { "id": "proceedings/hicss/1996/7324/3", "title": "Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cbi/2015/7340/1/7340a181", "title": "Beyond Narrow Decision Models: Toward Integrative Models of Organizational Decision Processes", "doi": null, "abstractUrl": "/proceedings-article/cbi/2015/7340a181/12OmNxE2mXl", "parentPublication": { "id": "proceedings/cbi/2015/7340/1", "title": "2015 IEEE 17th Conference on Business Informatics (CBI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/his/2008/3326/0/3326a162", "title": "A Comparison of Hybrid Decision Making Methods for Emergency Support", "doi": null, "abstractUrl": "/proceedings-article/his/2008/3326a162/12OmNxdVgVq", "parentPublication": { "id": "proceedings/his/2008/3326/0", "title": "Hybrid Intelligent Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ias/2009/3744/1/3744a631", "title": "An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations", "doi": null, "abstractUrl": "/proceedings-article/ias/2009/3744a631/12OmNz4SOoV", "parentPublication": { "id": "proceedings/ias/2009/3744/1", "title": "Information Assurance and Security, International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wicsa/2015/1922/0/1922a011", "title": "A Study on Architectural Decision-Making in Context", "doi": null, "abstractUrl": "/proceedings-article/wicsa/2015/1922a011/12OmNzuZUpA", "parentPublication": { "id": "proceedings/wicsa/2015/1922/0", "title": "2015 12th Working IEEE/IFIP Conference on Software Architecture (WICSA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2020/6251/0/09378243", "title": "The Role of Multi-Criteria Decision-Making in a Sentry Agents Framework Utilizing Uncertainty of Information", "doi": null, "abstractUrl": "/proceedings-article/big-data/2020/09378243/1s64WcbgD4Y", "parentPublication": { "id": "proceedings/big-data/2020/6251/0", "title": "2020 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09408391", "title": "The Unmet Data Visualization Needs of Decision Makers Within Organizations", "doi": null, "abstractUrl": "/journal/tg/2022/12/09408391/1sVEPCiNLI4", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxvNZWX", "title": "Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume III: Decision Support and Knowledge Based Systems Track", "acronym": "hicss", "groupId": "1000730", "volume": "3", "displayVolume": "0", "year": "1988", "__typename": "ProceedingType" }, "article": { "id": "12OmNyNzhwi", "doi": "10.1109/HICSS.1988.11883", "title": "An investigation of performance, productivity, and rationality in multi-criteria decision making", "normalizedTitle": "An investigation of performance, productivity, and rationality in multi-criteria decision making", "abstract": "The outcomes of multicriteria decisions are evaluated in terms of three distinct but interrelated measures: decision performance, decision-making productivity, and decision-maker rationality. Depending on whether subjects considered all of the criteria in their decisions or eliminated at least one, two groups of decision-makers emerged, called noneliminators, and eliminators. Their productivity was measured in terms of time and cognitive effort. The results indicate that eliminators consistently outperformed the noneliminators and had consistently higher confidence ratings as the number of alternatives increased. Noneliminators were significantly more productive timewise than eliminators. The degree of difference increased as the number of alternatives increased. Conversely, eliminators were significantly more productive in terms of cognitive effort, but the magnitude of the differences decreased drastically with increased alternatives.<>", "abstracts": [ { "abstractType": "Regular", "content": "The outcomes of multicriteria decisions are evaluated in terms of three distinct but interrelated measures: decision performance, decision-making productivity, and decision-maker rationality. Depending on whether subjects considered all of the criteria in their decisions or eliminated at least one, two groups of decision-makers emerged, called noneliminators, and eliminators. Their productivity was measured in terms of time and cognitive effort. The results indicate that eliminators consistently outperformed the noneliminators and had consistently higher confidence ratings as the number of alternatives increased. Noneliminators were significantly more productive timewise than eliminators. The degree of difference increased as the number of alternatives increased. Conversely, eliminators were significantly more productive in terms of cognitive effort, but the magnitude of the differences decreased drastically with increased alternatives.<>", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The outcomes of multicriteria decisions are evaluated in terms of three distinct but interrelated measures: decision performance, decision-making productivity, and decision-maker rationality. Depending on whether subjects considered all of the criteria in their decisions or eliminated at least one, two groups of decision-makers emerged, called noneliminators, and eliminators. Their productivity was measured in terms of time and cognitive effort. The results indicate that eliminators consistently outperformed the noneliminators and had consistently higher confidence ratings as the number of alternatives increased. Noneliminators were significantly more productive timewise than eliminators. The degree of difference increased as the number of alternatives increased. Conversely, eliminators were significantly more productive in terms of cognitive effort, but the magnitude of the differences decreased drastically with increased alternatives.", "fno": "00011883", "keywords": [ "Decision Support Systems", "Human Factors", "Performance", "Productivity", "Rationality", "Multicriteria Decisions", "Noneliminators", "Cognitive Effort", "Eliminators", "Noneliminators", "Productivity", "Decision Making", "Information Processing", "Decision Support Systems", "Time Measurement", "Psychology", "Humans", "Competitive Intelligence", "Tires", "Hardware" ], "authors": [ { "affiliation": "Canisius Coll., Buffalo, NY, USA", "fullName": "L. Volonino", "givenName": "L.", "surname": "Volonino", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "P. Kirs", "givenName": "P.", "surname": "Kirs", "__typename": "ArticleAuthorType" } ], "idPrefix": "hicss", "isOpenAccess": true, "showRecommendedArticles": true, "showBuyMe": false, "hasPdf": true, "pubDate": "1988-01-01T00:00:00", "pubType": "proceedings", "pages": "10,11,12,13,14,15,16,17,18", "year": "1988", "issn": null, "isbn": null, "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "00011882", "articleId": "12OmNALUoBi", "__typename": "AdjacentArticleType" }, "next": { "fno": "00011884", "articleId": "12OmNxb5hxv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/incos/2010/4278/0/4278a484", "title": "Enhancing Robustness in Multi-criteria Decision-Making: A Scenario-Based Approach", "doi": null, "abstractUrl": "/proceedings-article/incos/2010/4278a484/12OmNAle6lp", "parentPublication": { "id": "proceedings/incos/2010/4278/0", "title": "Intelligent Networking and Collaborative Systems, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2015/7367/0/7367d960", "title": "Contrasting Voting, Multi-criteria Decision-Making, and Collaborative Decision-Making Using Election Results", "doi": null, "abstractUrl": "/proceedings-article/hicss/2015/7367d960/12OmNAnMusH", "parentPublication": { "id": "proceedings/hicss/2015/7367/0", "title": "2015 48th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/saner/2016/1855/5/07476774", "title": "Leveraging Biometric Data to Boost Software Developer Productivity", "doi": null, "abstractUrl": "/proceedings-article/saner/2016/07476774/12OmNAnuTqU", "parentPublication": { "id": "saner/2016/1855/5", "title": "2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciii/2008/3435/1/3435a288", "title": "Fuzzy Multiple Criteria Decision Making Method Based on Prospect Theory", "doi": null, "abstractUrl": "/proceedings-article/iciii/2008/3435a288/12OmNBubOT8", "parentPublication": { "id": "proceedings/iciii/2008/3435/1", "title": "2008 International Conference on Information Management, Innovation Management and Industrial Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nswctc/2009/3610/2/3610b707", "title": "Fuzzy Multi-criteria Decision-making TOPSIS for Distribution Center Location Selection", "doi": null, "abstractUrl": "/proceedings-article/nswctc/2009/3610b707/12OmNC1Y5iY", "parentPublication": { "id": "proceedings/nswctc/2009/3610/2", "title": "Networks Security, Wireless Communications and Trusted Computing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/kse/2012/4760/0/4760a121", "title": "A Pessimistic Approach for Solving a Multi-criteria Decision Making", "doi": null, "abstractUrl": "/proceedings-article/kse/2012/4760a121/12OmNqFJhKH", "parentPublication": { "id": "proceedings/kse/2012/4760/0", "title": "Knowledge and Systems Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icee/2010/3997/0/3997f300", "title": "The Game Model in Competitive Decision-making", "doi": null, "abstractUrl": "/proceedings-article/icee/2010/3997f300/12OmNwKoZbb", "parentPublication": { "id": "proceedings/icee/2010/3997/0", "title": "International Conference on E-Business and E-Government", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ccie/2010/4026/1/4026a416", "title": "Multi-criteria Decision Making Based on PROMETHEE Method", "doi": null, "abstractUrl": "/proceedings-article/ccie/2010/4026a416/12OmNx1qV0U", "parentPublication": { "id": "proceedings/ccie/2010/4026/1", "title": "Computing, Control and Industrial Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2010/4147/0/4147a009", "title": "Risk-Oriented Group Decision Making in Multi-criteria Analysis", "doi": null, "abstractUrl": "/proceedings-article/icis/2010/4147a009/12OmNx9FhQX", "parentPublication": { "id": "proceedings/icis/2010/4147/0", "title": "Computer and Information Science, ACIS International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2015/7644/0/7644a564", "title": "Multiple Person Decision Making with Heterogeneous Criteria Structure", "doi": null, "abstractUrl": "/proceedings-article/icicta/2015/7644a564/12OmNxj236B", "parentPublication": { "id": "proceedings/icicta/2015/7644/0", "title": "2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A9X06PlzG0", "title": "2021 IEEE International Conference on Big Knowledge (ICBK)", "acronym": "icbk", "groupId": "1821544", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A9X1ZjYSnC", "doi": "10.1109/ICKG52313.2021.00023", "title": "Intuitionistic Fuzzy Requirements Aggregation for Graph Pattern Matching with Group Decision Makers", "normalizedTitle": "Intuitionistic Fuzzy Requirements Aggregation for Graph Pattern Matching with Group Decision Makers", "abstract": "Graph Pattern Matching (GPM) plays an important role in the field of multi-attribute decision making. By designing a pattern graph involving multiple attribute constraints of the Decision Maker (DM), the sub graphs can be matched from the data graph. However, the existing work rarely considers the requirements from group DMs. In this case, the requirements on each attribute have multiple values from different DMs. How to aggregate these requirements and perform efficient sub graph matching is a challenging task. In this paper, first, a sub graph query problem that needs to consider the multiple requirements from group DMs is proposed. Then, to solve this problem, a Multi-Requirement-based Sub graph Query model (MR-SQ) is proposed, which is mainly composed of two stages: group require-ments aggregation and GPM. For the first stage, an Intuitionistic Fuzzy Requirements Aggregation (IFRA) method is proposed for requirements aggregation. Then, to solve the efficiency problem of large-scale GPM, a parallel strategy is designed for the GPM stage. Finally, the practicability and effectiveness of the proposed model have been verified through an illustrative example and time- performance comparison experiments.", "abstracts": [ { "abstractType": "Regular", "content": "Graph Pattern Matching (GPM) plays an important role in the field of multi-attribute decision making. By designing a pattern graph involving multiple attribute constraints of the Decision Maker (DM), the sub graphs can be matched from the data graph. However, the existing work rarely considers the requirements from group DMs. In this case, the requirements on each attribute have multiple values from different DMs. How to aggregate these requirements and perform efficient sub graph matching is a challenging task. In this paper, first, a sub graph query problem that needs to consider the multiple requirements from group DMs is proposed. Then, to solve this problem, a Multi-Requirement-based Sub graph Query model (MR-SQ) is proposed, which is mainly composed of two stages: group require-ments aggregation and GPM. For the first stage, an Intuitionistic Fuzzy Requirements Aggregation (IFRA) method is proposed for requirements aggregation. Then, to solve the efficiency problem of large-scale GPM, a parallel strategy is designed for the GPM stage. Finally, the practicability and effectiveness of the proposed model have been verified through an illustrative example and time- performance comparison experiments.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Graph Pattern Matching (GPM) plays an important role in the field of multi-attribute decision making. By designing a pattern graph involving multiple attribute constraints of the Decision Maker (DM), the sub graphs can be matched from the data graph. However, the existing work rarely considers the requirements from group DMs. In this case, the requirements on each attribute have multiple values from different DMs. How to aggregate these requirements and perform efficient sub graph matching is a challenging task. In this paper, first, a sub graph query problem that needs to consider the multiple requirements from group DMs is proposed. Then, to solve this problem, a Multi-Requirement-based Sub graph Query model (MR-SQ) is proposed, which is mainly composed of two stages: group require-ments aggregation and GPM. For the first stage, an Intuitionistic Fuzzy Requirements Aggregation (IFRA) method is proposed for requirements aggregation. Then, to solve the efficiency problem of large-scale GPM, a parallel strategy is designed for the GPM stage. Finally, the practicability and effectiveness of the proposed model have been verified through an illustrative example and time- performance comparison experiments.", "fno": "385800a102", "keywords": [ "Decision Making", "Fuzzy Set Theory", "Graph Theory", "Pattern Matching", "Graph Pattern Matching", "Group Decision Makers", "GPM", "Multiattribute Decision Making", "Pattern Graph", "Attribute Constraints", "Data Graph", "D Ms", "Subgraph Matching", "Multirequirement Based Subgraph Query Model", "Intuitionistic Fuzzy Requirements Aggregation", "Multi Attribute Decision Making", "Conferences", "Aggregates", "Decision Making", "Task Analysis", "Pattern Matching", "Investment", "Intuitionistic Fuzzy Sets", "Graph Pattern Matching", "Binomial Weighted Sum Method", "Multithreading" ], "authors": [ { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education", "fullName": "Haixia Zhao", "givenName": "Haixia", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education", "fullName": "Guliu Liu", "givenName": "Guliu", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education", "fullName": "Lei Li", "givenName": "Lei", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology), Ministry of Education", "fullName": "Jiao Li", "givenName": "Jiao", "surname": "Li", "__typename": "ArticleAuthorType" } ], "idPrefix": "icbk", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "102-109", "year": "2021", "issn": null, "isbn": "978-1-6654-3858-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "385800a094", "articleId": "1A9X8DphL6E", "__typename": "AdjacentArticleType" }, "next": { "fno": "385800a110", "articleId": "1A9X5K91V6w", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/fskd/2009/3735/4/3735d545", "title": "Intuitionistic Fuzzy Geometric Aggregation Operator Based on Fuzzy Measure for Multi-criteria Group Decision Making", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735d545/12OmNAsTgVb", "parentPublication": { "id": "proceedings/fskd/2009/3735/4", "title": "Fuzzy Systems and Knowledge Discovery, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cso/2014/5372/0/5372a307", "title": "Interval-Valued Induced Averaging Aggregation Operator and Its Application in Group Decision Making with Intuitionistic Fuzzy Information", "doi": null, "abstractUrl": "/proceedings-article/cso/2014/5372a307/12OmNqGA4Z8", "parentPublication": { "id": "proceedings/cso/2014/5372/0", "title": "2014 Seventh International Joint Conference on Computational Sciences and Optimization (CSO)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dta/2015/9849/0/9849a001", "title": "Graph Pattern Matching through Model Checking", "doi": null, "abstractUrl": "/proceedings-article/dta/2015/9849a001/12OmNvBIRPs", "parentPublication": { "id": "proceedings/dta/2015/9849/0", "title": "2015 8th International Conference on Database Theory and Application (DTA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hicss/2016/5670/0/5670b537", "title": "Tailoring Group Package Recommendations to Large Heterogeneous Groups Based on Multi-criteria Optimization", "doi": null, "abstractUrl": "/proceedings-article/hicss/2016/5670b537/12OmNwD1q0R", "parentPublication": { "id": "proceedings/hicss/2016/5670/0", "title": "2016 49th Hawaii International Conference on System Sciences (HICSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sec/2008/3348/0/3348a332", "title": "Some New Aggregation Operators and Their Application in Group Decision-Making Based on Fuzzy Preference Relations", "doi": null, "abstractUrl": "/proceedings-article/sec/2008/3348a332/12OmNwt5sjD", "parentPublication": { "id": "proceedings/sec/2008/3348/0", "title": "Embedded Computing, IEEE International Symposium on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ic3/2016/3251/0/07880259", "title": "Choquet integral-based intuitionistic fuzzy bonferroni mean operator", "doi": null, "abstractUrl": "/proceedings-article/ic3/2016/07880259/12OmNyoiZdB", "parentPublication": { "id": "proceedings/ic3/2016/3251/0", "title": "2016 Ninth International Conference on Contemporary Computing (IC3)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fskd/2009/3735/3/3735c307", "title": "Fuzzy Group Decision Making to Select the Best Alternative for Development of Groundwater Resources", "doi": null, "abstractUrl": "/proceedings-article/fskd/2009/3735c307/12OmNzd7bAL", "parentPublication": { "id": "proceedings/fskd/2009/3735/3", "title": "2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2009)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2018/06/08233149", "title": "MCS-GPM: Multi-Constrained Simulation Based Graph Pattern Matching in Contextual Social Graphs", "doi": null, "abstractUrl": "/journal/tk/2018/06/08233149/13rRUx0geql", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icde/2021/9184/0/918400b571", "title": "Knowledge-Aware Group Representation Learning for Group Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icde/2021/918400b571/1uGXReV7dio", "parentPublication": { "id": "proceedings/icde/2021/9184/0", "title": "2021 IEEE 37th International Conference on Data Engineering (ICDE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500a713", "title": "Task Assignment with Consensus Decision for Spatial Crowdsouring", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500a713/1ua4KvVK6Ws", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNwwMf3H", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "acronym": "ismarw", "groupId": "1810084", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNyKJiwf", "doi": "10.1109/ISMAR-Adjunct.2016.0087", "title": "A Low Cost Optical See-Through HMD - Do-It-Yourself", "normalizedTitle": "A Low Cost Optical See-Through HMD - Do-It-Yourself", "abstract": "HMD that provides Virtual Reality and Augmented Reality capabilities are emerging in the last years. Manufacturers are seeking to design hardware that maximizes the field of view (FoV) and depth of field (DoF). On the other hand, we did not found a device that allows the variation of these parameters. This paper presents a model to build HMD using mirrors reflection. Our model allows the adjustment of the DoF. Consequently, the FoV also changes. Our prototype shows that the proposed feature is a feasible alternative. Furthermore, we present a simple and low-cost alternative for HMD development.", "abstracts": [ { "abstractType": "Regular", "content": "HMD that provides Virtual Reality and Augmented Reality capabilities are emerging in the last years. Manufacturers are seeking to design hardware that maximizes the field of view (FoV) and depth of field (DoF). On the other hand, we did not found a device that allows the variation of these parameters. This paper presents a model to build HMD using mirrors reflection. Our model allows the adjustment of the DoF. Consequently, the FoV also changes. Our prototype shows that the proposed feature is a feasible alternative. Furthermore, we present a simple and low-cost alternative for HMD development.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "HMD that provides Virtual Reality and Augmented Reality capabilities are emerging in the last years. Manufacturers are seeking to design hardware that maximizes the field of view (FoV) and depth of field (DoF). On the other hand, we did not found a device that allows the variation of these parameters. This paper presents a model to build HMD using mirrors reflection. Our model allows the adjustment of the DoF. Consequently, the FoV also changes. Our prototype shows that the proposed feature is a feasible alternative. Furthermore, we present a simple and low-cost alternative for HMD development.", "fno": "07836508", "keywords": [ "Augmented Reality", "Helmet Mounted Displays", "Mirrors", "Low Cost Optical See Through HMD", "Virtual Reality Capabilities", "Augmented Reality Capabilities", "Field Of View", "Depth Of Field", "Mirror Reflection", "Resists", "Optical Distortion", "Optical Imaging", "Optical Design", "Biomedical Optical Imaging", "Image Resolution", "Augmented Reality" ], "authors": [ { "affiliation": null, "fullName": "Saul Delabrida", "givenName": "Saul", "surname": "Delabrida", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Antonio A. F. Loureiro", "givenName": "Antonio A. F.", "surname": "Loureiro", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Thiago D'Angelo", "givenName": "Thiago", "surname": "D'Angelo", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Ricardo A. Rabelo Oliveira", "givenName": "Ricardo A. Rabelo", "surname": "Oliveira", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Bruce Thomas", "givenName": "Bruce", "surname": "Thomas", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Edson Carvalho", "givenName": "Edson", "surname": "Carvalho", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Mark Billinghurst", "givenName": "Mark", "surname": "Billinghurst", "__typename": "ArticleAuthorType" } ], "idPrefix": "ismarw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-09-01T00:00:00", "pubType": "proceedings", "pages": "252-257", "year": "2016", "issn": null, "isbn": "978-1-5090-3740-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07836507", "articleId": "12OmNzw8iSn", "__typename": "AdjacentArticleType" }, "next": { "fno": "07836509", "articleId": "12OmNCu4nfp", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2012/4660/0/06402574", "title": "Occlusion capable optical see-through head-mounted display using freeform optics", "doi": null, "abstractUrl": "/proceedings-article/ismar/2012/06402574/12OmNBEpnEt", "parentPublication": { "id": "proceedings/ismar/2012/4660/0", "title": "2012 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2015/7660/0/7660a043", "title": "Simultaneous Direct and Augmented View Distortion Calibration of Optical See-Through Head-Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a043/12OmNC1oT64", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836482", "title": "The RealityMashers: Augmented Reality Wide Field-of-View Optical See-Through Head Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836482/12OmNqzcvPm", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2016/3641/0/3641a094", "title": "Automated Spatial Calibration of HMD Systems with Unconstrained Eye-cameras", "doi": null, "abstractUrl": "/proceedings-article/ismar/2016/3641a094/12OmNxVDuUP", "parentPublication": { "id": "proceedings/ismar/2016/3641/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2016/0842/0/07460065", "title": "Smartwatch-assisted robust 6-DOF hand tracker for object manipulation in HMD-based augmented reality", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460065/12OmNzlUKES", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sbesc/2016/2653/0/2653a024", "title": "Towards a Low-Cost Augmented Reality Head-Mounted Display with Real-Time Eye Center Location Capability", "doi": null, "abstractUrl": "/proceedings-article/sbesc/2016/2653a024/12OmNzxgHyv", "parentPublication": { "id": "proceedings/sbesc/2016/2653/0", "title": "2016 VI Brazilian Symposium on Computing Systems Engineering (SBESC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089608", "title": "Angular Dependence of the Spatial Resolution in Virtual Reality Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089608/1jIxaeEdNkc", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a649", "title": "Comparing World and Screen Coordinate Systems in Optical See-Through Head-Mounted Displays for Text Readability while Walking", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a649/1pysvKFdazS", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a301", "title": "Super Wide-view Optical See-through Head Mounted Displays with Per-pixel Occlusion Capability", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a301/1pysxIK95Yc", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09416829", "title": "Design of a Pupil-Matched Occlusion-Capable Optical See-Through Wearable Display", "doi": null, "abstractUrl": "/journal/tg/2022/12/09416829/1t8VUXSYL2E", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNCcbEdc", "title": "2016 International Conference on Informatics, Electronics and Vision (ICIEV)", "acronym": "iciev", "groupId": "1802578", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNAlNiKx", "doi": "10.1109/ICIEV.2016.7760001", "title": "Bangla grammar pattern recognition using shift reduce parser", "normalizedTitle": "Bangla grammar pattern recognition using shift reduce parser", "abstract": "Parser plays a very important role in computational linguistics. In this paper, here we describe a parsing technique for Bangla grammar recognition. The parser is, by nature, a shift reduce parser and constructs a parse table based on LR strategy. It takes the Context Free Grammar (CFG) of the Bangla language as input and constructs parser table from the grammar. The parse table is visited on bottom-up approach. This parser is free from the problem of the left factoring and left recursion. To avoid the inflection (BIVOKTI) of Bangla we describe a new approach. Hence only the main form of the Bangla word is stored in the repository. Our experiment shows that the scheme can detect all forms of Bangla sentences even for nontraditional forms.", "abstracts": [ { "abstractType": "Regular", "content": "Parser plays a very important role in computational linguistics. In this paper, here we describe a parsing technique for Bangla grammar recognition. The parser is, by nature, a shift reduce parser and constructs a parse table based on LR strategy. It takes the Context Free Grammar (CFG) of the Bangla language as input and constructs parser table from the grammar. The parse table is visited on bottom-up approach. This parser is free from the problem of the left factoring and left recursion. To avoid the inflection (BIVOKTI) of Bangla we describe a new approach. Hence only the main form of the Bangla word is stored in the repository. Our experiment shows that the scheme can detect all forms of Bangla sentences even for nontraditional forms.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Parser plays a very important role in computational linguistics. In this paper, here we describe a parsing technique for Bangla grammar recognition. The parser is, by nature, a shift reduce parser and constructs a parse table based on LR strategy. It takes the Context Free Grammar (CFG) of the Bangla language as input and constructs parser table from the grammar. The parse table is visited on bottom-up approach. This parser is free from the problem of the left factoring and left recursion. To avoid the inflection (BIVOKTI) of Bangla we describe a new approach. Hence only the main form of the Bangla word is stored in the repository. Our experiment shows that the scheme can detect all forms of Bangla sentences even for nontraditional forms.", "fno": "07760001", "keywords": [ "Grammar", "Natural Languages", "Context", "XML", "Syntactics", "Compounds", "Speech", "Parse Table", "Parser", "Context Free Grammar", "Computational Linguistics", "Bottom Up Parsing", "Canonical Forms" ], "authors": [ { "affiliation": "Dept. of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh", "fullName": "Rafsan Zani Rabbi", "givenName": "Rafsan Zani", "surname": "Rabbi", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh", "fullName": "Mohammad Insanur Rahman Shuvo", "givenName": "Mohammad Insanur Rahman", "surname": "Shuvo", "__typename": "ArticleAuthorType" }, { "affiliation": "Dept. of Computer Science and Engineering, Khulna University of Engineering & Technology, Khulna, Bangladesh", "fullName": "K.M. Azharul Hasan", "givenName": "K.M. Azharul", "surname": "Hasan", "__typename": "ArticleAuthorType" } ], "idPrefix": "iciev", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-05-01T00:00:00", "pubType": "proceedings", "pages": "229-234", "year": "2016", "issn": null, "isbn": "978-1-5090-1269-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07760000", "articleId": "12OmNBr4eBu", "__typename": "AdjacentArticleType" }, "next": { "fno": "07760002", "articleId": "12OmNx0RILv", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/tools/2000/0918/0/09180214", "title": "YooccLa: A Parser Generator for L-Attributed Grammars", "doi": null, "abstractUrl": "/proceedings-article/tools/2000/09180214/12OmNs4S8GC", "parentPublication": { "id": "proceedings/tools/2000/0918/0", "title": "37th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS-37'00)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/synasc/2012/5026/0/06481024", "title": "Automating Abstract Syntax Tree Construction for Context Free Grammars", "doi": null, "abstractUrl": "/proceedings-article/synasc/2012/06481024/12OmNwCJOVW", "parentPublication": { "id": "proceedings/synasc/2012/5026/0", "title": "2012 14th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2014/5103/0/5103a158", "title": "Nail: A Practical Interface Generator for Data Formats", "doi": null, "abstractUrl": "/proceedings-article/spw/2014/5103a158/12OmNyrIaxl", "parentPublication": { "id": "proceedings/spw/2014/5103/0", "title": "2014 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2009/06/tts2009060780", "title": "Grammar Recovery from Parse Trees and Metrics-Guided Grammar Refactoring", "doi": null, "abstractUrl": "/journal/ts/2009/06/tts2009060780/13rRUyfbwsq", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpc/2022/9298/0/929800a460", "title": "MSCCD: Grammar Pluggable Clone Detection Based on ANTLR Parser Generation", "doi": null, "abstractUrl": "/proceedings-article/icpc/2022/929800a460/1EpKLVcwdXy", "parentPublication": { "id": "proceedings/icpc/2022/9298/0", "title": "2022 IEEE/ACM 30th International Conference on Program Comprehension (ICPC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cecit/2022/3197/0/319700a041", "title": "Discovering Grammar Information from One Parser to Enhance All Parser-Based Application Fuzzing<sup>*</sup>", "doi": null, "abstractUrl": "/proceedings-article/cecit/2022/319700a041/1M66IQwfs6k", "parentPublication": { "id": "proceedings/cecit/2022/3197/0", "title": "2022 3rd International Conference on Electronics, Communications and Information Technology (CECIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse/2019/0869/0/086900a724", "title": "Superion: Grammar-Aware Greybox Fuzzing", "doi": null, "abstractUrl": "/proceedings-article/icse/2019/086900a724/1cMFvf07pHa", "parentPublication": { "id": "proceedings/icse/2019/0869/0", "title": "2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2021/08/09018126", "title": "A Generalized Earley Parser for Human Activity Parsing and Prediction", "doi": null, "abstractUrl": "/journal/tp/2021/08/09018126/1hN4mNltT9K", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2020/9346/0/934600a276", "title": "Toward Automated Grammar Extraction via Semantic Labeling of Parser Implementations", "doi": null, "abstractUrl": "/proceedings-article/spw/2020/934600a276/1pF6ZCLK9IQ", "parentPublication": { "id": "proceedings/spw/2020/9346/0", "title": "2020 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2021/3732/0/373200a142", "title": "Accessible Formal Methods for Verified Parser Development", "doi": null, "abstractUrl": "/proceedings-article/spw/2021/373200a142/1v56q2HmsCs", "parentPublication": { "id": "proceedings/spw/2021/3732/0", "title": "2021 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNBSBk6z", "title": "2014 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT)", "acronym": "icccnt", "groupId": "1802177", "volume": "0", "displayVolume": "0", "year": "2014", "__typename": "ProceedingType" }, "article": { "id": "12OmNy314fJ", "doi": "10.1109/ICCCNT.2014.6963105", "title": "Transformation between BPMN and BPEL based on graph grammar", "normalizedTitle": "Transformation between BPMN and BPEL based on graph grammar", "abstract": "As a graphical language, the Business Process Modelling Notation (BPMN) plays an important role in enterprise information systems. BPMN is a standard notation for capturing business processes, while Business Process Execution Language (BPEL) provides a standard executable language for specifying business process compositions and interactions. This paper proposes a new method based on graph grammars to map from BPMN to BPEL codes. In the first place, the existing Edge-based Graph Grammar (EGG) is introduced, which is a context-sensitive grammar and a new formal method for simply specifying graph grammars. Secondly, some aspects of EGGs are extended to conveniently map from BPMN to BPEL. Finally, new mapping steps and a parsing algorithm are put forward, which achieve a goal of this paper.", "abstracts": [ { "abstractType": "Regular", "content": "As a graphical language, the Business Process Modelling Notation (BPMN) plays an important role in enterprise information systems. BPMN is a standard notation for capturing business processes, while Business Process Execution Language (BPEL) provides a standard executable language for specifying business process compositions and interactions. This paper proposes a new method based on graph grammars to map from BPMN to BPEL codes. In the first place, the existing Edge-based Graph Grammar (EGG) is introduced, which is a context-sensitive grammar and a new formal method for simply specifying graph grammars. Secondly, some aspects of EGGs are extended to conveniently map from BPMN to BPEL. Finally, new mapping steps and a parsing algorithm are put forward, which achieve a goal of this paper.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As a graphical language, the Business Process Modelling Notation (BPMN) plays an important role in enterprise information systems. BPMN is a standard notation for capturing business processes, while Business Process Execution Language (BPEL) provides a standard executable language for specifying business process compositions and interactions. This paper proposes a new method based on graph grammars to map from BPMN to BPEL codes. In the first place, the existing Edge-based Graph Grammar (EGG) is introduced, which is a context-sensitive grammar and a new formal method for simply specifying graph grammars. Secondly, some aspects of EGGs are extended to conveniently map from BPMN to BPEL. Finally, new mapping steps and a parsing algorithm are put forward, which achieve a goal of this paper.", "fno": "06963105", "keywords": [ "Grammar", "Production", "Business", "Educational Institutions", "Visualization", "Information Systems", "Context", "Transformation", "Graph Grammar", "BPMN", "BPEL" ], "authors": [ { "affiliation": "College of Computer and Information Engineering in HoHai University and College of Command Information Systems in PLA University of Science and Technology, Nanjing, China", "fullName": "Zhan Shi", "givenName": "Zhan", "surname": "Shi", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer and Information Engineering in HoHai University, Nanjing, China", "fullName": "Xiaoqin Zeng", "givenName": "Xiaoqin", "surname": "Zeng", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Command Information Systems in PLA University of Science and Technology, Nanjing, China", "fullName": "Song Huang", "givenName": "Song", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Command Information Systems in PLA University of Science and Technology, Nanjing, China", "fullName": "Hui Li", "givenName": "Hui", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Command Information Systems in PLA University of Science and Technology, Nanjing, China", "fullName": "Bing Hu", "givenName": "Bing", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Command Information Systems in PLA University of Science and Technology, Nanjing, China", "fullName": "XiaoYu Lei", "givenName": "XiaoYu", "surname": "Lei", "__typename": "ArticleAuthorType" }, { "affiliation": "College of Computer and Information Engineering in HoHai University, Nanjing, China", "fullName": "Yi Wang", "givenName": "Yi", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "icccnt", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2014-07-01T00:00:00", "pubType": "proceedings", "pages": "1-6", "year": "2014", "issn": null, "isbn": "978-1-4799-2696-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "06963104", "articleId": "12OmNAXxX4b", "__typename": "AdjacentArticleType" }, "next": { "fno": "06963106", "articleId": "12OmNyugyHL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icws/2006/2669/0/26690285", "title": "From BPMN Process Models to BPEL Web Services", "doi": null, "abstractUrl": "/proceedings-article/icws/2006/26690285/12OmNAXPy44", "parentPublication": { "id": "proceedings/icws/2006/2669/0", "title": "2006 IEEE International Conference on Web Services (ICWS'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/apscc/2008/3473/0/3473b300", "title": "A Flexible Transformation Scheme between the 'OR' of BPMN and 'Link' of BPEL", "doi": null, "abstractUrl": "/proceedings-article/apscc/2008/3473b300/12OmNApLGQd", "parentPublication": { "id": "proceedings/apscc/2008/3473/0", "title": "2008 IEEE Asia-Pacific Services Computing Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cec/2009/3755/0/3755a345", "title": "Realising Dead Path Elimination in BPMN", "doi": null, "abstractUrl": "/proceedings-article/cec/2009/3755a345/12OmNBt3qiY", "parentPublication": { "id": "proceedings/cec/2009/3755/0", "title": "2009 IEEE Conference on Commerce and Enterprise Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gpc/2009/3677/0/3677a080", "title": "On Visualizing and Modelling BPEL with BPMN", "doi": null, "abstractUrl": "/proceedings-article/gpc/2009/3677a080/12OmNCcbEjo", "parentPublication": { "id": "proceedings/gpc/2009/3677/0", "title": "Grid and Pervasive Computing Conference, Workshops at the", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/scc/2009/3811/0/3811a292", "title": "Interaction Mismatch Discovery Based Transformation from BPMN to BPEL", "doi": null, "abstractUrl": "/proceedings-article/scc/2009/3811a292/12OmNvpewaB", "parentPublication": { "id": "proceedings/scc/2009/3811/0", "title": "2009 IEEE International Conference on Services Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccee/2009/3925/1/3925a268", "title": "Development of Error Management in BPMN Using Java Code", "doi": null, "abstractUrl": "/proceedings-article/iccee/2009/3925a268/12OmNxtOO0l", "parentPublication": { "id": "iccee/2009/3925/1", "title": "Computer and Electrical Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sera/2006/2656/0/01691377", "title": "Precedence Grammar and Its Transformation", "doi": null, "abstractUrl": "/proceedings-article/sera/2006/01691377/12OmNzTH0Pk", "parentPublication": { "id": "proceedings/sera/2006/2656/0", "title": "Fourth International Conference on Software Engineering Research, Management and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoac/2012/5583/0/06416794", "title": "Learning very simple k-Equal Matrix Grammar from positive data", "doi": null, "abstractUrl": "/proceedings-article/icoac/2012/06416794/12OmNzZ5oeb", "parentPublication": { "id": "proceedings/icoac/2012/5583/0", "title": "2012 Fourth International Conference on Advanced Computing (ICoAC 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/2/260702a549", "title": "A Grammar Based Approach to BPMN Model Semantic Preservation using Refinement", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260702a549/1cYip2SneBG", "parentPublication": { "id": "compsac/2019/2607/2", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vis/2021/3335/0/333500a171", "title": "Atlas: Grammar-based Procedural Generation of Data Visualizations", "doi": null, "abstractUrl": "/proceedings-article/vis/2021/333500a171/1yXulf0d488", "parentPublication": { "id": "proceedings/vis/2021/3335/0", "title": "2021 IEEE Visualization Conference (VIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNynsbCs", "title": "Asian Language Processing, International Conference on", "acronym": "ialp", "groupId": "1003073", "volume": "0", "displayVolume": "0", "year": "2011", "__typename": "ProceedingType" }, "article": { "id": "12OmNyprnt4", "doi": "10.1109/IALP.2011.58", "title": "Natural Language Grammar Induction of Indonesian Language Corpora Using Genetic Algorithm", "normalizedTitle": "Natural Language Grammar Induction of Indonesian Language Corpora Using Genetic Algorithm", "abstract": "Grammar Induction is a machine learning process for learning grammar from corpora. This paper will discuss the process of grammar induction for Indonesian language corpora using genetic algorithm. The Grammar production rules will be modeled in the form of chromosomes. The fitness function is used to count how many sentences can be parsed. The data used are Indonesian fairy tales stories such as \"Bawang Merah Bawang Putih\" and \"Malin Kundang\". This paper describes the detailed explanations about the steps of each process carried out for natural language grammar problems.", "abstracts": [ { "abstractType": "Regular", "content": "Grammar Induction is a machine learning process for learning grammar from corpora. This paper will discuss the process of grammar induction for Indonesian language corpora using genetic algorithm. The Grammar production rules will be modeled in the form of chromosomes. The fitness function is used to count how many sentences can be parsed. The data used are Indonesian fairy tales stories such as \"Bawang Merah Bawang Putih\" and \"Malin Kundang\". This paper describes the detailed explanations about the steps of each process carried out for natural language grammar problems.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Grammar Induction is a machine learning process for learning grammar from corpora. This paper will discuss the process of grammar induction for Indonesian language corpora using genetic algorithm. The Grammar production rules will be modeled in the form of chromosomes. The fitness function is used to count how many sentences can be parsed. The data used are Indonesian fairy tales stories such as \"Bawang Merah Bawang Putih\" and \"Malin Kundang\". This paper describes the detailed explanations about the steps of each process carried out for natural language grammar problems.", "fno": "4554a015", "keywords": [ "Natural Language Processing", "Genetic Algorithm", "Indonesian Language", "Grammar Induction" ], "authors": [ { "affiliation": null, "fullName": "Arya Tandy Hermawan", "givenName": "Arya Tandy", "surname": "Hermawan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gunawan", "givenName": null, "surname": "Gunawan", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Joan Santoso", "givenName": "Joan", "surname": "Santoso", "__typename": "ArticleAuthorType" } ], "idPrefix": "ialp", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2011-11-01T00:00:00", "pubType": "proceedings", "pages": "15-18", "year": "2011", "issn": null, "isbn": "978-0-7695-4554-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "4554a011", "articleId": "12OmNvDZF5O", "__typename": "AdjacentArticleType" }, "next": { "fno": "4554a019", "articleId": "12OmNwIHoy3", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ictai/2008/3440/1/3440a133", "title": "Adaptive Mobile Interfaces through Grammar Induction", "doi": null, "abstractUrl": "/proceedings-article/ictai/2008/3440a133/12OmNBEpnEi", "parentPublication": { "id": "proceedings/ictai/2008/3440/1", "title": "2008 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ialp/2011/4554/0/4554a047", "title": "WordNet Editor to Refine Indonesian Language Lexical Database", "doi": null, "abstractUrl": "/proceedings-article/ialp/2011/4554a047/12OmNButq2Y", "parentPublication": { "id": "proceedings/ialp/2011/4554/0", "title": "Asian Language Processing, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2013/5096/0/5096a309", "title": "A Study of Parsing Process on Natural Language Processing in Bahasa Indonesia", "doi": null, "abstractUrl": "/proceedings-article/cse/2013/5096a309/12OmNxEBz4A", "parentPublication": { "id": "proceedings/cse/2013/5096/0", "title": "2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdm/2011/4408/0/4408b194", "title": "Helix: Unsupervised Grammar Induction for Structured Activity Recognition", "doi": null, "abstractUrl": "/proceedings-article/icdm/2011/4408b194/12OmNySG3Nk", "parentPublication": { "id": "proceedings/icdm/2011/4408/0", "title": "2011 IEEE 11th International Conference on Data Mining", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/uksim/2010/4016/0/4016a092", "title": "PDA Simulator for CFG Induction Using Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/uksim/2010/4016a092/12OmNzAohUv", "parentPublication": { "id": "proceedings/uksim/2010/4016/0", "title": "Computer Modeling and Simulation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmla/2011/4607/2/4607b053", "title": "Unsupervised Grammar Induction of Clinical Report Sublanguage", "doi": null, "abstractUrl": "/proceedings-article/icmla/2011/4607b053/12OmNzVoBQA", "parentPublication": { "id": "proceedings/icmla/2011/4607/2", "title": "Machine Learning and Applications, Fourth International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2008/3440/2/3440b395", "title": "Discovering Program?s Behavioral Patterns by Inferring Graph-Grammars from Execution Traces", "doi": null, "abstractUrl": "/proceedings-article/ictai/2008/3440b395/12OmNznkJXa", "parentPublication": { "id": "proceedings/ictai/2008/3440/2", "title": "2008 20th IEEE International Conference on Tools with Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2002/01/k0172", "title": "Semiautomatic Acquisition of Semantic Structures for Understanding Domain-Specific Natural Language Queries", "doi": null, "abstractUrl": "/journal/tk/2002/01/k0172/13rRUIM2VBW", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ts/2010/03/tts2010030431", "title": "Program Behavior Discovery and Verification: A Graph Grammar Approach", "doi": null, "abstractUrl": "/journal/ts/2010/03/tts2010030431/13rRUy3xY4l", "parentPublication": { "id": "trans/ts", "title": "IEEE Transactions on Software Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200b645", "title": "VLGrammar: Grounded Grammar Induction of Vision and Language", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200b645/1BmGBfsMybK", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "18AuJaafq5W", "title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)", "acronym": "ispa-iucc-bdcloud-socialcom-sustaincom", "groupId": "1805944", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "18AuLEmYDcY", "doi": "10.1109/BDCloud.2018.00101", "title": "Robot Patrol Path Planning Based on Combined Deep Reinforcement Learning", "normalizedTitle": "Robot Patrol Path Planning Based on Combined Deep Reinforcement Learning", "abstract": "The optimal path planning for robot patrol is a combinatorial optimization problem that aims to solve the smallest Hamiltonian circle of a complete graph. Such problems are typical NP-hard problems, and the computational complexity of the existing precise algorithm increases exponentially with the expansion of the problem scale. Even if a considerable amount of running time is employed, it is difficult to obtain the global optimal solution. This paper presents a robot patrol path planning method based on combined deep reinforcement learning (DRL). This method combines reinforcement learning and neural networks to perform path optimization. The first step is performing DRL pre-training through asynchronous advantage actor-critic (A3C). Training data is adopted to optimize the recurrent neural networks (RNN) that parameterizes the stochastic policy. The second step is effective planning (EP) without pre-training. Using the expected reward objective, it iteratively optimizes the RNN parameters on test instances. The experimental results show that combined deep reinforcement learning method can jump out of the local optimal solution and outperform other state-of-the-art methods.", "abstracts": [ { "abstractType": "Regular", "content": "The optimal path planning for robot patrol is a combinatorial optimization problem that aims to solve the smallest Hamiltonian circle of a complete graph. Such problems are typical NP-hard problems, and the computational complexity of the existing precise algorithm increases exponentially with the expansion of the problem scale. Even if a considerable amount of running time is employed, it is difficult to obtain the global optimal solution. This paper presents a robot patrol path planning method based on combined deep reinforcement learning (DRL). This method combines reinforcement learning and neural networks to perform path optimization. The first step is performing DRL pre-training through asynchronous advantage actor-critic (A3C). Training data is adopted to optimize the recurrent neural networks (RNN) that parameterizes the stochastic policy. The second step is effective planning (EP) without pre-training. Using the expected reward objective, it iteratively optimizes the RNN parameters on test instances. The experimental results show that combined deep reinforcement learning method can jump out of the local optimal solution and outperform other state-of-the-art methods.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The optimal path planning for robot patrol is a combinatorial optimization problem that aims to solve the smallest Hamiltonian circle of a complete graph. Such problems are typical NP-hard problems, and the computational complexity of the existing precise algorithm increases exponentially with the expansion of the problem scale. Even if a considerable amount of running time is employed, it is difficult to obtain the global optimal solution. This paper presents a robot patrol path planning method based on combined deep reinforcement learning (DRL). This method combines reinforcement learning and neural networks to perform path optimization. The first step is performing DRL pre-training through asynchronous advantage actor-critic (A3C). Training data is adopted to optimize the recurrent neural networks (RNN) that parameterizes the stochastic policy. The second step is effective planning (EP) without pre-training. Using the expected reward objective, it iteratively optimizes the RNN parameters on test instances. The experimental results show that combined deep reinforcement learning method can jump out of the local optimal solution and outperform other state-of-the-art methods.", "fno": "114100a659", "keywords": [ "Computational Complexity", "Control Engineering Computing", "Graph Theory", "Learning Artificial Intelligence", "Mobile Robots", "Optimisation", "Path Planning", "Recurrent Neural Nets", "Robot Patrol Path Planning", "Combinatorial Optimization Problem", "Complete Graph", "Path Optimization", "Recurrent Neural Networks", "Effective Planning", "NP Hard Problems", "DRL", "Asynchronous Advantage Actor Critic", "Deep Reinforcement Learning", "Hamiltonian Circle", "Computational Complexity", "Path Planning", "Reinforcement Learning", "Robots", "Heuristic Algorithms", "Planning", "Decoding", "Optimization", "Robot Patrol Path Planning Combined Deep Reinforcement Learning Asynchronous Advantage Actor Critic Effective Planning Pointer Network" ], "authors": [ { "affiliation": null, "fullName": "Wenqi Li", "givenName": "Wenqi", "surname": "Li", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dehua Chen", "givenName": "Dehua", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Jiajin Le", "givenName": "Jiajin", "surname": "Le", "__typename": "ArticleAuthorType" } ], "idPrefix": "ispa-iucc-bdcloud-socialcom-sustaincom", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-12-01T00:00:00", "pubType": "proceedings", "pages": "659-666", "year": "2018", "issn": null, "isbn": "978-1-7281-1141-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "114100a651", "articleId": "18AuSijtWU0", "__typename": "AdjacentArticleType" }, "next": { "fno": "114100a667", "articleId": "18AuR4knt5e", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icme/2014/4761/0/06890169", "title": "Patrol course planning and battery station placement for mobile surveillance cameras", "doi": null, "abstractUrl": "/proceedings-article/icme/2014/06890169/12OmNy3AgBv", "parentPublication": { "id": "proceedings/icme/2014/4761/0", "title": "2014 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ainit/2021/1296/0/129600a073", "title": "Research on PPO algorithm in solving AUV path planning problems", "doi": null, "abstractUrl": "/proceedings-article/ainit/2021/129600a073/1BzWCqrDpRe", "parentPublication": { "id": "proceedings/ainit/2021/1296/0", "title": "2021 2nd International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cse/2021/1660/0/166000a035", "title": "Multi-Robot Coverage Path Planning based on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/cse/2021/166000a035/1BzY8VErBg4", "parentPublication": { "id": "proceedings/cse/2021/1660/0", "title": "2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccbb/2018/1277/0/08756483", "title": "The Study of a Textile Punching Robot Based on Combined Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/iccbb/2018/08756483/1bzYlHBgW1G", "parentPublication": { "id": "proceedings/iccbb/2018/1277/0", "title": "2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/compsac/2019/2607/1/260701a469", "title": "Increasing Self-Adaptation in a Hybrid Decision-Making and Planning System with Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/compsac/2019/260701a469/1cYiC2fu1YQ", "parentPublication": { "id": "proceedings/compsac/2019/2607/1", "title": "2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09420254", "title": "Visual Analytics for RNN-Based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cds/2021/0428/0/042800a203", "title": "Reinforcement Learning for Multi-Robot System: A Review", "doi": null, "abstractUrl": "/proceedings-article/cds/2021/042800a203/1uZxz97QMOQ", "parentPublication": { "id": "proceedings/cds/2021/0428/0", "title": "2021 2nd International Conference on Computing and Data Science (CDS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mdm/2021/2845/0/284500a258", "title": "Ship path planning based on Deep Reinforcement Learning and weather forecast", "doi": null, "abstractUrl": "/proceedings-article/mdm/2021/284500a258/1v2QBWkBIhq", "parentPublication": { "id": "proceedings/mdm/2021/2845/0", "title": "2021 22nd IEEE International Conference on Mobile Data Management (MDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/03/09576645", "title": "Robot Path Planning via Neural-Network-Driven Prediction", "doi": null, "abstractUrl": "/journal/ai/2022/03/09576645/1xIKwJ9uCqs", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/bigcom/2021/4252/0/425200a247", "title": "Path Planning Algorithm for Two-dimensional Raster Maps based on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/bigcom/2021/425200a247/1xlzZCTtAEU", "parentPublication": { "id": "proceedings/bigcom/2021/4252/0", "title": "2021 7th International Conference on Big Data Computing and Communications (BigCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1A8gmCnipkA", "title": "2021 IEEE International Conference on Big Data (Big Data)", "acronym": "big-data", "groupId": "1802964", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1A8h5r24GwU", "doi": "10.1109/BigData52589.2021.9671593", "title": "A Combinatorial Recommendation System Framework Based on Deep Reinforcement Learning", "normalizedTitle": "A Combinatorial Recommendation System Framework Based on Deep Reinforcement Learning", "abstract": "In this paper, we propose a combinatorial recommendation system based on deep reinforcement learning (DRL). Specifically, we focus on the combinatorial product recommendation problem, design a consumer behavior simulator, and utilize deep reinforcement learning to find appropriate product combinations that can improve the sales of the platform. In order to replace real users and conduct massive real-time interactive training with recommendation system, user short- term characteristics are extracted from user-click-history by hierarchical recurrent neural network to train a user simulator. Through ingenious modeling, we transform the NP-hard combinatorial optimization problem into a multi-step sequential decision problem, and construct a framework of combinatorial recommendation system based on DRL. Relevant experiments show that the binary accuracy of the user simulator in predicting users&#x2019; consumption behavior reaches more than 80%, and the combinatorial DRL based recommendation system improves the platform sales and provides attractive combinations of products for customers.", "abstracts": [ { "abstractType": "Regular", "content": "In this paper, we propose a combinatorial recommendation system based on deep reinforcement learning (DRL). Specifically, we focus on the combinatorial product recommendation problem, design a consumer behavior simulator, and utilize deep reinforcement learning to find appropriate product combinations that can improve the sales of the platform. In order to replace real users and conduct massive real-time interactive training with recommendation system, user short- term characteristics are extracted from user-click-history by hierarchical recurrent neural network to train a user simulator. Through ingenious modeling, we transform the NP-hard combinatorial optimization problem into a multi-step sequential decision problem, and construct a framework of combinatorial recommendation system based on DRL. Relevant experiments show that the binary accuracy of the user simulator in predicting users&#x2019; consumption behavior reaches more than 80%, and the combinatorial DRL based recommendation system improves the platform sales and provides attractive combinations of products for customers.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this paper, we propose a combinatorial recommendation system based on deep reinforcement learning (DRL). Specifically, we focus on the combinatorial product recommendation problem, design a consumer behavior simulator, and utilize deep reinforcement learning to find appropriate product combinations that can improve the sales of the platform. In order to replace real users and conduct massive real-time interactive training with recommendation system, user short- term characteristics are extracted from user-click-history by hierarchical recurrent neural network to train a user simulator. Through ingenious modeling, we transform the NP-hard combinatorial optimization problem into a multi-step sequential decision problem, and construct a framework of combinatorial recommendation system based on DRL. Relevant experiments show that the binary accuracy of the user simulator in predicting users’ consumption behavior reaches more than 80%, and the combinatorial DRL based recommendation system improves the platform sales and provides attractive combinations of products for customers.", "fno": "09671593", "keywords": [ "Consumer Behaviour", "Deep Learning Artificial Intelligence", "Recommender Systems", "Recurrent Neural Nets", "Reinforcement Learning", "Deep Reinforcement Learning", "Massive Real Time Interactive Training", "User Short Term Characteristics", "User Click History", "User Simulator", "NP Hard Combinatorial Optimization Problem", "Multistep Sequential Decision Problem", "Combinatorial DRL Based Recommendation System", "Combinatorial Recommendation System Framework", "Combinatorial Product Recommendation Problem", "Consumer Behavior Simulator", "Training", "Recurrent Neural Networks", "Consumer Behavior", "Conferences", "Reinforcement Learning", "Transforms", "Big Data", "Recommendation System", "Combinatorial Recommendation", "Simulator", "Deep Reinforcement Learning" ], "authors": [ { "affiliation": "School of Automation Central South University,Changsha,China", "fullName": "Fei Zhou", "givenName": "Fei", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Automation Central South University,Changsha,China", "fullName": "Biao Luo", "givenName": "Biao", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Automation Central South University,Changsha,China", "fullName": "Tianmeng Hu", "givenName": "Tianmeng", "surname": "Hu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Automation Central South University,Changsha,China", "fullName": "Zihan Chen", "givenName": "Zihan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Automation Central South University,Changsha,China", "fullName": "Yilin Wen", "givenName": "Yilin", "surname": "Wen", "__typename": "ArticleAuthorType" } ], "idPrefix": "big-data", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "5733-5740", "year": "2021", "issn": null, "isbn": "978-1-6654-3902-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09671558", "articleId": "1A8gUBjtLna", "__typename": "AdjacentArticleType" }, "next": { "fno": "09671419", "articleId": "1A8grLTWTni", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icdm/2018/9159/0/08594883", "title": "A Reinforcement Learning Framework for Explainable Recommendation", "doi": null, "abstractUrl": "/proceedings-article/icdm/2018/08594883/17D45VUZMZn", "parentPublication": { "id": "proceedings/icdm/2018/9159/0", "title": "2018 IEEE International Conference on Data Mining (ICDM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0/114100a659", "title": "Robot Patrol Path Planning Based on Combined Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/ispa-iucc-bdcloud-socialcom-sustaincom/2018/114100a659/18AuLEmYDcY", "parentPublication": { "id": "proceedings/ispa-iucc-bdcloud-socialcom-sustaincom/2018/1141/0", "title": "2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icei/2021/0734/0/073400a013", "title": "Does Explicit Prediction Matter in Deep Reinforcement Learning-Based Energy Management?", "doi": null, "abstractUrl": "/proceedings-article/icei/2021/073400a013/1APqgFIjjb2", "parentPublication": { "id": "proceedings/icei/2021/0734/0", "title": "2021 IEEE International Conference on Energy Internet (ICEI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2022/03/09691913", "title": "A Stable Deep Reinforcement Learning Framework for Recommendation", "doi": null, "abstractUrl": "/magazine/ex/2022/03/09691913/1As7tFaGBPy", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdacai/2022/5470/0/547000a493", "title": "Research on the prediction and recommendation system of clothing trend based on big data technology", "doi": null, "abstractUrl": "/proceedings-article/icdacai/2022/547000a493/1J7WPxUG10I", "parentPublication": { "id": "proceedings/icdacai/2022/5470/0", "title": "2022 International Conference on Data Analytics, Computing and Artificial Intelligence (ICDACAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2022/7679/0/767900a110", "title": "AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems", "doi": null, "abstractUrl": "/proceedings-article/issrew/2022/767900a110/1JqDRjWqxyg", "parentPublication": { "id": "proceedings/issrew/2022/7679/0", "title": "2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ai4i/2020/8701/0/870100a032", "title": "Deep Reinforcement Learning using Cyclical Learning Rates", "doi": null, "abstractUrl": "/proceedings-article/ai4i/2020/870100a032/1oJ0qcw4JyM", "parentPublication": { "id": "proceedings/ai4i/2020/8701/0", "title": "2020 Third International Conference on Artificial Intelligence for Industries (AI4I)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2020/9228/0/922800a532", "title": "Multi-Robot Collision Avoidance with Map-based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/ictai/2020/922800a532/1pP3uTsDzQQ", "parentPublication": { "id": "proceedings/ictai/2020/9228/0", "title": "2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09420254", "title": "Visual Analytics for RNN-Based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0/148500b037", "title": "A simulator for reinforcement learning training in the recommendation field", "doi": null, "abstractUrl": "/proceedings-article/ispa-bdcloud-socialcom-sustaincom/2020/148500b037/1ua4O4jQCo8", "parentPublication": { "id": "proceedings/ispa-bdcloud-socialcom-sustaincom/2020/1485/0", "title": "2020 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1APqbkmbl1C", "title": "2021 IEEE International Conference on Energy Internet (ICEI)", "acronym": "icei", "groupId": "1819924", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1APqgFIjjb2", "doi": "10.1109/ICEI52466.2021.00009", "title": "Does Explicit Prediction Matter in Deep Reinforcement Learning-Based Energy Management?", "normalizedTitle": "Does Explicit Prediction Matter in Deep Reinforcement Learning-Based Energy Management?", "abstract": "As a model-free optimization and decision-making method, deep reinforcement learning (DRL) has been widely applied to the field of energy management in energy Internet. While, some DRL-based energy management schemes also incorporate the prediction module used by the traditional model-based methods, which seems to be unnecessary and even adverse. In this work, we implement the standard energy management scheme with prediction using supervised learning and DRL, and the counterpart without prediction using end-to-end DRL. Then, these two schemes are compared in the unified energy management framework. The simulation results demonstrate that the energy management scheme without prediction is superior over the scheme with prediction. This work intends to rectify the misuse of DRL methods in the field of energy management.", "abstracts": [ { "abstractType": "Regular", "content": "As a model-free optimization and decision-making method, deep reinforcement learning (DRL) has been widely applied to the field of energy management in energy Internet. While, some DRL-based energy management schemes also incorporate the prediction module used by the traditional model-based methods, which seems to be unnecessary and even adverse. In this work, we implement the standard energy management scheme with prediction using supervised learning and DRL, and the counterpart without prediction using end-to-end DRL. Then, these two schemes are compared in the unified energy management framework. The simulation results demonstrate that the energy management scheme without prediction is superior over the scheme with prediction. This work intends to rectify the misuse of DRL methods in the field of energy management.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "As a model-free optimization and decision-making method, deep reinforcement learning (DRL) has been widely applied to the field of energy management in energy Internet. While, some DRL-based energy management schemes also incorporate the prediction module used by the traditional model-based methods, which seems to be unnecessary and even adverse. In this work, we implement the standard energy management scheme with prediction using supervised learning and DRL, and the counterpart without prediction using end-to-end DRL. Then, these two schemes are compared in the unified energy management framework. The simulation results demonstrate that the energy management scheme without prediction is superior over the scheme with prediction. This work intends to rectify the misuse of DRL methods in the field of energy management.", "fno": "073400a013", "keywords": [ "Decision Making", "Deep Learning Artificial Intelligence", "Energy Management Systems", "Optimisation", "Power Engineering Computing", "Reinforcement Learning", "Supervised Learning", "Deep Reinforcement Learning Based Energy Management", "Model Free Optimization", "Decision Making Method", "Energy Internet", "DRL Based Energy Management Schemes", "Supervised Learning", "Recurrent Neural Networks", "Simulation", "Supervised Learning", "Decision Making", "Reinforcement Learning", "Predictive Models", "Internet", "Deep Reinforcement Learning", "Energy Management", "Prediction", "Recurrent Neural Network" ], "authors": [ { "affiliation": "Tsinghua University,Department of Automation,Beijing,China", "fullName": "Zhaoming Qin", "givenName": "Zhaoming", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "China Southern Power Grid,New Smart City High-quality Power Supply Joint Laboratory,Shenzhen,China", "fullName": "Huaying Zhang", "givenName": "Huaying", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "China Southern Power Grid,New Smart City High-quality Power Supply Joint Laboratory,Shenzhen,China", "fullName": "Yuzhou Zhao", "givenName": "Yuzhou", "surname": "Zhao", "__typename": "ArticleAuthorType" }, { "affiliation": "China Southern Power Grid,New Smart City High-quality Power Supply Joint Laboratory,Shenzhen,China", "fullName": "Hong Xie", "givenName": "Hong", "surname": "Xie", "__typename": "ArticleAuthorType" }, { "affiliation": "Tsinghua University,Beijing National Research Center for Information Science and Technology,Beijing,China", "fullName": "Junwei Cao", "givenName": "Junwei", "surname": "Cao", "__typename": "ArticleAuthorType" } ], "idPrefix": "icei", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-09-01T00:00:00", "pubType": "proceedings", "pages": "13-19", "year": "2021", "issn": null, "isbn": "978-1-6654-0734-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "073400a006", "articleId": "1APqcEYiZbO", "__typename": "AdjacentArticleType" }, "next": { "fno": "073400a020", "articleId": "1APqf1uJi2A", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/big-data/2021/3902/0/09671593", "title": "A Combinatorial Recommendation System Framework Based on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/big-data/2021/09671593/1A8h5r24GwU", "parentPublication": { "id": "proceedings/big-data/2021/3902/0", "title": "2021 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2022/1332/0/09687254", "title": "Deep Reinforcement Learning-based Context-Aware Redundancy Mitigation for Vehicular Collective Perception Services", "doi": null, "abstractUrl": "/proceedings-article/icoin/2022/09687254/1AtQ36H8s8M", "parentPublication": { "id": "proceedings/icoin/2022/1332/0", "title": "2022 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/ex/2022/02/09779600", "title": "Deep Reinforcement Learning for Quantitative Trading: Challenges and Opportunities", "doi": null, "abstractUrl": "/magazine/ex/2022/02/09779600/1DwUNhCagve", "parentPublication": { "id": "mags/ex", "title": "IEEE Intelligent Systems", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/issrew/2022/7679/0/767900a110", "title": "AgentFuzz: Fuzzing for Deep Reinforcement Learning Systems", "doi": null, "abstractUrl": "/proceedings-article/issrew/2022/767900a110/1JqDRjWqxyg", "parentPublication": { "id": "proceedings/issrew/2022/7679/0", "title": "2022 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2023/6268/0/10048957", "title": "Collaborative Computation Offloading Scheme Based on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/icoin/2023/10048957/1KYsQXogEYU", "parentPublication": { "id": "proceedings/icoin/2023/6268/0", "title": "2023 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2020/1331/0/09102924", "title": "State Representation Learning For Effective Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/icme/2020/09102924/1kwqPYZrQcg", "parentPublication": { "id": "proceedings/icme/2020/1331/0", "title": "2020 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icoin/2021/9101/0/09333903", "title": "On Performance of Deep Reinforcement Learning-based Listen-Before-Talk (LBT) Scheme", "doi": null, "abstractUrl": "/proceedings-article/icoin/2021/09333903/1qTrOnfS2DC", "parentPublication": { "id": "proceedings/icoin/2021/9101/0", "title": "2021 International Conference on Information Networking (ICOIN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09420254", "title": "Visual Analytics for RNN-Based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/2022/02/09536399", "title": "Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/ai/2022/02/09536399/1wREia2HBi8", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icnp/2021/4131/0/09651962", "title": "Multi-tier Collaborative Deep Reinforcement Learning for Non-terrestrial Network Empowered Vehicular Connections", "doi": null, "abstractUrl": "/proceedings-article/icnp/2021/09651962/1zHIV1Nzums", "parentPublication": { "id": "proceedings/icnp/2021/4131/0", "title": "2021 IEEE 29th International Conference on Network Protocols (ICNP)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1G6jVcSy9u8", "title": "2022 IEEE 15th International Conference on Cloud Computing (CLOUD)", "acronym": "cloud", "groupId": "1002911", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1G6ldC3jfOg", "doi": "10.1109/CLOUD55607.2022.00039", "title": "Applying Value-Based Deep Reinforcement Learning on KPI Time Series Anomaly Detection", "normalizedTitle": "Applying Value-Based Deep Reinforcement Learning on KPI Time Series Anomaly Detection", "abstract": "Time series anomaly detection has become more critical with the rapid development of network technology, especially in cloud monitoring. We focus on applying deep reinforcement learning (DRL) in this question. It is not feasible to simply use the traditional value-based DRL method because DRL cannot accurately capture important time information in time series. Most of the existing methods resort to the RNN mechanism, which in turn brings about the problem of sequence learning. In this paper, we conduct progressive research work on applying value-based DRL in time series anomaly detection. Firstly, because of the poor performance of traditional DQN, we propose an improved DQN-D method, whose performance is improved by 62% compared with DQN. Second, for RNN-based DRL, we propose a method based on improved experience replay pool (DRQN) to make up for the shortcomings of existing work and achieve excellent performance. Finally, we propose a Transformer-based DRL anomaly detection method to verify the effectiveness of the Transformer structure. Experimental results show that our DQN-D can obtain performance close to RNN-based DRL, DRQN and DTQN perform well on the dataset, and all methods are proven effective.", "abstracts": [ { "abstractType": "Regular", "content": "Time series anomaly detection has become more critical with the rapid development of network technology, especially in cloud monitoring. We focus on applying deep reinforcement learning (DRL) in this question. It is not feasible to simply use the traditional value-based DRL method because DRL cannot accurately capture important time information in time series. Most of the existing methods resort to the RNN mechanism, which in turn brings about the problem of sequence learning. In this paper, we conduct progressive research work on applying value-based DRL in time series anomaly detection. Firstly, because of the poor performance of traditional DQN, we propose an improved DQN-D method, whose performance is improved by 62% compared with DQN. Second, for RNN-based DRL, we propose a method based on improved experience replay pool (DRQN) to make up for the shortcomings of existing work and achieve excellent performance. Finally, we propose a Transformer-based DRL anomaly detection method to verify the effectiveness of the Transformer structure. Experimental results show that our DQN-D can obtain performance close to RNN-based DRL, DRQN and DTQN perform well on the dataset, and all methods are proven effective.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Time series anomaly detection has become more critical with the rapid development of network technology, especially in cloud monitoring. We focus on applying deep reinforcement learning (DRL) in this question. It is not feasible to simply use the traditional value-based DRL method because DRL cannot accurately capture important time information in time series. Most of the existing methods resort to the RNN mechanism, which in turn brings about the problem of sequence learning. In this paper, we conduct progressive research work on applying value-based DRL in time series anomaly detection. Firstly, because of the poor performance of traditional DQN, we propose an improved DQN-D method, whose performance is improved by 62% compared with DQN. Second, for RNN-based DRL, we propose a method based on improved experience replay pool (DRQN) to make up for the shortcomings of existing work and achieve excellent performance. Finally, we propose a Transformer-based DRL anomaly detection method to verify the effectiveness of the Transformer structure. Experimental results show that our DQN-D can obtain performance close to RNN-based DRL, DRQN and DTQN perform well on the dataset, and all methods are proven effective.", "fno": "813700a197", "keywords": [ "Learning Artificial Intelligence", "Recurrent Neural Nets", "Time Series", "Sequence Learning", "Progressive Research Work", "Traditional DQN", "Improved DQN D", "RNN Based DRL", "Improved Experience Replay Pool", "Transformer Based DRL Anomaly Detection Method", "Value Based Deep Reinforcement", "KPI Time Series Anomaly Detection", "Network Technology", "Cloud Monitoring", "Deep Reinforcement Learning", "Traditional Value Based DRL Method", "Important Time Information", "Existing Methods Resort", "RNN Mechanism", "Cloud Computing", "Time Series Analysis", "Reinforcement Learning", "Transformer Cores", "Benchmark Testing", "Transformers", "Task Analysis", "Time Series", "KPI", "Anomaly Detection", "Deep Reinforcement Learning", "DQN" ], "authors": [ { "affiliation": "Beihang University,School of Cyber Science and Technology,Beijing,China", "fullName": "Yu Zhang", "givenName": "Yu", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Beihang University,School of Cyber Science and Technology,Beijing,China", "fullName": "Tianbo Wang", "givenName": "Tianbo", "surname": "Wang", "__typename": "ArticleAuthorType" } ], "idPrefix": "cloud", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-07-01T00:00:00", "pubType": "proceedings", "pages": "197-202", "year": "2022", "issn": null, "isbn": "978-1-6654-8137-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "813700a191", "articleId": "1G6l8JqVp7O", "__typename": "AdjacentArticleType" }, "next": { "fno": "813700a203", "articleId": "1G6jZKRTu3S", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/scc/2022/8146/0/814600a114", "title": "A General KPI Anomaly Detection Using Attention Models", "doi": null, "abstractUrl": "/proceedings-article/scc/2022/814600a114/1G6lxpDBDDa", "parentPublication": { "id": "proceedings/scc/2022/8146/0", "title": "2022 IEEE International Conference on Services Computing (SCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/big-data/2022/8045/0/10021063", "title": "Decomposed Transformer with Frequency Attention for Multivariate Time Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/big-data/2022/10021063/1KfRWG876bS", "parentPublication": { "id": "proceedings/big-data/2022/8045/0", "title": "2022 IEEE International Conference on Big Data (Big Data)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0/199300a303", "title": "FedTADBench: Federated Time-series Anomaly Detection Benchmark", "doi": null, "abstractUrl": "/proceedings-article/hpcc-dss-smartcity-dependsys/2022/199300a303/1LSPvq3J3pu", "parentPublication": { "id": "proceedings/hpcc-dss-smartcity-dependsys/2022/1993/0", "title": "2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2022/9744/0/974400a048", "title": "A Dilated Transformer Network for Time Series Anomaly Detection", "doi": null, "abstractUrl": "/proceedings-article/ictai/2022/974400a048/1MrG3iJPeJG", "parentPublication": { "id": "proceedings/ictai/2022/9744/0", "title": "2022 IEEE 34th International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2019/2999/0/08969579", "title": "Intelligent Routing based on Deep Reinforcement Learning in Software-Defined Data-Center Networks", "doi": null, "abstractUrl": "/proceedings-article/iscc/2019/08969579/1h0JRqSJXeU", "parentPublication": { "id": "proceedings/iscc/2019/2999/0", "title": "2019 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2022/05/09219231", "title": "Deep Reinforcement Learning Based MAC Protocol for Underwater Acoustic Networks", "doi": null, "abstractUrl": "/journal/tm/2022/05/09219231/1nMMjnnpsNG", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaice/2020/9146/0/914600a330", "title": "..Dis-AE-LSTM: Generative Adversarial Networks for Anomaly Detection of Time Series Data", "doi": null, "abstractUrl": "/proceedings-article/icaice/2020/914600a330/1rCg88k5Oh2", "parentPublication": { "id": "proceedings/icaice/2020/9146/0", "title": "2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icdmw/2020/9012/0/901200a543", "title": "Anomaly Detection of Periodic Multivariate Time Series under High Acquisition Frequency Scene in IoT", "doi": null, "abstractUrl": "/proceedings-article/icdmw/2020/901200a543/1rgGn4JIlB6", "parentPublication": { "id": "proceedings/icdmw/2020/9012/0", "title": "2020 International Conference on Data Mining Workshops (ICDMW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09420254", "title": "Visual Analytics for RNN-Based Deep Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tg/2022/12/09420254/1tdUMGe1DAk", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tk/2023/04/09669010", "title": "Time Series Anomaly Detection With Adversarial Reconstruction Networks", "doi": null, "abstractUrl": "/journal/tk/2023/04/09669010/1zTfSYY68Za", "parentPublication": { "id": "trans/tk", "title": "IEEE Transactions on Knowledge & Data Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1tmhi3ly74c", "title": "2020 25th International Conference on Pattern Recognition (ICPR)", "acronym": "icpr", "groupId": "1000545", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1tmhDhqIHcc", "doi": "10.1109/ICPR48806.2021.9412011", "title": "Deep Reinforcement Learning for Autonomous Driving by Transferring Visual Features", "normalizedTitle": "Deep Reinforcement Learning for Autonomous Driving by Transferring Visual Features", "abstract": "Deep reinforcement learning (DRL) has achieved great success in processing vision-based driving tasks. However, the end-to-end training manner makes DRL agents suffer from overfitting training scenes. The agents easily fail to generalize to unseen environments. In this paper, we propose a deep reinforcement learning for autonomous driving by transferring visual features. We formulate the DRL training as a perception and control module and introduce adversarial training mechanism for autonomous driving. The perception module is able to extract invariant features between different domains through adversarial training. While the DRL agent can then be trained on the basis of low dimensional states. In this manner, the proposed approach enables trained agents to adapt to unseen environments by learning robust features invariant across various scenes. We evaluate the proposed approach by transferring visual features between different simulators. The experimental results demonstrate the driving policy trained in the source domain can be directly applied in the target domain, and achieve great efficient and effective performance for autonomous driving.", "abstracts": [ { "abstractType": "Regular", "content": "Deep reinforcement learning (DRL) has achieved great success in processing vision-based driving tasks. However, the end-to-end training manner makes DRL agents suffer from overfitting training scenes. The agents easily fail to generalize to unseen environments. In this paper, we propose a deep reinforcement learning for autonomous driving by transferring visual features. We formulate the DRL training as a perception and control module and introduce adversarial training mechanism for autonomous driving. The perception module is able to extract invariant features between different domains through adversarial training. While the DRL agent can then be trained on the basis of low dimensional states. In this manner, the proposed approach enables trained agents to adapt to unseen environments by learning robust features invariant across various scenes. We evaluate the proposed approach by transferring visual features between different simulators. The experimental results demonstrate the driving policy trained in the source domain can be directly applied in the target domain, and achieve great efficient and effective performance for autonomous driving.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Deep reinforcement learning (DRL) has achieved great success in processing vision-based driving tasks. However, the end-to-end training manner makes DRL agents suffer from overfitting training scenes. The agents easily fail to generalize to unseen environments. In this paper, we propose a deep reinforcement learning for autonomous driving by transferring visual features. We formulate the DRL training as a perception and control module and introduce adversarial training mechanism for autonomous driving. The perception module is able to extract invariant features between different domains through adversarial training. While the DRL agent can then be trained on the basis of low dimensional states. In this manner, the proposed approach enables trained agents to adapt to unseen environments by learning robust features invariant across various scenes. We evaluate the proposed approach by transferring visual features between different simulators. The experimental results demonstrate the driving policy trained in the source domain can be directly applied in the target domain, and achieve great efficient and effective performance for autonomous driving.", "fno": "09412011", "keywords": [ "Computer Vision", "Driver Information Systems", "Feature Extraction", "Learning Artificial Intelligence", "Deep Reinforcement Learning", "Autonomous Driving", "Visual Features", "Control Module", "Adversarial Training Mechanism", "Invariant Features", "DRL Agent", "Unseen Environments", "Robust Invariant Features", "Driving Policy", "Training Scenes", "Training", "Visualization", "Reinforcement Learning", "Feature Extraction", "Pattern Recognition", "Task Analysis", "Autonomous Vehicles" ], "authors": [ { "affiliation": "School of Electronics and Information, Northwestern Polytechnical University,Xi'an,China", "fullName": "Hongli Zhou", "givenName": "Hongli", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "CNPC logging Co., Ltd,China", "fullName": "Xiaolei Chen", "givenName": "Xiaolei", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electronics and Information, Northwestern Polytechnical University,Xi'an,China", "fullName": "Guanwen Zhang", "givenName": "Guanwen", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Electronics and Information, Northwestern Polytechnical University,Xi'an,China", "fullName": "Wei Zhou", "givenName": "Wei", "surname": "Zhou", "__typename": "ArticleAuthorType" } ], "idPrefix": "icpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-01-01T00:00:00", "pubType": "proceedings", "pages": "4436-4441", "year": "2021", "issn": "1051-4651", "isbn": "978-1-7281-8808-9", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09412431", "articleId": "1tmj7Arc23K", "__typename": "AdjacentArticleType" }, "next": { "fno": "09412674", "articleId": "1tmhT7OZSPS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/isorc/2018/5847/0/584701a130", "title": "Intrusion-Tolerant Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/isorc/2018/584701a130/12OmNARAndt", "parentPublication": { "id": "proceedings/isorc/2018/5847/0", "title": "2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sefaias/2018/5739/0/573901a016", "title": "Distributed Deep Reinforcement Learning on the Cloud for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/sefaias/2018/573901a016/13l5OcTKVzF", "parentPublication": { "id": "proceedings/sefaias/2018/5739/0", "title": "2018 IEEE/ACM 1st International Workshop on Software Engineering for AI in Autonomous Systems (SEFAIAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ica/2018/8180/0/08460004", "title": "Autonomous Agents in Snake Game via Deep Reinforcement Learning", "doi": null, "abstractUrl": "/proceedings-article/ica/2018/08460004/13xI8ALy0Ec", "parentPublication": { "id": "proceedings/ica/2018/8180/0", "title": "2018 IEEE International Conference on Agents (ICA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2019/1975/0/197500b496", "title": "MultiNet: Multi-Modal Multi-Task Learning for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/wacv/2019/197500b496/18j8KLbKU5a", "parentPublication": { "id": "proceedings/wacv/2019/1975/0", "title": "2019 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200p5202", "title": "End-to-End Urban Driving by Imitating a Reinforcement Learning Coach", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5202/1BmJNNKjUxW", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2023/03/09829243", "title": "MetaDrive: Composing Diverse Driving Scenarios for Generalizable Reinforcement Learning", "doi": null, "abstractUrl": "/journal/tp/2023/03/09829243/1EYxn8YfgKk", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900c531", "title": "Importance is in your attention: agent importance prediction for autonomous driving", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900c531/1G57ef14XsY", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/mu/2019/03/08817317", "title": "Multimedia for Autonomous Driving", "doi": null, "abstractUrl": "/magazine/mu/2019/03/08817317/1cPWP7sFJsI", "parentPublication": { "id": "mags/mu", "title": "IEEE MultiMedia", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2019/2506/0/250600b326", "title": "Attention-Based Hierarchical Deep Reinforcement Learning for Lane Change Behaviors in Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2019/250600b326/1iTvsrmc6Eo", "parentPublication": { "id": "proceedings/cvprw/2019/2506/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacvw/2021/1967/0/196700a144", "title": "Using Semantic Information to Improve Generalization of Reinforcement Learning Policies for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2021/196700a144/1sZ3q6KILew", "parentPublication": { "id": "proceedings/wacvw/2021/1967/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13bd1eJgoia", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13bd1gCd7Sz", "doi": "10.1109/VR.2018.8446429", "title": "Impact of Alignment Point Distance Distribution on SPAAM Calibration of Optical See-Through Head-Mounted Displays", "normalizedTitle": "Impact of Alignment Point Distance Distribution on SPAAM Calibration of Optical See-Through Head-Mounted Displays", "abstract": "The use of Optical See-Through Head-Mounted Displays (OST-HMDs) for presenting Augmented Reality experiences has become more common, due to the increasing availability of lower cost head-worn device options. Despite this growth, commercially available OST hardware remains devoid of the integrated eye-tracking cameras necessary for automatically calibrating user-specific view parameters, leaving manual calibration methods as the most consistently viable option across display types. The Single Point Active Alignment Method (SPAAM) is currently the most-cited manual calibration technique, due to the relaxation of user constraints with respect to allowable motion during the calibration process. This work presents the first formal study directly investigating the effects that alignment point distribution imposes on SPAAM calibration accuracy and precision. A user experiment, employing a single expert user, is presented, in which SPAAM calibrations are performed under each of five conditions. Four of the conditions cross alignment distance (arm length, room scale) with user pose (sitting, standing). The fifth condition is a control condition, in which the user is replaced with a rigidly mounted camera; the control condition removes the effect of noise from uncontrollable postural sway. The final experimental results show no significant impact on calibration due to user pose (sitting, standing). The control condition also did not differ from the user produced calibration results, suggesting that posture sway was not a significant factor. However, both the user and control conditions show significant improvement using arm's length alignment points over room scale alignments, with an order of magnitude difference in eye location estimate error between conditions.", "abstracts": [ { "abstractType": "Regular", "content": "The use of Optical See-Through Head-Mounted Displays (OST-HMDs) for presenting Augmented Reality experiences has become more common, due to the increasing availability of lower cost head-worn device options. Despite this growth, commercially available OST hardware remains devoid of the integrated eye-tracking cameras necessary for automatically calibrating user-specific view parameters, leaving manual calibration methods as the most consistently viable option across display types. The Single Point Active Alignment Method (SPAAM) is currently the most-cited manual calibration technique, due to the relaxation of user constraints with respect to allowable motion during the calibration process. This work presents the first formal study directly investigating the effects that alignment point distribution imposes on SPAAM calibration accuracy and precision. A user experiment, employing a single expert user, is presented, in which SPAAM calibrations are performed under each of five conditions. Four of the conditions cross alignment distance (arm length, room scale) with user pose (sitting, standing). The fifth condition is a control condition, in which the user is replaced with a rigidly mounted camera; the control condition removes the effect of noise from uncontrollable postural sway. The final experimental results show no significant impact on calibration due to user pose (sitting, standing). The control condition also did not differ from the user produced calibration results, suggesting that posture sway was not a significant factor. However, both the user and control conditions show significant improvement using arm's length alignment points over room scale alignments, with an order of magnitude difference in eye location estimate error between conditions.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The use of Optical See-Through Head-Mounted Displays (OST-HMDs) for presenting Augmented Reality experiences has become more common, due to the increasing availability of lower cost head-worn device options. Despite this growth, commercially available OST hardware remains devoid of the integrated eye-tracking cameras necessary for automatically calibrating user-specific view parameters, leaving manual calibration methods as the most consistently viable option across display types. The Single Point Active Alignment Method (SPAAM) is currently the most-cited manual calibration technique, due to the relaxation of user constraints with respect to allowable motion during the calibration process. This work presents the first formal study directly investigating the effects that alignment point distribution imposes on SPAAM calibration accuracy and precision. A user experiment, employing a single expert user, is presented, in which SPAAM calibrations are performed under each of five conditions. Four of the conditions cross alignment distance (arm length, room scale) with user pose (sitting, standing). The fifth condition is a control condition, in which the user is replaced with a rigidly mounted camera; the control condition removes the effect of noise from uncontrollable postural sway. The final experimental results show no significant impact on calibration due to user pose (sitting, standing). The control condition also did not differ from the user produced calibration results, suggesting that posture sway was not a significant factor. However, both the user and control conditions show significant improvement using arm's length alignment points over room scale alignments, with an order of magnitude difference in eye location estimate error between conditions.", "fno": "08446429", "keywords": [ "Augmented Reality", "Calibration", "Gaze Tracking", "Helmet Mounted Displays", "SPAAM Calibration", "Rigidly Mounted Camera", "Alignment Point Distance Distribution", "Lower Cost Head Worn Device Options", "Integrated Eye Tracking Cameras", "Optical See Through Head Mounted Displays", "Single Point Active Alignment Method", "Augmented Reality", "User Specific View Parameters", "OST HMD", "Calibration", "Cameras", "Optical Sensors", "Head Mounted Displays", "Three Dimensional Displays", "Augmented Reality", "Manuals", "Augmented Reality", "Optical See Through Head Mounted Display", "Single Point Active Alignment Method SPAAM" ], "authors": [ { "affiliation": "Mississippi State University, Marxent Labs LLC", "fullName": "Kenneth R. Moser", "givenName": "Kenneth R.", "surname": "Moser", "__typename": "ArticleAuthorType" }, { "affiliation": "Mississippi State University, Marxent Labs LLC", "fullName": "Mohammed Safayet Arefin", "givenName": "Mohammed Safayet", "surname": "Arefin", "__typename": "ArticleAuthorType" }, { "affiliation": "Mississippi State University, Marxent Labs LLC", "fullName": "J. Edward Swan", "givenName": "J.", "surname": "Edward Swan", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "641-642", "year": "2018", "issn": null, "isbn": "978-1-5386-3365-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08446439", "articleId": "13bd1ftOBCH", "__typename": "AdjacentArticleType" }, "next": { "fno": "08446269", "articleId": "13bd1eTtWYf", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2016/0836/0/07504693", "title": "A calibration method for optical see-through head-mounted displays with a depth camera", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504693/12OmNAnMuMd", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948513", "title": "Google glass, The META and Co. How to calibrate optical see-through head mounted displays", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948513/12OmNB8TUim", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2014/3624/0/06798846", "title": "Interaction-free calibration for optical see-through head-mounted displays based on 3D Eye localization", "doi": null, "abstractUrl": "/proceedings-article/3dui/2014/06798846/12OmNCdBDWL", "parentPublication": { "id": "proceedings/3dui/2014/3624/0", "title": "2014 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223450", "title": "Evaluating optical see-through head-mounted display calibration via frustum visualization", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223450/12OmNrAv3Ap", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836487", "title": "Reduction of Interaction Space in Single Point Active Alignment Method for Optical See-Through Head-Mounted Display Calibration", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836487/12OmNyRg4AG", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948424", "title": "Performance and sensitivity analysis of INDICA: INteraction-Free DIsplay CAlibration for Optical See-Through Head-Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948424/12OmNyYm2oO", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892268", "title": "RIDE: Region-induced data enhancement method for dynamic calibration of optical see-through head-mounted displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892268/12OmNyjtNG2", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2015/04/07021939", "title": "Subjective Evaluation of a Semi-Automatic Optical See-Through Head-Mounted Display Calibration Technique", "doi": null, "abstractUrl": "/journal/tg/2015/04/07021939/13rRUwInvyB", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2018/7459/0/745900a021", "title": "Impact of Alignment Point Distance and Posture on SPAAM Calibration of Optical See-Through Head-Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/ismar/2018/745900a021/17D45WaTkli", "parentPublication": { "id": "proceedings/ismar/2018/7459/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090625", "title": "Automatic Calibration of Commercial Optical See-Through Head-Mounted Displays for Medical Applications", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090625/1jIxwp2g0VO", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNrAMEOa", "title": "2006 IEEE International Conference on Video and Signal Based Surveillance", "acronym": "avss", "groupId": "1001307", "volume": "0", "displayVolume": "0", "year": "2006", "__typename": "ProceedingType" }, "article": { "id": "12OmNxG1yPR", "doi": "10.1109/AVSS.2006.1", "title": "\"Hybrid Cone-Cylinder\" Codebook Model for Foreground Detection with Shadow and Highlight Suppression", "normalizedTitle": "\"Hybrid Cone-Cylinder\" Codebook Model for Foreground Detection with Shadow and Highlight Suppression", "abstract": "In the interest of 24-7 long-term surveillance, a truly robust, adaptive, and fast background-foreground segmentation technique is required. This paper deals with the especially difficult but extremely common problems of moving backgrounds, shadows, highlights, and illumination changes. To produce reliable foreground extraction in the face of these problems, the best practical aspects of two algorithms, Codebook Segmentation[6] and HSV Shadow Suppression[2] are combined. The main contribution of this paper is the introduction of the \"Hybrid Cone-Cylinder\" Codebook (HC3) model. Results show superior speed and quantitatively better performance in many different conditions and environments. Applications include people-tracking with Omni-directional cameras and vehicle-counting with rectilinear cameras.", "abstracts": [ { "abstractType": "Regular", "content": "In the interest of 24-7 long-term surveillance, a truly robust, adaptive, and fast background-foreground segmentation technique is required. This paper deals with the especially difficult but extremely common problems of moving backgrounds, shadows, highlights, and illumination changes. To produce reliable foreground extraction in the face of these problems, the best practical aspects of two algorithms, Codebook Segmentation[6] and HSV Shadow Suppression[2] are combined. The main contribution of this paper is the introduction of the \"Hybrid Cone-Cylinder\" Codebook (HC3) model. Results show superior speed and quantitatively better performance in many different conditions and environments. Applications include people-tracking with Omni-directional cameras and vehicle-counting with rectilinear cameras.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In the interest of 24-7 long-term surveillance, a truly robust, adaptive, and fast background-foreground segmentation technique is required. This paper deals with the especially difficult but extremely common problems of moving backgrounds, shadows, highlights, and illumination changes. To produce reliable foreground extraction in the face of these problems, the best practical aspects of two algorithms, Codebook Segmentation[6] and HSV Shadow Suppression[2] are combined. The main contribution of this paper is the introduction of the \"Hybrid Cone-Cylinder\" Codebook (HC3) model. Results show superior speed and quantitatively better performance in many different conditions and environments. Applications include people-tracking with Omni-directional cameras and vehicle-counting with rectilinear cameras.", "fno": "26880019", "keywords": [], "authors": [ { "affiliation": "University of California, San Diego, USA", "fullName": "Anup Doshi", "givenName": "Anup", "surname": "Doshi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of California, San Diego, USA", "fullName": "Mohan Trivedi", "givenName": "Mohan", "surname": "Trivedi", "__typename": "ArticleAuthorType" } ], "idPrefix": "avss", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2006-11-01T00:00:00", "pubType": "proceedings", "pages": "19", "year": "2006", "issn": null, "isbn": "0-7695-2688-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "26880018", "articleId": "12OmNxETamx", "__typename": "AdjacentArticleType" }, "next": { "fno": "26880020", "articleId": "12OmNwDACrC", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/sitis/2014/7978/0/7978a119", "title": "Foreground-Background Segmentation Based on Codebook and Edge Detector", "doi": null, "abstractUrl": "/proceedings-article/sitis/2014/7978a119/12OmNAJ4piS", "parentPublication": { "id": "proceedings/sitis/2014/7978/0", "title": "2014 Tenth International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/avss/2009/3718/0/3718a454", "title": "Real Time Foreground-Background Segmentation Using a Modified Codebook Model", "doi": null, "abstractUrl": "/proceedings-article/avss/2009/3718a454/12OmNAWpytL", "parentPublication": { "id": "proceedings/avss/2009/3718/0", "title": "2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icig/2009/3883/0/3883a288", "title": "An Effective Method for Foreground Segmentation of Video", "doi": null, "abstractUrl": "/proceedings-article/icig/2009/3883a288/12OmNBCHMMb", "parentPublication": { "id": "proceedings/icig/2009/3883/0", "title": "Image and Graphics, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cisp/2008/3119/4/3119d239", "title": "Segmentation of Moving Foreground Objects Using Codebook and Local Binary Patterns", "doi": null, "abstractUrl": "/proceedings-article/cisp/2008/3119d239/12OmNwbukfm", "parentPublication": { "id": "proceedings/cisp/2008/3119/4", "title": "Image and Signal Processing, Congress on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/fcst/2010/7779/0/05575857", "title": "Color Comparison in Codebook Model for Moving Objects Detection", "doi": null, "abstractUrl": "/proceedings-article/fcst/2010/05575857/12OmNxETahI", "parentPublication": { "id": "proceedings/fcst/2010/7779/0", "title": "2010 Fifth International Conference on Frontier of Computer Science and Technology (FCST 2010)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/1/252110492", "title": "Video Foreground Segmentation Based on Sequential Feature Clustering", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/252110492/12OmNy68EBD", "parentPublication": { "id": "proceedings/icpr/2006/2521/1", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995394", "title": "Foreground segmentation of live videos using locally competing 1SVMs", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995394/12OmNyQ7FIZ", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sitis/2015/9721/0/9721a110", "title": "An Adaptive Codebook Model for Change Detection with Dynamic Background", "doi": null, "abstractUrl": "/proceedings-article/sitis/2015/9721a110/12OmNzTH0Rc", "parentPublication": { "id": "proceedings/sitis/2015/9721/0", "title": "2015 11th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/percom/2022/1643/0/09762385", "title": "ActiSight: Wearer Foreground Extraction Using a Practical RGB-Thermal Wearable", "doi": null, "abstractUrl": "/proceedings-article/percom/2022/09762385/1CUO5BLJX7W", "parentPublication": { "id": "proceedings/percom/2022/1643/0", "title": "2022 IEEE International Conference on Pervasive Computing and Communications (PerCom)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2006/2521/4/01699780", "title": "Better Foreground Segmentation for Static Cameras via New Energy Form and Dynamic Graph-cut", "doi": null, "abstractUrl": "/proceedings-article/icpr/2006/01699780/1i5nhUkr2Ew", "parentPublication": { "id": "proceedings/icpr/2006/2521/4", "title": "Pattern Recognition, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNs4S8vM", "title": "Computer Technology and Development, International Conference on", "acronym": "icctd", "groupId": "1003009", "volume": "2", "displayVolume": "2", "year": "2009", "__typename": "ProceedingType" }, "article": { "id": "12OmNzsJ7p0", "doi": "10.1109/ICCTD.2009.67", "title": "Simultaneous Detection and Tracking in Airborne Video", "normalizedTitle": "Simultaneous Detection and Tracking in Airborne Video", "abstract": "Most surveillance systems adopt the paradigm that first detect and then track. However, it is hard to determine the most suitable threshold for detection since the surveillance view is unpredictable for an airborne platform. In contrast to the mainstream approach, we propose a novel approach allowing simultaneous detection and tracking. In the proposed scheme, the detection and tracking are not independent since tracking result is utilized to improve detection performance. First, frame difference is implemented to detect targets, which are called “coarse targets” here. Second, tracking is achieved by Markov Chain Mote Carlo (MCMC) particle filter. In this stage, “coarse targets” are refined. Thus, confirmed targets are categorized into four modes: enter, exit, add and delete. Here, “add” corresponds to targets which are not detected when it entered but detected in the current frame and “delete” corresponds to false alarm. Then, the number of “add” and “delete” targets is fed back to the detector to update the detection threshold by a function. Finally, we demonstrate experiments and provide evaluations of performance to show that false alarm rate and undetected rate in our approach are both 2 ~ 3 times lower than an independent detection and tracking scheme with a fixed detection threshold. Further more, we show that the optimal threshold is unrelated to the initial value. This indicates the feasibility of our method, which is essential in an airborne system.", "abstracts": [ { "abstractType": "Regular", "content": "Most surveillance systems adopt the paradigm that first detect and then track. However, it is hard to determine the most suitable threshold for detection since the surveillance view is unpredictable for an airborne platform. In contrast to the mainstream approach, we propose a novel approach allowing simultaneous detection and tracking. In the proposed scheme, the detection and tracking are not independent since tracking result is utilized to improve detection performance. First, frame difference is implemented to detect targets, which are called “coarse targets” here. Second, tracking is achieved by Markov Chain Mote Carlo (MCMC) particle filter. In this stage, “coarse targets” are refined. Thus, confirmed targets are categorized into four modes: enter, exit, add and delete. Here, “add” corresponds to targets which are not detected when it entered but detected in the current frame and “delete” corresponds to false alarm. Then, the number of “add” and “delete” targets is fed back to the detector to update the detection threshold by a function. Finally, we demonstrate experiments and provide evaluations of performance to show that false alarm rate and undetected rate in our approach are both 2 ~ 3 times lower than an independent detection and tracking scheme with a fixed detection threshold. Further more, we show that the optimal threshold is unrelated to the initial value. This indicates the feasibility of our method, which is essential in an airborne system.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Most surveillance systems adopt the paradigm that first detect and then track. However, it is hard to determine the most suitable threshold for detection since the surveillance view is unpredictable for an airborne platform. In contrast to the mainstream approach, we propose a novel approach allowing simultaneous detection and tracking. In the proposed scheme, the detection and tracking are not independent since tracking result is utilized to improve detection performance. First, frame difference is implemented to detect targets, which are called “coarse targets” here. Second, tracking is achieved by Markov Chain Mote Carlo (MCMC) particle filter. In this stage, “coarse targets” are refined. Thus, confirmed targets are categorized into four modes: enter, exit, add and delete. Here, “add” corresponds to targets which are not detected when it entered but detected in the current frame and “delete” corresponds to false alarm. Then, the number of “add” and “delete” targets is fed back to the detector to update the detection threshold by a function. Finally, we demonstrate experiments and provide evaluations of performance to show that false alarm rate and undetected rate in our approach are both 2 ~ 3 times lower than an independent detection and tracking scheme with a fixed detection threshold. Further more, we show that the optimal threshold is unrelated to the initial value. This indicates the feasibility of our method, which is essential in an airborne system.", "fno": "3892b320", "keywords": [ "Detection", "Tacking", "Markov Chain Monte Carlo", "Video Processing" ], "authors": [ { "affiliation": null, "fullName": "Yan Huang", "givenName": "Yan", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Xiling Luo", "givenName": "Xiling", "surname": "Luo", "__typename": "ArticleAuthorType" } ], "idPrefix": "icctd", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2009-11-01T00:00:00", "pubType": "proceedings", "pages": "320-324", "year": "2009", "issn": null, "isbn": "978-0-7695-3892-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "3892b315", "articleId": "12OmNxwWoFu", "__typename": "AdjacentArticleType" }, "next": { "fno": "3892b327", "articleId": "12OmNAolH2C", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/avss/2011/0844/0/06027317", "title": "Multiple view, multiple target tracking with principal axis-based data association", "doi": null, "abstractUrl": "/proceedings-article/avss/2011/06027317/12OmNB7cjhm", "parentPublication": { "id": "proceedings/avss/2011/0844/0", "title": "2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2006/2646/0/26460137", "title": "Robust Video-Based Surveillance by Integrating Target Detection with Tracking", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2006/26460137/12OmNqAU6E7", "parentPublication": { "id": "proceedings/cvprw/2006/2646/0", "title": "2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cicsyn/2011/4482/0/4482a253", "title": "Adaptive Tracking of Overlapping Vehicles Via Markov Chain Monte Carlo with CUSUM Path Plot Algorithm", "doi": null, "abstractUrl": "/proceedings-article/cicsyn/2011/4482a253/12OmNqFJhVv", "parentPublication": { "id": "proceedings/cicsyn/2011/4482/0", "title": "Computational Intelligence, Communication Systems and Networks, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccsee/2012/4647/3/4647c477", "title": "Research on Detection and Tracking of Moving Target in Intelligent Video Surveillance", "doi": null, "abstractUrl": "/proceedings-article/iccsee/2012/4647c477/12OmNs0C9LC", "parentPublication": { "id": "proceedings/iccsee/2012/4647/3", "title": "Computer Science and Electronics Engineering, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/itcs/2009/3688/2/3688b053", "title": "Pedestrian Detection and Tracking Algorithm Design in Transportation Video Monitoring System", "doi": null, "abstractUrl": "/proceedings-article/itcs/2009/3688b053/12OmNwIHooV", "parentPublication": { "id": "proceedings/itcs/2009/3688/2", "title": "Information Technology and Computer Science, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicta/2009/3804/1/3804a586", "title": "Detection and Tracking of Multiple Targets Based on Video Processing", "doi": null, "abstractUrl": "/proceedings-article/icicta/2009/3804a586/12OmNxEBzma", "parentPublication": { "id": "proceedings/icicta/2009/3804/1", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2011/0394/0/05995667", "title": "Stable multi-target tracking in real-time surveillance video", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2011/05995667/12OmNxFaLkR", "parentPublication": { "id": "proceedings/cvpr/2011/0394/0", "title": "CVPR 2011", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iacsit-sc/2009/3653/0/3653a571", "title": "Efficient Multi-target Human Motion Tracking", "doi": null, "abstractUrl": "/proceedings-article/iacsit-sc/2009/3653a571/12OmNxbW4OM", "parentPublication": { "id": "proceedings/iacsit-sc/2009/3653/0", "title": "Computer Science and Information Technology, International Association of", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vspets/2005/9424/0/01570896", "title": "Integrating component cues for human pose tracking", "doi": null, "abstractUrl": "/proceedings-article/vspets/2005/01570896/12OmNylKAQb", "parentPublication": { "id": "proceedings/vspets/2005/9424/0", "title": "Proceedings. 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2005/11/i1805", "title": "MCMC-Based Particle Filtering for Tracking a Variable Number of Interacting Targets", "doi": null, "abstractUrl": "/journal/tp/2005/11/i1805/13rRUxlgxUp", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmEtXCZ02I", "doi": "10.1109/ICCV48922.2021.01032", "title": "Exploring Simple 3D Multi-Object Tracking for Autonomous Driving", "normalizedTitle": "Exploring Simple 3D Multi-Object Tracking for Autonomous Driving", "abstract": "3D multi-object tracking in LiDAR point clouds is a key ingredient for self-driving vehicles. Existing methods are predominantly based on the tracking-by-detection pipeline and inevitably require a heuristic matching step for the detection association. In this paper, we present SimTrack to simplify the hand-crafted tracking paradigm by proposing an end-to-end trainable model for joint detection and tracking from raw point clouds. Our key design is to predict the first-appear location of each object in a given snippet to get the tracking identity and then update the location based on motion estimation. In the inference, the heuristic matching step can be completely waived by a simple read-off operation. SimTrack integrates the tracked object association, newborn object detection, and dead track killing in a single unified model. We conduct extensive evaluations on two large-scale datasets: nuScenes and Waymo Open Dataset. Experimental results reveal that our simple approach compares favorably with the state-of-the-art methods while ruling out the heuristic matching rules.", "abstracts": [ { "abstractType": "Regular", "content": "3D multi-object tracking in LiDAR point clouds is a key ingredient for self-driving vehicles. Existing methods are predominantly based on the tracking-by-detection pipeline and inevitably require a heuristic matching step for the detection association. In this paper, we present SimTrack to simplify the hand-crafted tracking paradigm by proposing an end-to-end trainable model for joint detection and tracking from raw point clouds. Our key design is to predict the first-appear location of each object in a given snippet to get the tracking identity and then update the location based on motion estimation. In the inference, the heuristic matching step can be completely waived by a simple read-off operation. SimTrack integrates the tracked object association, newborn object detection, and dead track killing in a single unified model. We conduct extensive evaluations on two large-scale datasets: nuScenes and Waymo Open Dataset. Experimental results reveal that our simple approach compares favorably with the state-of-the-art methods while ruling out the heuristic matching rules.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "3D multi-object tracking in LiDAR point clouds is a key ingredient for self-driving vehicles. Existing methods are predominantly based on the tracking-by-detection pipeline and inevitably require a heuristic matching step for the detection association. In this paper, we present SimTrack to simplify the hand-crafted tracking paradigm by proposing an end-to-end trainable model for joint detection and tracking from raw point clouds. Our key design is to predict the first-appear location of each object in a given snippet to get the tracking identity and then update the location based on motion estimation. In the inference, the heuristic matching step can be completely waived by a simple read-off operation. SimTrack integrates the tracked object association, newborn object detection, and dead track killing in a single unified model. We conduct extensive evaluations on two large-scale datasets: nuScenes and Waymo Open Dataset. Experimental results reveal that our simple approach compares favorably with the state-of-the-art methods while ruling out the heuristic matching rules.", "fno": "281200k0468", "keywords": [ "Point Cloud Compression", "Solid Modeling", "Pediatrics", "Three Dimensional Displays", "Laser Radar", "Tracking", "Motion Estimation" ], "authors": [ { "affiliation": "QCraft", "fullName": "Chenxu Luo", "givenName": "Chenxu", "surname": "Luo", "__typename": "ArticleAuthorType" }, { "affiliation": "QCraft", "fullName": "Xiaodong Yang", "givenName": "Xiaodong", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "Johns Hopkins University", "fullName": "Alan Yuille", "givenName": "Alan", "surname": "Yuille", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "10468-10477", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200k0458", "articleId": "1BmIlciDLLW", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200k0478", "articleId": "1BmGcakeRj2", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200n3179", "title": "Box-Aware Feature Enhancement for Single Object Tracking on Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200n3179/1BmKWVpEoc8", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/spw/2022/9643/0/964300a229", "title": "Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception", "doi": null, "abstractUrl": "/proceedings-article/spw/2022/964300a229/1FiwUMnWnkI", "parentPublication": { "id": "proceedings/spw/2022/9643/0", "title": "2022 IEEE Security and Privacy Workshops (SPW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900e487", "title": "Anomaly Detection in Autonomous Driving: A Survey", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900e487/1G566OQzi5q", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859693", "title": "Cenet: Toward Concise and Efficient Lidar Semantic Segmentation for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859693/1G9Ek0QiHvy", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600j881", "title": "Image-to-Lidar Self-Supervised Distillation for Autonomous Driving Data", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600j881/1H0KyVm6rJu", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600i101", "title": "Beyond 3D Siamese Tracking: A Motion-Centric Paradigm for 3D Single Object Tracking in Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600i101/1H1mWcwW4jC", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mcsoc/2022/6499/0/649900a105", "title": "Radar and Camera Fusion for Object Forecasting in Driving Scenarios", "doi": null, "abstractUrl": "/proceedings-article/mcsoc/2022/649900a105/1JZ3aP3axRC", "parentPublication": { "id": "proceedings/mcsoc/2022/6499/0", "title": "2022 IEEE 15th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/ai/5555/01/10018876", "title": "Accelerating Point-Voxel Representation of 3D Object Detection for Automatic Driving", "doi": null, "abstractUrl": "/journal/ai/5555/01/10018876/1K0DHbaOuYg", "parentPublication": { "id": "trans/ai", "title": "IEEE Transactions on Artificial Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2022/5670/0/567000a322", "title": "A Flexible Multi-view Multi-modal Imaging System for Outdoor Scenes", "doi": null, "abstractUrl": "/proceedings-article/3dv/2022/567000a322/1KYsqSSG5tm", "parentPublication": { "id": "proceedings/3dv/2022/5670/0", "title": "2022 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2020/7168/0/716800l1618", "title": "nuScenes: A Multimodal Dataset for Autonomous Driving", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2020/716800l1618/1m3nGHQO3HW", "parentPublication": { "id": "proceedings/cvpr/2020/7168/0", "title": "2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1BmEezmpGrm", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "acronym": "iccv", "groupId": "1000149", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1BmHryRsl56", "doi": "10.1109/ICCV48922.2021.01296", "title": "CAPTRA: CAtegory-level Pose Tracking for Rigid and Articulated Objects from Point Clouds", "normalizedTitle": "CAPTRA: CAtegory-level Pose Tracking for Rigid and Articulated Objects from Point Clouds", "abstract": "In this work, we tackle the problem of category-level online pose tracking of objects from point cloud sequences. For the first time, we propose a unified framework that can handle 9DoF pose tracking for novel rigid object instances as well as per-part pose tracking for articulated objects from known categories. Here the 9DoF pose, comprising 6D pose and 3D size, is equivalent to a 3D amodal bounding box representation with free 6D pose. Given the depth point cloud at the current frame and the estimated pose from the last frame, our novel end-to-end pipeline learns to accurately update the pose. Our pipeline is composed of three modules: 1) a pose canonicalization module that normalizes the pose of the input depth point cloud; 2) RotationNet, a module that directly regresses small interframe delta rotations; and 3) CoordinateNet, a module that predicts the normalized coordinates and segmentation, enabling analytical computation of the 3D size and translation. Leveraging the small pose regime in the pose-canonicalized point clouds, our method integrates the best of both worlds by combining dense coordinate prediction and direct rotation regression, thus yielding an end-to-end differentiable pipeline optimized for 9DoF pose accuracy (without using non-differentiable RANSAC). Our extensive experiments demonstrate that our method achieves new state-of-the-art performance on category-level rigid object pose (NOCSREAL275 [29]) and articulated object pose benchmarks (SAPIEN [34], BMVC [18]) at the fastest FPS &#x223C; 12.", "abstracts": [ { "abstractType": "Regular", "content": "In this work, we tackle the problem of category-level online pose tracking of objects from point cloud sequences. For the first time, we propose a unified framework that can handle 9DoF pose tracking for novel rigid object instances as well as per-part pose tracking for articulated objects from known categories. Here the 9DoF pose, comprising 6D pose and 3D size, is equivalent to a 3D amodal bounding box representation with free 6D pose. Given the depth point cloud at the current frame and the estimated pose from the last frame, our novel end-to-end pipeline learns to accurately update the pose. Our pipeline is composed of three modules: 1) a pose canonicalization module that normalizes the pose of the input depth point cloud; 2) RotationNet, a module that directly regresses small interframe delta rotations; and 3) CoordinateNet, a module that predicts the normalized coordinates and segmentation, enabling analytical computation of the 3D size and translation. Leveraging the small pose regime in the pose-canonicalized point clouds, our method integrates the best of both worlds by combining dense coordinate prediction and direct rotation regression, thus yielding an end-to-end differentiable pipeline optimized for 9DoF pose accuracy (without using non-differentiable RANSAC). Our extensive experiments demonstrate that our method achieves new state-of-the-art performance on category-level rigid object pose (NOCSREAL275 [29]) and articulated object pose benchmarks (SAPIEN [34], BMVC [18]) at the fastest FPS &#x223C; 12.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In this work, we tackle the problem of category-level online pose tracking of objects from point cloud sequences. For the first time, we propose a unified framework that can handle 9DoF pose tracking for novel rigid object instances as well as per-part pose tracking for articulated objects from known categories. Here the 9DoF pose, comprising 6D pose and 3D size, is equivalent to a 3D amodal bounding box representation with free 6D pose. Given the depth point cloud at the current frame and the estimated pose from the last frame, our novel end-to-end pipeline learns to accurately update the pose. Our pipeline is composed of three modules: 1) a pose canonicalization module that normalizes the pose of the input depth point cloud; 2) RotationNet, a module that directly regresses small interframe delta rotations; and 3) CoordinateNet, a module that predicts the normalized coordinates and segmentation, enabling analytical computation of the 3D size and translation. Leveraging the small pose regime in the pose-canonicalized point clouds, our method integrates the best of both worlds by combining dense coordinate prediction and direct rotation regression, thus yielding an end-to-end differentiable pipeline optimized for 9DoF pose accuracy (without using non-differentiable RANSAC). Our extensive experiments demonstrate that our method achieves new state-of-the-art performance on category-level rigid object pose (NOCSREAL275 [29]) and articulated object pose benchmarks (SAPIEN [34], BMVC [18]) at the fastest FPS ∼ 12.", "fno": "281200n3189", "keywords": [ "Point Cloud Compression", "Computer Vision", "Three Dimensional Displays", "Pipelines", "Benchmark Testing", "Motion And Tracking", "Detection And Localization In 2 D And 3 D", "Scene Analysis And Understanding", "Segmentation", "Grouping And Shape" ], "authors": [ { "affiliation": "Peking University,CFCS", "fullName": "Yijia Weng", "givenName": "Yijia", "surname": "Weng", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,CFCS", "fullName": "He Wang", "givenName": "He", "surname": "Wang", "__typename": "ArticleAuthorType" }, { "affiliation": "Shandong University", "fullName": "Qiang Zhou", "givenName": "Qiang", "surname": "Zhou", "__typename": "ArticleAuthorType" }, { "affiliation": "UCSD", "fullName": "Yuzhe Qin", "givenName": "Yuzhe", "surname": "Qin", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Yueqi Duan", "givenName": "Yueqi", "surname": "Duan", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Qingnan Fan", "givenName": "Qingnan", "surname": "Fan", "__typename": "ArticleAuthorType" }, { "affiliation": "Peking University,CFCS", "fullName": "Baoquan Chen", "givenName": "Baoquan", "surname": "Chen", "__typename": "ArticleAuthorType" }, { "affiliation": "UCSD", "fullName": "Hao Su", "givenName": "Hao", "surname": "Su", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Leonidas J. Guibas", "givenName": "Leonidas J.", "surname": "Guibas", "__typename": "ArticleAuthorType" } ], "idPrefix": "iccv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-10-01T00:00:00", "pubType": "proceedings", "pages": "13189-13198", "year": "2021", "issn": null, "isbn": "978-1-6654-2812-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "281200n3179", "articleId": "1BmKWVpEoc8", "__typename": "AdjacentArticleType" }, "next": { "fno": "281200n3199", "articleId": "1BmF3zyoheo", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/iccv/2021/2812/0/281200p5974", "title": "Deep Hough Voting for Robust Global Registration", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200p5974/1BmFKwLxovS", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200c753", "title": "SGPA: Structure-Guided Prior Adaptation for Category-Level 6D Object Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200c753/1BmLbSYdSX6", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g718", "title": "Coupled Iterative Refinement for 6D Multi-Object Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g718/1H0Nu19cSxq", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g771", "title": "GPV-Pose: Category-level Object Pose Estimation via Geometry-guided Point-wise Voting", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g771/1H1hx09yd2g", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600d773", "title": "DGECN: A Depth-Guided Edge Convolutional Network for End-to-End 6D Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600d773/1H1iGwg5t0Q", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2022/7260/0/726000a221", "title": "Learning Implicit Probability Distribution Functions for Symmetric Orientation Estimation from RGB Images Without Pose Labels", "doi": null, "abstractUrl": "/proceedings-article/irc/2022/726000a221/1Kcko4ZGkMg", "parentPublication": { "id": "proceedings/irc/2022/7260/0", "title": "2022 Sixth IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f735", "title": "CRT-6D: Fast 6D Object Pose Estimation with Cascaded Refinement Transformers", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f735/1KxVFDhVHG0", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600f674", "title": "SD-Pose: Structural Discrepancy Aware Category-Level 6D Object Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600f674/1KxVGu336Du", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2020/6553/0/09093272", "title": "PointPoseNet: Point Pose Network for Robust 6D Object Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2020/09093272/1jPbzRH8MKc", "parentPublication": { "id": "proceedings/wacv/2020/6553/0", "title": "2020 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700c381", "title": "A Pose Proposal and Refinement Network for Better 6D Object Pose Estimation", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700c381/1uqGotlEHss", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1DNCoflPzUc", "title": "2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)", "acronym": "hpcc-dss-smartcity-dependsys", "groupId": "1002461", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1DNDScW9N9S", "doi": "10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00147", "title": "Collaborative Mobile Charging Vehicles Placement: A Reinforcement Learning Approach", "normalizedTitle": "Collaborative Mobile Charging Vehicles Placement: A Reinforcement Learning Approach", "abstract": "Nowadays, there are increasing demand from electric vehicles that need to be charged during peak hours in a city. The number of traditional fixed charging stations is limited, which may not be sufficient to satisfy the charging demand of electric vehicle users. Mobile charging vehicles can be scheduled at fixed positions to serve as a fixed charging station, providing charging services for electric vehicle users, for relieving the pressure of mass charging demand. In this paper, the charging scheduling problem of mobile charging vehicle is modeled as a Markov Decision Process(MDP) problem, and a reinforcement learning method based on policy evaluation is adopted to solve this problem. The decision of the specific position to which the mobile charging vehicle is scheduled is determined by this method. In addition, the decision of how to dispatch electric vehicle charging orders is determined by a fixed algorithm. We propose two different order dispatching algorithms. According to the simulation, our proposed reinforcement learning method has superior results in terms of the efficiency of order processing and user satisfaction compared with the traditional greedy method. The two different electric vehicle charging order dispatching algorithms have their own advantages and disadvantages in terms of processing speed and effectiveness.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays, there are increasing demand from electric vehicles that need to be charged during peak hours in a city. The number of traditional fixed charging stations is limited, which may not be sufficient to satisfy the charging demand of electric vehicle users. Mobile charging vehicles can be scheduled at fixed positions to serve as a fixed charging station, providing charging services for electric vehicle users, for relieving the pressure of mass charging demand. In this paper, the charging scheduling problem of mobile charging vehicle is modeled as a Markov Decision Process(MDP) problem, and a reinforcement learning method based on policy evaluation is adopted to solve this problem. The decision of the specific position to which the mobile charging vehicle is scheduled is determined by this method. In addition, the decision of how to dispatch electric vehicle charging orders is determined by a fixed algorithm. We propose two different order dispatching algorithms. According to the simulation, our proposed reinforcement learning method has superior results in terms of the efficiency of order processing and user satisfaction compared with the traditional greedy method. The two different electric vehicle charging order dispatching algorithms have their own advantages and disadvantages in terms of processing speed and effectiveness.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays, there are increasing demand from electric vehicles that need to be charged during peak hours in a city. The number of traditional fixed charging stations is limited, which may not be sufficient to satisfy the charging demand of electric vehicle users. Mobile charging vehicles can be scheduled at fixed positions to serve as a fixed charging station, providing charging services for electric vehicle users, for relieving the pressure of mass charging demand. In this paper, the charging scheduling problem of mobile charging vehicle is modeled as a Markov Decision Process(MDP) problem, and a reinforcement learning method based on policy evaluation is adopted to solve this problem. The decision of the specific position to which the mobile charging vehicle is scheduled is determined by this method. In addition, the decision of how to dispatch electric vehicle charging orders is determined by a fixed algorithm. We propose two different order dispatching algorithms. According to the simulation, our proposed reinforcement learning method has superior results in terms of the efficiency of order processing and user satisfaction compared with the traditional greedy method. The two different electric vehicle charging order dispatching algorithms have their own advantages and disadvantages in terms of processing speed and effectiveness.", "fno": "945700a920", "keywords": [ "Electric Vehicle Charging", "Greedy Algorithms", "Markov Processes", "Power Engineering Computing", "Power Generation Dispatch", "Reinforcement Learning", "Scheduling", "Fixed Charging Stations", "Mobile Charging Vehicle", "Mass Charging Demand", "Charging Scheduling Problem", "Reinforcement Learning Method", "Markov Decision Process Problem", "MDP", "Dispatching Algorithms", "Electric Vehicle Charging", "Greedy Method", "Greedy Algorithms", "Smart Cities", "Simulation", "Decision Making", "Reinforcement Learning", "Markov Processes", "Charging Stations", "Mobile Charging Station", "Electric Vehicle", "Charging", "Schedule", "Reinforcement Learning" ], "authors": [ { "affiliation": "The Key Laboratory of Information System Requirement of China Electronics Technology Group Corporation,Nanjing,China", "fullName": "Jianing Ni", "givenName": "Jianing", "surname": "Ni", "__typename": "ArticleAuthorType" }, { "affiliation": "The Key Laboratory of Information System Requirement of China Electronics Technology Group Corporation,Nanjing,China", "fullName": "Rupeng Liang", "givenName": "Rupeng", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "The Key Laboratory of Information System Requirement of China Electronics Technology Group Corporation,Nanjing,China", "fullName": "Hao Wu", "givenName": "Hao", "surname": "Wu", "__typename": "ArticleAuthorType" } ], "idPrefix": "hpcc-dss-smartcity-dependsys", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "920-926", "year": "2021", "issn": null, "isbn": "978-1-6654-9457-1", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "945700a914", "articleId": "1DNCY9Z3Qzu", "__typename": "AdjacentArticleType" }, "next": { "fno": "945700a927", "articleId": "1DNCtfeGQ12", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/itnac/2017/6796/0/08215427", "title": "Charging infrastructure placement for electric vehicles: An optimization prospective", "doi": null, "abstractUrl": "/proceedings-article/itnac/2017/08215427/12OmNrJRP92", "parentPublication": { "id": "proceedings/itnac/2017/6796/0", "title": "2017 27th International Telecommunication Networks and Applications Conference (ITNAC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iciicii/2016/3575/0/3575a222", "title": "Optimal Charging Navigation Strategy for Electric Vehicles", "doi": null, "abstractUrl": "/proceedings-article/iciicii/2016/3575a222/12OmNxHryih", "parentPublication": { "id": "proceedings/iciicii/2016/3575/0", "title": "2016 International Conference on Industrial Informatics - Computing Technology, Intelligent Technology, Industrial Information Integration (ICIICII)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/nca/2017/1465/0/08171389", "title": "A novel software-defined network based approach for charging station allocation to plugged-in electric vehicles", "doi": null, "abstractUrl": "/proceedings-article/nca/2017/08171389/12OmNxwENDl", "parentPublication": { "id": "proceedings/nca/2017/1465/0", "title": "2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2017/3013/0/3013b080", "title": "Optimization of Ordered Charging Strategy for Large Scale Electric Vehicles Based on Quadratic Clustering", "doi": null, "abstractUrl": "/proceedings-article/icisce/2017/3013b080/12OmNzX6cmR", "parentPublication": { "id": "proceedings/icisce/2017/3013/0", "title": "2017 4th International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/isspit/2018/7568/0/08642746", "title": "Survey on Wireless Charging and Placement of Stations for Electric Vehicles", "doi": null, "abstractUrl": "/proceedings-article/isspit/2018/08642746/17QjJekpNbu", "parentPublication": { "id": "proceedings/isspit/2018/7568/0", "title": "2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/msn/2018/0548/0/054800a049", "title": "A Deployment Model of Charging Pile Based on Random Forest for Shared Electric Vehicle in Smart Cities", "doi": null, "abstractUrl": "/proceedings-article/msn/2018/054800a049/19m3nC3QHy8", "parentPublication": { "id": "proceedings/msn/2018/0548/0", "title": "2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicas/2021/2810/0/281000a232", "title": "Distribution Side Optimal Operation and Control of Coupled FCS and BESS", "doi": null, "abstractUrl": "/proceedings-article/icicas/2021/281000a232/1ByfoLKZ1yE", "parentPublication": { "id": "proceedings/icicas/2021/2810/0", "title": "2021 International Conference on Intelligent Computing, Automation and Systems (ICICAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/sti/2022/9045/0/10103258", "title": "Design and Analysis of a Hybrid Power Charging Station for Electric Vehicles at Patenga, Chittagong", "doi": null, "abstractUrl": "/proceedings-article/sti/2022/10103258/1MBFcdrXbxu", "parentPublication": { "id": "proceedings/sti/2022/9045/0", "title": "2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/aiam/2020/9986/0/998600a271", "title": "Key Security Challenges for Electric Vehicle Charging System", "doi": null, "abstractUrl": "/proceedings-article/aiam/2020/998600a271/1tweLUCaTXa", "parentPublication": { "id": "proceedings/aiam/2020/9986/0", "title": "2020 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tm/2023/02/09483640", "title": "A Reciprocal Charging Mechanism for Electric Vehicular Networks in Charging-Station-Absent Zones", "doi": null, "abstractUrl": "/journal/tm/2023/02/09483640/1vcJqKrCYOQ", "parentPublication": { "id": "trans/tm", "title": "IEEE Transactions on Mobile Computing", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1EBWasX1a0M", "title": "2021 3rd International Symposium on Smart and Healthy Cities (ISHC)", "acronym": "ishc", "groupId": "1846664", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1EBWf0kTrq0", "doi": "10.1109/ISHC54333.2021.00029", "title": "Object Geometric Primitives Detection from 3D Point Clouds Based on the Profiles on Cutting Planes", "normalizedTitle": "Object Geometric Primitives Detection from 3D Point Clouds Based on the Profiles on Cutting Planes", "abstract": "Common man made objects can be represented or composed by some geometric primitives, such as planes, cylinders, spheres, cones, etc. Existing methods reconstruct the geometric primitives by fitting the object with whole point clouds, and these methods need to set the types of model in advance. In this paper, a geometric primitives modeling method based on cutting-plane is proposed for dense 3D point clouds without setting model type in advance. Our method assumes that the original object point clouds have been segmented. First, we cut repeatedly point clouds along the z-axis with a cutting plane, which is parallel to the XOY plane with a step. In this paper, the line of sight is set as Z-axis, because sufficient contours information can be obtained in such cutting direction. The contours may contain both straight lines and quadric curves, so we use clustering to separate lines and curves. After repetitive cutting, each curve cluster has many same-type curves. Then we can recognize the type and estimate the parameters of the point clouds by calculating the curves changing relationship of curves clustering. Last we evaluated our algorithm using synthetic data and real data, and the result shows that our proposed algorithm is efficient and robust.", "abstracts": [ { "abstractType": "Regular", "content": "Common man made objects can be represented or composed by some geometric primitives, such as planes, cylinders, spheres, cones, etc. Existing methods reconstruct the geometric primitives by fitting the object with whole point clouds, and these methods need to set the types of model in advance. In this paper, a geometric primitives modeling method based on cutting-plane is proposed for dense 3D point clouds without setting model type in advance. Our method assumes that the original object point clouds have been segmented. First, we cut repeatedly point clouds along the z-axis with a cutting plane, which is parallel to the XOY plane with a step. In this paper, the line of sight is set as Z-axis, because sufficient contours information can be obtained in such cutting direction. The contours may contain both straight lines and quadric curves, so we use clustering to separate lines and curves. After repetitive cutting, each curve cluster has many same-type curves. Then we can recognize the type and estimate the parameters of the point clouds by calculating the curves changing relationship of curves clustering. Last we evaluated our algorithm using synthetic data and real data, and the result shows that our proposed algorithm is efficient and robust.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Common man made objects can be represented or composed by some geometric primitives, such as planes, cylinders, spheres, cones, etc. Existing methods reconstruct the geometric primitives by fitting the object with whole point clouds, and these methods need to set the types of model in advance. In this paper, a geometric primitives modeling method based on cutting-plane is proposed for dense 3D point clouds without setting model type in advance. Our method assumes that the original object point clouds have been segmented. First, we cut repeatedly point clouds along the z-axis with a cutting plane, which is parallel to the XOY plane with a step. In this paper, the line of sight is set as Z-axis, because sufficient contours information can be obtained in such cutting direction. The contours may contain both straight lines and quadric curves, so we use clustering to separate lines and curves. After repetitive cutting, each curve cluster has many same-type curves. Then we can recognize the type and estimate the parameters of the point clouds by calculating the curves changing relationship of curves clustering. Last we evaluated our algorithm using synthetic data and real data, and the result shows that our proposed algorithm is efficient and robust.", "fno": "674300a110", "keywords": [ "Computational Geometry", "Estimation Theory", "Feature Extraction", "Image Reconstruction", "Image Segmentation", "Object Detection", "Stereo Image Processing", "XOY Plane", "Cutting Direction", "Object Geometric Primitives Detection", "Object Point Clouds Segmentation", "3 D Point Clouds", "Cutting Planes Profiles", "Straight Lines", "Quadric Curves", "Parameters Estimation", "Curves Clustering", "Point Cloud Compression", "Solid Modeling", "Cloud Computing", "Three Dimensional Displays", "Computational Modeling", "Urban Areas", "Fitting", "Point Clouds", "Geometric Primitives", "Recognition", "Cutting Plane", "Modeling" ], "authors": [ { "affiliation": "School of Mechatronic Engineering and Automation, Shanghai University,Shanghai,China", "fullName": "Liyong Liu", "givenName": "Liyong", "surname": "Liu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mechatronic Engineering and Automation, Shanghai University,Shanghai,China", "fullName": "Xiaowei Tu", "givenName": "Xiaowei", "surname": "Tu", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mechatronic Engineering and Automation, Shanghai University,Shanghai,China", "fullName": "Qinghua Yang", "givenName": "Qinghua", "surname": "Yang", "__typename": "ArticleAuthorType" }, { "affiliation": "School of Mechatronic Engineering and Automation, Shanghai University,Shanghai,China", "fullName": "Jingyuan Yu", "givenName": "Jingyuan", "surname": "Yu", "__typename": "ArticleAuthorType" } ], "idPrefix": "ishc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-12-01T00:00:00", "pubType": "proceedings", "pages": "110-115", "year": "2021", "issn": null, "isbn": "978-1-6654-6743-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "674300a107", "articleId": "1EBWbxyvyjm", "__typename": "AdjacentArticleType" }, "next": { "fno": "674300a116", "articleId": "1EBmWDfxZTO", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cadcg/2005/2473/0/01604613", "title": "A fitting approach with dynamic algebraic spline curves", "doi": null, "abstractUrl": "/proceedings-article/cadcg/2005/01604613/12OmNAoUSZM", "parentPublication": { "id": "proceedings/cadcg/2005/2473/0", "title": "Proceedings. Ninth International Conference on Computer Aided Design and Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/lics/1992/2735/0/00185542", "title": "Cutting planes and constant depth Frege proofs", "doi": null, "abstractUrl": "/proceedings-article/lics/1992/00185542/12OmNxxNbQx", "parentPublication": { "id": "proceedings/lics/1992/2735/0", "title": "1992 Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/dcc/1999/0096/0/00960528", "title": "Compression of Arbitrary Cutting Planes", "doi": null, "abstractUrl": "/proceedings-article/dcc/1999/00960528/12OmNyGKUlE", "parentPublication": { "id": "proceedings/dcc/1999/0096/0", "title": "Data Compression Conference", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699332", "title": "Semantic Segmentation of Geometric Primitives in Dense 3D Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699332/19F1RpX0dz2", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200h437", "title": "CPFN: Cascaded Primitive Fitting Networks for High-Resolution Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200h437/1BmGd2vDvIA", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccv/2021/2812/0/281200d223", "title": "Efficient Large Scale Inlier Voting for Geometric Vision Problems", "doi": null, "abstractUrl": "/proceedings-article/iccv/2021/281200d223/1BmIlxMc4WA", "parentPublication": { "id": "proceedings/iccv/2021/2812/0", "title": "2021 IEEE/CVF International Conference on Computer Vision (ICCV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600g357", "title": "Finding Good Configurations of Planar Primitives in Unorganized Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600g357/1H0KDzdD8c0", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2022/9062/0/09956643", "title": "3D point clouds simplification based on geometric primitives and graph-structured optimization", "doi": null, "abstractUrl": "/proceedings-article/icpr/2022/09956643/1IHoPSfysjm", "parentPublication": { "id": "proceedings/icpr/2022/9062/0", "title": "2022 26th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2019/3293/0/329300l1959", "title": "LBS Autoencoder: Self-Supervised Fitting of Articulated Meshes to Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2019/329300l1959/1gyrapLInSw", "parentPublication": { "id": "proceedings/cvpr/2019/3293/0", "title": "2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictai/2021/0898/0/089800b480", "title": "Geometric Invariant Representation Learning for 3D Point Cloud", "doi": null, "abstractUrl": "/proceedings-article/ictai/2021/089800b480/1zw6hJOIDcs", "parentPublication": { "id": "proceedings/ictai/2021/0898/0", "title": "2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1Gvd72eGkh2", "title": "2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "acronym": "mipr", "groupId": "1825825", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1GvdduhsaUo", "doi": "10.1109/MIPR54900.2022.00072", "title": "ADAPTIVE ACQUISITION OF AIRBORNE LIDAR POINT CLOUD BASED ON DEEP REINFORCEMENT LEARNING", "normalizedTitle": "ADAPTIVE ACQUISITION OF AIRBORNE LIDAR POINT CLOUD BASED ON DEEP REINFORCEMENT LEARNING", "abstract": "Human experience involvement in existing operations of airborne Light Detection and Ranging (LIDAR) systems and off-line processing of collected LIDAR data make the acquisition process of airborne LIDAR point cloud less adaptable to environment conditions. This work develops a deep reinforcement learning-enabled framework for adaptive airborne LIDAR point cloud acquisition. Namely, the optimization of the airborne LIDAR operation is modeled as a Markov decision process (MDP). A set of LIDAR point cloud processing methods are proposed to derive the state space, action space, and reward function of the MDP model. A DRL algorithm, Deep Q-Network (DQN), is used to solve the MDP. The DRL model is trained in a flexible virtual environment by using simulator AirSim. Extensive simulation demonstrates the efficiency of the proposed framework.", "abstracts": [ { "abstractType": "Regular", "content": "Human experience involvement in existing operations of airborne Light Detection and Ranging (LIDAR) systems and off-line processing of collected LIDAR data make the acquisition process of airborne LIDAR point cloud less adaptable to environment conditions. This work develops a deep reinforcement learning-enabled framework for adaptive airborne LIDAR point cloud acquisition. Namely, the optimization of the airborne LIDAR operation is modeled as a Markov decision process (MDP). A set of LIDAR point cloud processing methods are proposed to derive the state space, action space, and reward function of the MDP model. A DRL algorithm, Deep Q-Network (DQN), is used to solve the MDP. The DRL model is trained in a flexible virtual environment by using simulator AirSim. Extensive simulation demonstrates the efficiency of the proposed framework.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Human experience involvement in existing operations of airborne Light Detection and Ranging (LIDAR) systems and off-line processing of collected LIDAR data make the acquisition process of airborne LIDAR point cloud less adaptable to environment conditions. This work develops a deep reinforcement learning-enabled framework for adaptive airborne LIDAR point cloud acquisition. Namely, the optimization of the airborne LIDAR operation is modeled as a Markov decision process (MDP). A set of LIDAR point cloud processing methods are proposed to derive the state space, action space, and reward function of the MDP model. A DRL algorithm, Deep Q-Network (DQN), is used to solve the MDP. The DRL model is trained in a flexible virtual environment by using simulator AirSim. Extensive simulation demonstrates the efficiency of the proposed framework.", "fno": "954800a366", "keywords": [ "Aerospace Simulation", "Airborne Radar", "Computer Based Training", "Learning Artificial Intelligence", "Markov Processes", "Optical Radar", "Remote Sensing By Laser Beam", "Markov Decision Process", "Adaptive Acquisition", "Human Experience Involvement", "Off Line Processing", "Collected LIDAR Data", "Acquisition Process", "Deep Reinforcement Learning Enabled Framework", "Adaptive Airborne LIDAR Point Cloud Acquisition", "Airborne LIDAR Operation", "Point Cloud Compression", "Adaptation Models", "Laser Radar", "Atmospheric Modeling", "Virtual Environments", "Reinforcement Learning", "Information Processing" ], "authors": [ { "affiliation": "University of California,Davis,California,USA,95616", "fullName": "Chengxuan Huang", "givenName": "Chengxuan", "surname": "Huang", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee at Chattanooga,Tennessee,USA,37403", "fullName": "Dalei Wu", "givenName": "Dalei", "surname": "Wu", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Tennessee at Chattanooga,Tennessee,USA,37403", "fullName": "Yu Liang", "givenName": "Yu", "surname": "Liang", "__typename": "ArticleAuthorType" } ], "idPrefix": "mipr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-08-01T00:00:00", "pubType": "proceedings", "pages": "366-371", "year": "2022", "issn": null, "isbn": "978-1-6654-9548-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "954800a362", "articleId": "1GvdbQIsNna", "__typename": "AdjacentArticleType" }, "next": { "fno": "954800a372", "articleId": "1GvdgFIT8qI", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/2012/2216/0/06460397", "title": "Urban traffic monitoring from aerial LIDAR data with a Two-Level Marked Point Process model", "doi": null, "abstractUrl": "/proceedings-article/icpr/2012/06460397/12OmNC8uRu3", "parentPublication": { "id": "proceedings/icpr/2012/2216/0", "title": "2012 21st International Conference on Pattern Recognition (ICPR 2012)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2022/9978/0/997800b011", "title": "Classification Method for Crop by fusion Hyper Spectral and LiDAR Data", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2022/997800b011/1ByeK1A7lCg", "parentPublication": { "id": "proceedings/icmtma/2022/9978/0", "title": "2022 14th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icse-companion/2022/9598/0/959800a217", "title": "TauLiM: Test Data Augmentation of LiDAR Point Cloud by Metamorphic Relation", "doi": null, "abstractUrl": "/proceedings-article/icse-companion/2022/959800a217/1EaPfW2n1eM", "parentPublication": { "id": "proceedings/icse-companion/2022/9598/0", "title": "2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictech/2022/9694/0/969400a033", "title": "A Method for Classifying Buildings Based on Scan Lines from Airborne LiDAR Point Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/ictech/2022/969400a033/1FWmxjSey6Q", "parentPublication": { "id": "proceedings/ictech/2022/9694/0", "title": "2022 11th International Conference of Information and Communication Technology (ICTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09858927", "title": "A Novel Grid-Based Geometry Compression Framework for Spinning Lidar Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09858927/1G9EN6WL3KE", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09859891", "title": "Directed Mix Contrast for Lidar Point Cloud Segmentation", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09859891/1G9EsM404Uw", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccri/2022/6800/0/680000a038", "title": "Adaptive Two-Stage Filter for De-snowing LiDAR Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccri/2022/680000a038/1GlfZJTPjjy", "parentPublication": { "id": "proceedings/iccri/2022/6800/0", "title": "2022 International Conference on Control, Robotics and Informatics (ICCRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icaml/2022/6265/0/626500a232", "title": "LiDAR Odometer Based on Visual Enhancement", "doi": null, "abstractUrl": "/proceedings-article/icaml/2022/626500a232/1Lkfwvwbez6", "parentPublication": { "id": "proceedings/icaml/2022/6265/0", "title": "2022 4th International Conference on Applied Machine Learning (ICAML)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/5555/01/10097640", "title": "Sparse-to-Dense Matching Network for Large-scale LiDAR Point Cloud Registration", "doi": null, "abstractUrl": "/journal/tp/5555/01/10097640/1M9lILSRgL6", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2021/4899/0/489900b062", "title": "Point2color: 3D Point Cloud Colorization Using a Conditional Generative Network and Differentiable Rendering for Airborne LiDAR", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2021/489900b062/1yJYtFBEASI", "parentPublication": { "id": "proceedings/cvprw/2021/4899/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1H1gVMlkl32", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1H1hCbGOBbi", "doi": "10.1109/CVPR52688.2022.01155", "title": "Point2Cyl: Reverse Engineering 3D Objects from Point Clouds to Extrusion Cylinders", "normalizedTitle": "Point2Cyl: Reverse Engineering 3D Objects from Point Clouds to Extrusion Cylinders", "abstract": "We propose Point2Cyl, a supervised network transforming a raw 3D point cloud to a set of extrusion cylinders. Reverse engineering from a raw geometry to a CAD model is an essential task to enable manipulation of the 3D data in shape editing software and thus expand their usages in many downstream applications. Particularly, the form of CAD models having a sequence of extrusion cylinders - a 2D sketch plus an extrusion axis and range - and their boolean combinations is not only widely used in the CAD community/software but also has great expressivity of shapes, compared to having limited types of primitives (e.g., planes, spheres, and cylinders). In this work, we introduce a neural network that solves the extrusion cylinder decomposition problem in a geometry-grounded way by first learning underlying geometric proxies. Precisely, our approach first predicts per-point segmentation, base/barrel labels and normals, then estimates for the underlying extrusion parameters in differentiable and closed-form formulations. Our experiments show that our approach demonstrates the best performance on two recent CAD datasets, Fusion Gallery and DeepCAD, and we further showcase our approach on reverse engineering and editing.", "abstracts": [ { "abstractType": "Regular", "content": "We propose Point2Cyl, a supervised network transforming a raw 3D point cloud to a set of extrusion cylinders. Reverse engineering from a raw geometry to a CAD model is an essential task to enable manipulation of the 3D data in shape editing software and thus expand their usages in many downstream applications. Particularly, the form of CAD models having a sequence of extrusion cylinders - a 2D sketch plus an extrusion axis and range - and their boolean combinations is not only widely used in the CAD community/software but also has great expressivity of shapes, compared to having limited types of primitives (e.g., planes, spheres, and cylinders). In this work, we introduce a neural network that solves the extrusion cylinder decomposition problem in a geometry-grounded way by first learning underlying geometric proxies. Precisely, our approach first predicts per-point segmentation, base/barrel labels and normals, then estimates for the underlying extrusion parameters in differentiable and closed-form formulations. Our experiments show that our approach demonstrates the best performance on two recent CAD datasets, Fusion Gallery and DeepCAD, and we further showcase our approach on reverse engineering and editing.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose Point2Cyl, a supervised network transforming a raw 3D point cloud to a set of extrusion cylinders. Reverse engineering from a raw geometry to a CAD model is an essential task to enable manipulation of the 3D data in shape editing software and thus expand their usages in many downstream applications. Particularly, the form of CAD models having a sequence of extrusion cylinders - a 2D sketch plus an extrusion axis and range - and their boolean combinations is not only widely used in the CAD community/software but also has great expressivity of shapes, compared to having limited types of primitives (e.g., planes, spheres, and cylinders). In this work, we introduce a neural network that solves the extrusion cylinder decomposition problem in a geometry-grounded way by first learning underlying geometric proxies. Precisely, our approach first predicts per-point segmentation, base/barrel labels and normals, then estimates for the underlying extrusion parameters in differentiable and closed-form formulations. Our experiments show that our approach demonstrates the best performance on two recent CAD datasets, Fusion Gallery and DeepCAD, and we further showcase our approach on reverse engineering and editing.", "fno": "694600l1840", "keywords": [ "CAD", "Computational Geometry", "Extrusion", "Geometry", "Learning Artificial Intelligence", "Reverse Engineering", "Solid Modelling", "Extrusion Cylinder Decomposition Problem", "Per Point Segmentation", "Underlying Extrusion Parameters", "Recent CAD Datasets", "Point 2 Cyl", "Reverse Engineering 3 D Objects", "Point Clouds", "Extrusion Cylinders", "Supervised Network", "Raw 3 D Point Cloud", "Raw Geometry", "CAD Model", "Shape Editing Software", "Extrusion Axis", "Point Cloud Compression", "Training", "Solid Modeling", "Visualization", "Three Dimensional Displays", "Shape", "Reverse Engineering", "Segmentation", "Grouping And Shape Analysis 3 D From Multi View And Sensors Vision Graphics" ], "authors": [ { "affiliation": "Stanford University", "fullName": "Mikaela Angelina Uy", "givenName": "Mikaela Angelina", "surname": "Uy", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Yen-Yu Chang", "givenName": "Yen-Yu", "surname": "Chang", "__typename": "ArticleAuthorType" }, { "affiliation": "KAIST", "fullName": "Minhyuk Sung", "givenName": "Minhyuk", "surname": "Sung", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Purvi Goel", "givenName": "Purvi", "surname": "Goel", "__typename": "ArticleAuthorType" }, { "affiliation": "Autodesk Research", "fullName": "Joseph Lambourne", "givenName": "Joseph", "surname": "Lambourne", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Tolga Birdal", "givenName": "Tolga", "surname": "Birdal", "__typename": "ArticleAuthorType" }, { "affiliation": "Stanford University", "fullName": "Leonidas Guibas", "givenName": "Leonidas", "surname": "Guibas", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-06-01T00:00:00", "pubType": "proceedings", "pages": "11840-11850", "year": "2022", "issn": null, "isbn": "978-1-6654-6946-3", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1H1hC7Relji", "name": "pcvpr202269460-09880393s1-mm_694600l1840.zip", "size": "10.7 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202269460-09880393s1-mm_694600l1840.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "694600l1830", "articleId": "1H1kfGGzKtW", "__typename": "AdjacentArticleType" }, "next": { "fno": "694600l1851", "articleId": "1H1hZrwhNTi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icicta/2011/4353/2/05750856", "title": "Reverse Design and Finite Element Analysis of Tractor Panel Based on CATIA", "doi": null, "abstractUrl": "/proceedings-article/icicta/2011/05750856/12OmNAtK4k8", "parentPublication": { "id": "icicta/2011/4353/2", "title": "Intelligent Computation Technology and Automation, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dim/1997/7943/0/79430141", "title": "Generalized Cylinders Extraction in a Range Image", "doi": null, "abstractUrl": "/proceedings-article/3dim/1997/79430141/12OmNB8TU3y", "parentPublication": { "id": "proceedings/3dim/1997/7943/0", "title": "3D Digital Imaging and Modeling, International Conference on", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iita/2008/3497/2/3497b047", "title": "A Direct Segmentation Algorithm Based on Adaptive Fuzzy c-Elliptotype Clustering in Reverse Engineering", "doi": null, "abstractUrl": "/proceedings-article/iita/2008/3497b047/12OmNBPc8tt", "parentPublication": { "id": "iita/2008/3497/2", "title": "2008 Second International Symposium on Intelligent Information Technology Application", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/gmap/2000/0562/0/00838234", "title": "Reverse engineering B-rep models from multiple point clouds", "doi": null, "abstractUrl": "/proceedings-article/gmap/2000/00838234/12OmNrNh0PE", "parentPublication": { "id": "proceedings/gmap/2000/0562/0", "title": "Proceedings Geometric Modeling and Processing 2000. Theory and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iv/2015/7568/0/7568a430", "title": "Reverse Engineering of Planar Objects Using Imperialist Competitive Algorithm", "doi": null, "abstractUrl": "/proceedings-article/iv/2015/7568a430/12OmNvSKNEI", "parentPublication": { "id": "proceedings/iv/2015/7568/0", "title": "2015 19th International Conference on Information Visualisation (iV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/1997/8162/0/81620002", "title": "A Comparison of four Reverse Engineering Tools", "doi": null, "abstractUrl": "/proceedings-article/wcre/1997/81620002/12OmNwD1pSR", "parentPublication": { "id": "proceedings/wcre/1997/8162/0", "title": "Proceedings of the Fourth Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wcre/1996/7674/0/76740179", "title": "An overall process based on fusion to reverse engineer legacy code", "doi": null, "abstractUrl": "/proceedings-article/wcre/1996/76740179/12OmNyFCvXH", "parentPublication": { "id": "proceedings/wcre/1996/7674/0", "title": "Proceedings of WCRE '96: 4rd Working Conference on Reverse Engineering", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iseeie/2022/6874/0/687400a251", "title": "Reverse Engineering Design of Faucet Based on PowerShape", "doi": null, "abstractUrl": "/proceedings-article/iseeie/2022/687400a251/1FWmKouVfG0", "parentPublication": { "id": "proceedings/iseeie/2022/6874/0", "title": "2022 International Symposium on Electrical, Electronics and Information Engineering (ISEEIE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09439062", "title": "Slicing-Tracking-Detection: Simultaneous Multi-Cylinder Detection From Large-Scale and Complex Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2022/12/09439062/1tMLvTrTWQE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeas/2021/9768/0/976800a172", "title": "Point cloud data fitting-based reverse engineering technique for digital model updating of assembly structure", "doi": null, "abstractUrl": "/proceedings-article/icmeas/2021/976800a172/1zuuVnLCToQ", "parentPublication": { "id": "proceedings/icmeas/2021/9768/0", "title": "2021 7th International Conference on Mechanical Engineering and Automation Science (ICMEAS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1J6hnO7Gnao", "title": "2022 IEEE 18th International Conference on e-Science (e-Science)", "acronym": "e-science", "groupId": "9973400", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1J6ho2CE06I", "doi": "10.1109/eScience55777.2022.00045", "title": "Subspace based Anomaly Detection Framework for Point Clouds", "normalizedTitle": "Subspace based Anomaly Detection Framework for Point Clouds", "abstract": "In many real-world applications such as the inspection of powerlines, the automated detection of anomalies can minimise damage and reduce costs that result from the presence of unknown anomalies. Technologies such as LiDAR scans obtained from Unmanned Aerial Vehicles (UAV) are becoming prominent due to the data depth they provide. In the context of powerline transmission, investigators must search for anomalous elements such as line defects or obstructions. Such occurrences are not always apparent and detecting them requires extensive analysis of data within vast areas of wilderness. Automating this process can reduce time and labor costs. We propose a methodology to define what constitutes an anomaly within mapped real-world scenes, and a technique to address different types of anomalies. The notion of unknowns and knowns composed of unknown to both human and machine, known to human and unknown to machine, unknown to human and known to machine, and known to both human and machine is considered to develop a novel framework that detects anomalous patterns. For the purpose of evaluation, we introduce synthetic anomalous data points through our data augmentation methods. Our framework achieved 63.78&#x0025; accuracy in detecting the points known to the machine and unknown to the machine from the Sensat Urban validation scene. Within the scene, 78.22&#x0025; of the incorrectly classified data were detected as unknown to the machine. Furthermore, our framework achieved 84.34&#x0025; accuracy in detecting the synthetic data and 35.5&#x0025; accuracy in detecting those data as anomalies.", "abstracts": [ { "abstractType": "Regular", "content": "In many real-world applications such as the inspection of powerlines, the automated detection of anomalies can minimise damage and reduce costs that result from the presence of unknown anomalies. Technologies such as LiDAR scans obtained from Unmanned Aerial Vehicles (UAV) are becoming prominent due to the data depth they provide. In the context of powerline transmission, investigators must search for anomalous elements such as line defects or obstructions. Such occurrences are not always apparent and detecting them requires extensive analysis of data within vast areas of wilderness. Automating this process can reduce time and labor costs. We propose a methodology to define what constitutes an anomaly within mapped real-world scenes, and a technique to address different types of anomalies. The notion of unknowns and knowns composed of unknown to both human and machine, known to human and unknown to machine, unknown to human and known to machine, and known to both human and machine is considered to develop a novel framework that detects anomalous patterns. For the purpose of evaluation, we introduce synthetic anomalous data points through our data augmentation methods. Our framework achieved 63.78&#x0025; accuracy in detecting the points known to the machine and unknown to the machine from the Sensat Urban validation scene. Within the scene, 78.22&#x0025; of the incorrectly classified data were detected as unknown to the machine. Furthermore, our framework achieved 84.34&#x0025; accuracy in detecting the synthetic data and 35.5&#x0025; accuracy in detecting those data as anomalies.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "In many real-world applications such as the inspection of powerlines, the automated detection of anomalies can minimise damage and reduce costs that result from the presence of unknown anomalies. Technologies such as LiDAR scans obtained from Unmanned Aerial Vehicles (UAV) are becoming prominent due to the data depth they provide. In the context of powerline transmission, investigators must search for anomalous elements such as line defects or obstructions. Such occurrences are not always apparent and detecting them requires extensive analysis of data within vast areas of wilderness. Automating this process can reduce time and labor costs. We propose a methodology to define what constitutes an anomaly within mapped real-world scenes, and a technique to address different types of anomalies. The notion of unknowns and knowns composed of unknown to both human and machine, known to human and unknown to machine, unknown to human and known to machine, and known to both human and machine is considered to develop a novel framework that detects anomalous patterns. For the purpose of evaluation, we introduce synthetic anomalous data points through our data augmentation methods. Our framework achieved 63.78% accuracy in detecting the points known to the machine and unknown to the machine from the Sensat Urban validation scene. Within the scene, 78.22% of the incorrectly classified data were detected as unknown to the machine. Furthermore, our framework achieved 84.34% accuracy in detecting the synthetic data and 35.5% accuracy in detecting those data as anomalies.", "fno": "612400a316", "keywords": [ "Autonomous Aerial Vehicles", "Carrier Transmission On Power Lines", "Data Analysis", "Feature Extraction", "Geophysical Signal Processing", "Image Representation", "Object Detection", "Optical Radar", "Pattern Classification", "Remotely Operated Vehicles", "Security Of Data", "Anomalous Elements", "Anomalous Patterns", "Anomaly Detection Framework", "Automated Detection", "Data Depth", "Incorrectly Classified Data", "Labor Costs", "Li DAR Scans", "Line Defects", "Obstructions", "Point Clouds", "Powerline Transmission", "Real World Applications", "Real World Scenes", "Synthetic Anomalous Data Points", "Synthetic Data", "Unknown Anomalies", "Unmanned Aerial Vehicles", "Point Cloud Compression", "Industries", "Costs", "Laser Radar", "Semantics", "Predictive Models", "Inspection", "Anomaly Detection", "Known Unknowns", "Li DAR", "Point Cloud Data", "Power Line Transmission", "Subspaces", "Unmanned Aerial Vehicles UAV", "Unknown Unknowns" ], "authors": [ { "affiliation": "Applied Artificial Intelligence Institute (A2 I2), Deakin University,Geelong,VIC,Australia", "fullName": "Johnahan Van Zyl", "givenName": "Johnahan", "surname": "Van Zyl", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2 I2), Deakin University,Geelong,VIC,Australia", "fullName": "Hung Du", "givenName": "Hung", "surname": "Du", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2 I2), Deakin University,Geelong,VIC,Australia", "fullName": "Srikanth Thudumu", "givenName": "Srikanth", "surname": "Thudumu", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2 I2), Deakin University,Geelong,VIC,Australia", "fullName": "Irini Logothetis", "givenName": "Irini", "surname": "Logothetis", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2 I2), Deakin University,Geelong,VIC,Australia", "fullName": "Scott Barnett", "givenName": "Scott", "surname": "Barnett", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2 I2), Deakin University,Geelong,VIC,Australia", "fullName": "Rajesh Vasa", "givenName": "Rajesh", "surname": "Vasa", "__typename": "ArticleAuthorType" }, { "affiliation": "Applied Artificial Intelligence Institute (A2 I2), Deakin University,Geelong,VIC,Australia", "fullName": "Kon Mouzakis", "givenName": "Kon", "surname": "Mouzakis", "__typename": "ArticleAuthorType" } ], "idPrefix": "e-science", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-10-01T00:00:00", "pubType": "proceedings", "pages": "316-325", "year": "2022", "issn": null, "isbn": "978-1-6654-6124-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "612400a306", "articleId": "1J6hqMMBhwA", "__typename": "AdjacentArticleType" }, "next": { "fno": "612400a326", "articleId": "1J6hyxJkNG0", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cis/2021/9489/0/948900a257", "title": "Unsupervised Anomalous Sound Detection For Machine Condition Using Memory-augmented Deep Autoencoder", "doi": null, "abstractUrl": "/proceedings-article/cis/2021/948900a257/1AUpJW0fuTK", "parentPublication": { "id": "proceedings/cis/2021/9489/0", "title": "2021 17th International Conference on Computational Intelligence and Security (CIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ictech/2022/9694/0/969400a033", "title": "A Method for Classifying Buildings Based on Scan Lines from Airborne LiDAR Point Cloud Data", "doi": null, "abstractUrl": "/proceedings-article/ictech/2022/969400a033/1FWmxjSey6Q", "parentPublication": { "id": "proceedings/ictech/2022/9694/0", "title": "2022 11th International Conference of Information and Communication Technology (ICTech)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvprw/2022/8739/0/873900e418", "title": "PointMotionNet: Point-Wise Motion Learning for Large-Scale LiDAR Point Clouds Sequences", "doi": null, "abstractUrl": "/proceedings-article/cvprw/2022/873900e418/1G563yaYq1q", "parentPublication": { "id": "proceedings/cvprw/2022/8739/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icme/2022/8563/0/09858927", "title": "A Novel Grid-Based Geometry Compression Framework for Spinning Lidar Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/icme/2022/09858927/1G9EN6WL3KE", "parentPublication": { "id": "proceedings/icme/2022/8563/0", "title": "2022 IEEE International Conference on Multimedia and Expo (ICME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccri/2022/6800/0/680000a038", "title": "Adaptive Two-Stage Filter for De-snowing LiDAR Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/iccri/2022/680000a038/1GlfZJTPjjy", "parentPublication": { "id": "proceedings/iccri/2022/6800/0", "title": "2022 International Conference on Control, Robotics and Informatics (ICCRI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/mipr/2022/9548/0/954800a059", "title": "Sparse Tensor-based Point Cloud Attribute Compression", "doi": null, "abstractUrl": "/proceedings-article/mipr/2022/954800a059/1GvdbBfkcRa", "parentPublication": { "id": "proceedings/mipr/2022/9548/0", "title": "2022 IEEE 5th International Conference on Multimedia Information Processing and Retrieval (MIPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8920", "title": "Surface Representation for Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8920/1H1jmGGv0eQ", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600i101", "title": "Beyond 3D Siamese Tracking: A Motion-Centric Paradigm for 3D Single Object Tracking in Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600i101/1H1mWcwW4jC", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacvw/2023/2056/0/205600a350", "title": "Masked Autoencoder for Self-Supervised Pre-training on Lidar Point Clouds", "doi": null, "abstractUrl": "/proceedings-article/wacvw/2023/205600a350/1Kzz7RCHLeU", "parentPublication": { "id": "proceedings/wacvw/2023/2056/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision Workshops (WACVW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2023/9346/0/934600c612", "title": "Anomaly Detection in 3D Point Clouds using Deep Geometric Descriptors", "doi": null, "abstractUrl": "/proceedings-article/wacv/2023/934600c612/1L6LAu5ndXG", "parentPublication": { "id": "proceedings/wacv/2023/9346/0", "title": "2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cMF8oE0kI8", "title": "2019 23rd International Conference Information Visualisation (IV)", "acronym": "iv", "groupId": "1000370", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cMFcDeWQiA", "doi": "10.1109/IV.2019.00079", "title": "A Comparative Study of Extraction Cylinder Features in Industrial Point Clouds", "normalizedTitle": "A Comparative Study of Extraction Cylinder Features in Industrial Point Clouds", "abstract": "With the technological advancement in the field of Computer Aided Design such as the rapid development of scanning technologies, the reconstruction of complete and incomplete cylinders given noisy point clouds with form defects becomes an important issue. In fact, cylindrical surfaces are found in domestic to industrial contexts. In this paper, a comparative study of cylinder fitting algorithms manufactured in the LIPPS laboratory is proposed. The aim of the proposed approach is to determine the diameter of cylindrical feature for minimizing roundness error from experimental data-points. The roundness error is evaluated using two internationally defined methods: Minimum Circumscribed Cylinder (MCC) and Maximum Inscribed Cylinder (MIC). All algorithms give similar results in the case where the scanned cylinder is complete and without form defects, but in the case of missing data some algorithms give unacceptable results. The two reference cylinders have been independently analyzed, respecting six criteria (calculation complexity, damping parameter, initial guess, time, circularity error and complexity cylinder). The results of algorithms are also compared to help manufacturers and inspectors facilitate and improve the application of these methods and to select the appropriate algorithm for size and form evaluation.", "abstracts": [ { "abstractType": "Regular", "content": "With the technological advancement in the field of Computer Aided Design such as the rapid development of scanning technologies, the reconstruction of complete and incomplete cylinders given noisy point clouds with form defects becomes an important issue. In fact, cylindrical surfaces are found in domestic to industrial contexts. In this paper, a comparative study of cylinder fitting algorithms manufactured in the LIPPS laboratory is proposed. The aim of the proposed approach is to determine the diameter of cylindrical feature for minimizing roundness error from experimental data-points. The roundness error is evaluated using two internationally defined methods: Minimum Circumscribed Cylinder (MCC) and Maximum Inscribed Cylinder (MIC). All algorithms give similar results in the case where the scanned cylinder is complete and without form defects, but in the case of missing data some algorithms give unacceptable results. The two reference cylinders have been independently analyzed, respecting six criteria (calculation complexity, damping parameter, initial guess, time, circularity error and complexity cylinder). The results of algorithms are also compared to help manufacturers and inspectors facilitate and improve the application of these methods and to select the appropriate algorithm for size and form evaluation.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "With the technological advancement in the field of Computer Aided Design such as the rapid development of scanning technologies, the reconstruction of complete and incomplete cylinders given noisy point clouds with form defects becomes an important issue. In fact, cylindrical surfaces are found in domestic to industrial contexts. In this paper, a comparative study of cylinder fitting algorithms manufactured in the LIPPS laboratory is proposed. The aim of the proposed approach is to determine the diameter of cylindrical feature for minimizing roundness error from experimental data-points. The roundness error is evaluated using two internationally defined methods: Minimum Circumscribed Cylinder (MCC) and Maximum Inscribed Cylinder (MIC). All algorithms give similar results in the case where the scanned cylinder is complete and without form defects, but in the case of missing data some algorithms give unacceptable results. The two reference cylinders have been independently analyzed, respecting six criteria (calculation complexity, damping parameter, initial guess, time, circularity error and complexity cylinder). The results of algorithms are also compared to help manufacturers and inspectors facilitate and improve the application of these methods and to select the appropriate algorithm for size and form evaluation.", "fno": "283800a431", "keywords": [ "CAD", "Image Reconstruction", "Shapes Structures", "Noisy Point Clouds", "Cylindrical Surfaces", "Industrial Contexts", "Cylinder Fitting Algorithms", "LIPPS Laboratory", "Cylindrical Feature", "Roundness Error", "Reference Cylinders", "Industrial Point Clouds", "Scanning Technologies", "Computer Aided Design", "Minimum Circumscribed Cylinder", "Maximum Inscribed Cylinder", "Extraction Cylinder", "Three Dimensional Displays", "Microwave Integrated Circuits", "Approximation Algorithms", "Fitting", "Feature Extraction", "Image Reconstruction", "Inspection", "Computer Aided Design Form Defects Roundness Error Minimum Circumscribed Cylinder Maximum Inscribed Cylinder Feature Extraction Cylinder Fitting" ], "authors": [ { "affiliation": "École de technologie supérieure (ÉTS), Québec, Canada", "fullName": "Ibtissem Jbira", "givenName": "Ibtissem", "surname": "Jbira", "__typename": "ArticleAuthorType" }, { "affiliation": "LATIS, ENISo, University of Sousse, Tunisia", "fullName": "Aicha Ben Makhlouf", "givenName": "Aicha Ben", "surname": "Makhlouf", "__typename": "ArticleAuthorType" }, { "affiliation": "LMS, ENISo, University of Sousse, Tunisia", "fullName": "Borhen Louhich", "givenName": "Borhen", "surname": "Louhich", "__typename": "ArticleAuthorType" }, { "affiliation": "École de technologie supérieure (ÉTS), Québec, Canada", "fullName": "Antoine Tahan", "givenName": "Antoine", "surname": "Tahan", "__typename": "ArticleAuthorType" }, { "affiliation": "LATIS, ENISo, University of Sousse, Tunisia", "fullName": "Mohamed Ali Mahjoub", "givenName": "Mohamed Ali", "surname": "Mahjoub", "__typename": "ArticleAuthorType" }, { "affiliation": "CNRS, UMR, Polytechnique Hauts-de-France, France", "fullName": "Dominique Deneux", "givenName": "Dominique", "surname": "Deneux", "__typename": "ArticleAuthorType" } ], "idPrefix": "iv", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-07-01T00:00:00", "pubType": "proceedings", "pages": "431-441", "year": "2019", "issn": null, "isbn": "978-1-7281-2838-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "283800a417", "articleId": "1cMFcnjZz2g", "__typename": "AdjacentArticleType" }, "next": { "fno": "283800a442", "articleId": "1cMF9ji7b6o", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/icpr/1992/2910/0/00201574", "title": "Determining location and orientation of a labelled cylinder using point-pair estimation algorithm", "doi": null, "abstractUrl": "/proceedings-article/icpr/1992/00201574/12OmNAY79g4", "parentPublication": { "id": "proceedings/icpr/1992/2910/0", "title": "1992 11th IAPR International Conference on Pattern Recognition", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wgec/2008/3334/0/3334a007", "title": "Finding Minimum Containing Cylinder of Space Finite Points with Genetic Algorithm", "doi": null, "abstractUrl": "/proceedings-article/wgec/2008/3334a007/12OmNB1eJFN", "parentPublication": { "id": "proceedings/wgec/2008/3334/0", "title": "2008 Second International Conference on Genetic and Evolutionary Computing (WGEC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1995/6985/0/69850320", "title": "Electromagnetic scattering from periodically deformed cylinders and cylindrical shells", "doi": null, "abstractUrl": "/proceedings-article/ssst/1995/69850320/12OmNBKEyvZ", "parentPublication": { "id": "proceedings/ssst/1995/6985/0", "title": "Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icisce/2015/6850/0/6850a725", "title": "EM Scattering Analysis of Cylinder Array Using Iterative T-Matrix Theory", "doi": null, "abstractUrl": "/proceedings-article/icisce/2015/6850a725/12OmNwErpwD", "parentPublication": { "id": "proceedings/icisce/2015/6850/0", "title": "2015 2nd International Conference on Information Science and Control Engineering (ICISCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmtma/2011/4296/2/4296c481", "title": "Locomotive Diesel Engine Fault State Inspection Based on the Cylinder Vibration Analysis", "doi": null, "abstractUrl": "/proceedings-article/icmtma/2011/4296c481/12OmNyTOsqF", "parentPublication": { "id": "proceedings/icmtma/2011/4296/2", "title": "2011 Third International Conference on Measuring Technology and Mechatronics Automation", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ssst/1993/3560/0/00522730", "title": "Perturbation expansion for the field scattered by a small cylinder in the presence of a neighboring cylinder", "doi": null, "abstractUrl": "/proceedings-article/ssst/1993/00522730/12OmNyyO8H6", "parentPublication": { "id": "proceedings/ssst/1993/3560/0", "title": "1993 (25th) Southeastern Symposium on System Theory", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tp/2010/12/ttp2010122128", "title": "Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition", "doi": null, "abstractUrl": "/journal/tp/2010/12/ttp2010122128/13rRUxNmPF2", "parentPublication": { "id": "trans/tp", "title": "IEEE Transactions on Pattern Analysis & Machine Intelligence", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icedme/2020/8145/0/09122161", "title": "Hinge point optimization and hydraulic cylinder parameter design of the digging arm", "doi": null, "abstractUrl": "/proceedings-article/icedme/2020/09122161/1kRSHX2HvCE", "parentPublication": { "id": "proceedings/icedme/2020/8145/0", "title": "2020 3rd International Conference on Electron Device and Mechanical Engineering (ICEDME)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09439062", "title": "Slicing-Tracking-Detection: Simultaneous Multi-Cylinder Detection From Large-Scale and Complex Point Clouds", "doi": null, "abstractUrl": "/journal/tg/2022/12/09439062/1tMLvTrTWQE", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmcce/2020/2314/0/231400a256", "title": "Burst failure analysis of a gas cylinder", "doi": null, "abstractUrl": "/proceedings-article/icmcce/2020/231400a256/1tzzhJEaFFu", "parentPublication": { "id": "proceedings/icmcce/2020/2314/0", "title": "2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNqG0SWX", "title": "2015 7th International Conference on Intelligent Technologies for Interactive Entertainment (INTETAIN)", "acronym": "intetain", "groupId": "1808166", "volume": "0", "displayVolume": "0", "year": "2015", "__typename": "ProceedingType" }, "article": { "id": "12OmNBtl1pV", "doi": "", "title": "A preliminary study of a hybrid user interface for augmented reality applications", "normalizedTitle": "A preliminary study of a hybrid user interface for augmented reality applications", "abstract": "Augmented Reality (AR) applications are nowadays largely diffused in many fields of use, especially for entertainment, and the market of AR applications for mobile devices grows faster and faster. Moreover, new and innovative hardware for human-computer interaction has been deployed, such as the Leap Motion Controller. This paper presents some preliminary results in the design and development of a hybrid interface for hand-free augmented reality applications. The paper introduces a framework to interact with AR applications through a speech and gesture recognition-based interface. A Leap Motion Controller is mounted on top of AR glasses and a speech recognition module completes the system. Results have shown that, using the speech or the gesture recognition modules singularly, the robustness of the user interface is strongly dependent on environmental conditions. On the other hand, a combined usage of both modules can provide a more robust input.", "abstracts": [ { "abstractType": "Regular", "content": "Augmented Reality (AR) applications are nowadays largely diffused in many fields of use, especially for entertainment, and the market of AR applications for mobile devices grows faster and faster. Moreover, new and innovative hardware for human-computer interaction has been deployed, such as the Leap Motion Controller. This paper presents some preliminary results in the design and development of a hybrid interface for hand-free augmented reality applications. The paper introduces a framework to interact with AR applications through a speech and gesture recognition-based interface. A Leap Motion Controller is mounted on top of AR glasses and a speech recognition module completes the system. Results have shown that, using the speech or the gesture recognition modules singularly, the robustness of the user interface is strongly dependent on environmental conditions. On the other hand, a combined usage of both modules can provide a more robust input.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Augmented Reality (AR) applications are nowadays largely diffused in many fields of use, especially for entertainment, and the market of AR applications for mobile devices grows faster and faster. Moreover, new and innovative hardware for human-computer interaction has been deployed, such as the Leap Motion Controller. This paper presents some preliminary results in the design and development of a hybrid interface for hand-free augmented reality applications. The paper introduces a framework to interact with AR applications through a speech and gesture recognition-based interface. A Leap Motion Controller is mounted on top of AR glasses and a speech recognition module completes the system. Results have shown that, using the speech or the gesture recognition modules singularly, the robustness of the user interface is strongly dependent on environmental conditions. On the other hand, a combined usage of both modules can provide a more robust input.", "fno": "07325483", "keywords": [ "Speech Recognition", "Gesture Recognition", "Robustness", "Augmented Reality", "Speech", "Glass", "Cameras", "Gesture Recognition", "Augmented Reality", "Hybrid User Interface", "Human Computer Interaction", "Speech Recognition" ], "authors": [ { "affiliation": "Politecnico di Torino, Dipartimento di Automatica e Informatica, C.so Duca degli Abruzzi 24, I-10129, Torino, Italy", "fullName": "Federico Manuri", "givenName": "Federico", "surname": "Manuri", "__typename": "ArticleAuthorType" }, { "affiliation": "Politecnico di Torino, Dipartimento di Automatica e Informatica, C.so Duca degli Abruzzi 24, I-10129, Torino, Italy", "fullName": "Giovanni Piumatti", "givenName": "Giovanni", "surname": "Piumatti", "__typename": "ArticleAuthorType" } ], "idPrefix": "intetain", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2015-06-01T00:00:00", "pubType": "proceedings", "pages": "37-41", "year": "2015", "issn": null, "isbn": "978-1-6319-0061-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07325482", "articleId": "12OmNyQYt2r", "__typename": "AdjacentArticleType" }, "next": { "fno": "07325484", "articleId": "12OmNxisQWg", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2014/6184/0/06948411", "title": "Grasp-Shell vs gesture-speech: A comparison of direct and indirect natural interaction techniques in augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948411/12OmNA1Vnwp", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismarw/2016/3740/0/07836534", "title": "TeachAR: An Interactive Augmented Reality Tool for Teaching Basic English to Non-native Children", "doi": null, "abstractUrl": "/proceedings-article/ismarw/2016/07836534/12OmNB9t6ld", "parentPublication": { "id": "proceedings/ismarw/2016/3740/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ieee-vis/2002/7498/0/7498krum", "title": "Evaluation of a Multimodal Interface for 3D Terrain Visualization", "doi": null, "abstractUrl": "/proceedings-article/ieee-vis/2002/7498krum/12OmNBpmDOM", "parentPublication": { "id": "proceedings/ieee-vis/2002/7498/0", "title": "Visualization Conference, IEEE", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2015/7660/0/7660a152", "title": "[POSTER] An Adaptive Augmented Reality Interface for Hand Based on Probabilistic Approach", "doi": null, "abstractUrl": "/proceedings-article/ismar/2015/7660a152/12OmNxYtucC", "parentPublication": { "id": "proceedings/ismar/2015/7660/0", "title": "2015 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2014/6184/0/06948491", "title": "[DEMO] G-SIAR: Gesture-speech interface for augmented reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948491/12OmNxzuMCv", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cmvit/2017/4993/0/07878725", "title": "Augmented Reality Maintenance Training with Intel Depth Camera", "doi": null, "abstractUrl": "/proceedings-article/cmvit/2017/07878725/12OmNyL0Tzc", "parentPublication": { "id": "proceedings/cmvit/2017/4993/0", "title": "2017 International Conference on Machine Vision and Information Technology (CMVIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iccgiv/2022/9250/0/925000a208", "title": "An interactive algorithm for augmented reality experiment", "doi": null, "abstractUrl": "/proceedings-article/iccgiv/2022/925000a208/1LxfmqC6JXi", "parentPublication": { "id": "proceedings/iccgiv/2022/9250/0", "title": "2022 2nd International Conference on Computer Graphics, Image and Virtualization (ICCGIV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vs-games/2019/4540/0/08864548", "title": "The Usability of the Microsoft HoloLens for an Augmented Reality Game to Teach Elementary School Children", "doi": null, "abstractUrl": "/proceedings-article/vs-games/2019/08864548/1e5ZpUVkjVS", "parentPublication": { "id": "proceedings/vs-games/2019/4540/0", "title": "2019 11th International Conference on Virtual Worlds and Games for Serious Applications (VS-Games)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2020/12/09199555", "title": "Understanding Multimodal User Gesture and Speech Behavior for Object Manipulation in Augmented Reality Using Elicitation", "doi": null, "abstractUrl": "/journal/tg/2020/12/09199555/1ncgzvoHSBG", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a165", "title": "Comparing Single-modal and Multimodal Interaction in an Augmented Reality System", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a165/1pBMk3pKsEw", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNxE2mTP", "title": "2017 First IEEE International Conference on Robotic Computing (IRC)", "acronym": "irc", "groupId": "1819925", "volume": "0", "displayVolume": "0", "year": "2017", "__typename": "ProceedingType" }, "article": { "id": "12OmNqGiu27", "doi": "10.1109/IRC.2017.76", "title": "Gamification of Hand Rehabilitation Process Using Virtual Reality Tools: Using Leap Motion for Hand Rehabilitation", "normalizedTitle": "Gamification of Hand Rehabilitation Process Using Virtual Reality Tools: Using Leap Motion for Hand Rehabilitation", "abstract": "Nowadays virtual reality (VR) technology give us the considerable opportunities to develop new methods to supplement traditional physiotherapy with sustain beneficial quantity and quality of rehabilitation. VR tools, like Leap motion have received great attention in the recent few years because of their immeasurable applications, whish include gaming, robotics, education, medicine etc. In this paper we present a game for hand rehabilitation using the Leap Motion controller. The main idea of gamification of hand rehabilitation is to help develop the muscle tonus and increase precision in gestures using the opportunities that VR offer by making the rehabilitation process more effective and motivating for patients.", "abstracts": [ { "abstractType": "Regular", "content": "Nowadays virtual reality (VR) technology give us the considerable opportunities to develop new methods to supplement traditional physiotherapy with sustain beneficial quantity and quality of rehabilitation. VR tools, like Leap motion have received great attention in the recent few years because of their immeasurable applications, whish include gaming, robotics, education, medicine etc. In this paper we present a game for hand rehabilitation using the Leap Motion controller. The main idea of gamification of hand rehabilitation is to help develop the muscle tonus and increase precision in gestures using the opportunities that VR offer by making the rehabilitation process more effective and motivating for patients.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Nowadays virtual reality (VR) technology give us the considerable opportunities to develop new methods to supplement traditional physiotherapy with sustain beneficial quantity and quality of rehabilitation. VR tools, like Leap motion have received great attention in the recent few years because of their immeasurable applications, whish include gaming, robotics, education, medicine etc. In this paper we present a game for hand rehabilitation using the Leap Motion controller. The main idea of gamification of hand rehabilitation is to help develop the muscle tonus and increase precision in gestures using the opportunities that VR offer by making the rehabilitation process more effective and motivating for patients.", "fno": "07926560", "keywords": [ "Control Engineering Computing", "Motion Control", "Virtual Reality", "Hand Rehabilitation Process", "Gamification", "Virtual Reality Tools", "Leap Motion", "Hand Rehabilitation", "VR Technology", "Physiotherapy", "VR Tools", "Leap Motion Controller", "Muscle Tonus", "Games", "Three Dimensional Displays", "Virtual Reality", "Medical Treatment", "Hardware", "Robot Sensing Systems", "Leap Motion", "Virtual Reality", "Gamification", "Modeling", "Unity 3 D", "Bionic Controlled Robot Arm", "3 D Printing" ], "authors": [ { "affiliation": null, "fullName": "Madina Alimanova", "givenName": "Madina", "surname": "Alimanova", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Saulet Borambayeva", "givenName": "Saulet", "surname": "Borambayeva", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dinara Kozhamzharova", "givenName": "Dinara", "surname": "Kozhamzharova", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Nurgul Kurmangaiyeva", "givenName": "Nurgul", "surname": "Kurmangaiyeva", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Dinara Ospanova", "givenName": "Dinara", "surname": "Ospanova", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gulnar Tyulepberdinova", "givenName": "Gulnar", "surname": "Tyulepberdinova", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Gulnur Gaziz", "givenName": "Gulnur", "surname": "Gaziz", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Aray Kassenkhan", "givenName": "Aray", "surname": "Kassenkhan", "__typename": "ArticleAuthorType" } ], "idPrefix": "irc", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2017-04-01T00:00:00", "pubType": "proceedings", "pages": "336-339", "year": "2017", "issn": null, "isbn": "978-1-5090-6724-4", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07926559", "articleId": "12OmNqC2v6l", "__typename": "AdjacentArticleType" }, "next": { "fno": "07926561", "articleId": "12OmNvjQ8QF", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2015/1727/0/07223452", "title": "Shark punch: A virtual reality game for aquatic rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223452/12OmNqGA54Q", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/csci/2016/5510/0/07881304", "title": "Digitizing the Hand Rehabilitation Using Serious Games Methodology with User-Centered Design Approach", "doi": null, "abstractUrl": "/proceedings-article/csci/2016/07881304/12OmNqJ8twa", "parentPublication": { "id": "proceedings/csci/2016/5510/0", "title": "2016 International Conference on Computational Science and Computational Intelligence (CSCI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/segah/2014/4823/0/07067072", "title": "Shoulder flexion rehabilitation in patients with monoparesia using an exergame", "doi": null, "abstractUrl": "/proceedings-article/segah/2014/07067072/12OmNwHhoRn", "parentPublication": { "id": "proceedings/segah/2014/4823/0", "title": "2014 IEEE 3rd International Conference on Serious Games and Applications for Health (SeGAH)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2017/3588/0/3588a341", "title": "Evaluate Leap Motion Control for Multiple Hand Posture Recognition", "doi": null, "abstractUrl": "/proceedings-article/svr/2017/3588a341/12OmNyrIaAc", "parentPublication": { "id": "proceedings/svr/2017/3588/0", "title": "2017 19th Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2015/7204/0/7204a186", "title": "Right Hand Rehabilitation with CyberForce, CyberGrasp, and CyberGlove", "doi": null, "abstractUrl": "/proceedings-article/svr/2015/7204a186/12OmNzC5Tp9", "parentPublication": { "id": "proceedings/svr/2015/7204/0", "title": "2015 XVII Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/i-span/2018/8534/0/853400a253", "title": "An Upper Extremity Rehabilitation System Using Virtual Reality Technology", "doi": null, "abstractUrl": "/proceedings-article/i-span/2018/853400a253/17D45WWzW5h", "parentPublication": { "id": "proceedings/i-span/2018/8534/0", "title": "2018 15th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "mags/cg/2019/01/08663653", "title": "Using Virtual Reality to Increase Motivation in Poststroke Rehabilitation", "doi": null, "abstractUrl": "/magazine/cg/2019/01/08663653/18exyyHBfz2", "parentPublication": { "id": "mags/cg", "title": "IEEE Computer Graphics and Applications", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797828", "title": "Immersive Virtual Reality and Gamification Within Procedurally Generated Environments to Increase Motivation During Gait Rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797828/1cJ13n6aEsE", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscc/2019/2999/0/08969586", "title": "System of Upper Limb Motor Rehabilitation Training Using Leap Motion and Gear VR in Sessions of Home Game Therapy", "doi": null, "abstractUrl": "/proceedings-article/iscc/2019/08969586/1h0JY5wFTPO", "parentPublication": { "id": "proceedings/iscc/2019/2999/0", "title": "2019 IEEE Symposium on Computers and Communications (ISCC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2020/7675/0/767500a217", "title": "Lower Limb Balance Rehabilitation of Post-stroke Patients Using an Evaluating and Training Combined Augmented Reality System", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2020/767500a217/1pBMhnkqb04", "parentPublication": { "id": "proceedings/ismar-adjunct/2020/7675/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "12OmNAYXWAF", "title": "2016 IEEE Virtual Reality (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2016", "__typename": "ProceedingType" }, "article": { "id": "12OmNypIYAW", "doi": "10.1109/VR.2016.7504791", "title": "Calibration and interaction in optical see-through augmented reality using leap motion", "normalizedTitle": "Calibration and interaction in optical see-through augmented reality using leap motion", "abstract": "The growing prevalence of hand and gesture tracking technology has led to an increased availability of consumer level devices, such as the Leap Motion controller, and also facilitated the inclusion of similar hardware into forth coming head mounted display offerings, including the Microsoft HoloLens and Moverio Pro BT-2000. In this video, we demonstrate the utility of the Leap Motion for calibrating optical see-through augmented reality systems by employing a variation on Tuceryan and Navab's Single Point Active Alignment Method [3]. We also showcase a straightforward method for calibrating the coordinate frame of the Leap Motion to a secondary tracking system by employing absolute orientation algorithms [2, 1, 4], allowing us to properly transform and visualize hand and finger tracking data from the user's viewpoint. Our combined display and coordinate frame calibration techniques produce a viable mechanism for not only intuitive interaction with virtual objects but also the creation of natural occlusion between computer generated content and the user themselves. We believe that these techniques will be pivotal in the development of novel consumer applications for next generation head mounted display hardware.", "abstracts": [ { "abstractType": "Regular", "content": "The growing prevalence of hand and gesture tracking technology has led to an increased availability of consumer level devices, such as the Leap Motion controller, and also facilitated the inclusion of similar hardware into forth coming head mounted display offerings, including the Microsoft HoloLens and Moverio Pro BT-2000. In this video, we demonstrate the utility of the Leap Motion for calibrating optical see-through augmented reality systems by employing a variation on Tuceryan and Navab's Single Point Active Alignment Method [3]. We also showcase a straightforward method for calibrating the coordinate frame of the Leap Motion to a secondary tracking system by employing absolute orientation algorithms [2, 1, 4], allowing us to properly transform and visualize hand and finger tracking data from the user's viewpoint. Our combined display and coordinate frame calibration techniques produce a viable mechanism for not only intuitive interaction with virtual objects but also the creation of natural occlusion between computer generated content and the user themselves. We believe that these techniques will be pivotal in the development of novel consumer applications for next generation head mounted display hardware.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "The growing prevalence of hand and gesture tracking technology has led to an increased availability of consumer level devices, such as the Leap Motion controller, and also facilitated the inclusion of similar hardware into forth coming head mounted display offerings, including the Microsoft HoloLens and Moverio Pro BT-2000. In this video, we demonstrate the utility of the Leap Motion for calibrating optical see-through augmented reality systems by employing a variation on Tuceryan and Navab's Single Point Active Alignment Method [3]. We also showcase a straightforward method for calibrating the coordinate frame of the Leap Motion to a secondary tracking system by employing absolute orientation algorithms [2, 1, 4], allowing us to properly transform and visualize hand and finger tracking data from the user's viewpoint. Our combined display and coordinate frame calibration techniques produce a viable mechanism for not only intuitive interaction with virtual objects but also the creation of natural occlusion between computer generated content and the user themselves. We believe that these techniques will be pivotal in the development of novel consumer applications for next generation head mounted display hardware.", "fno": "07504791", "keywords": [ "Tracking", "Calibration", "Pattern Analysis", "Magnetic Heads", "Hardware", "Augmented Reality", "Transforms", "H 5 1 Information Interfaces And Presentation Multimedia Information Systems Artificial Augmented And Virtual Realities" ], "authors": [ { "affiliation": "Mississippi State University, Department of Computer Science and Engineering", "fullName": "Kenneth R Moser", "givenName": "Kenneth R", "surname": "Moser", "__typename": "ArticleAuthorType" }, { "affiliation": "Mississippi State University, Department of Computer Science and Engineering", "fullName": "Sujan Anreddy", "givenName": "Sujan", "surname": "Anreddy", "__typename": "ArticleAuthorType" }, { "affiliation": "Mississippi State University, Department of Computer Science and Engineering", "fullName": "J. Edward Swan", "givenName": "J. Edward", "surname": "Swan", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2016-03-01T00:00:00", "pubType": "proceedings", "pages": "332-332", "year": "2016", "issn": "2375-5334", "isbn": "978-1-5090-0836-0", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "07504790", "articleId": "12OmNzWfoTs", "__typename": "AdjacentArticleType" }, "next": { "fno": "07504792", "articleId": "12OmNqAU6zU", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2014/6184/0/06948446", "title": "[Poster] Non-parametric camera-based calibration of optical see-through glasses for augmented reality applications", "doi": null, "abstractUrl": "/proceedings-article/ismar/2014/06948446/12OmNASILJd", "parentPublication": { "id": "proceedings/ismar/2014/6184/0", "title": "2014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892354", "title": "Optical see-through vs. spatial augmented reality simulators for medical applications", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892354/12OmNB1wkLS", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223450", "title": "Evaluating optical see-through head-mounted display calibration via frustum visualization", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223450/12OmNrAv3Ap", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dui/2016/0842/0/07460047", "title": "Evaluation of user-centric optical see-through head-mounted display calibration using a leap motion controller", "doi": null, "abstractUrl": "/proceedings-article/3dui/2016/07460047/12OmNrJRPdz", "parentPublication": { "id": "proceedings/3dui/2016/0842/0", "title": "2016 IEEE Symposium on 3D User Interfaces (3DUI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2016/0836/0/07504739", "title": "Evaluation of hand and stylus based calibration for optical see-through head-mounted displays using leap motion", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504739/12OmNxE2mZD", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223385", "title": "Continuous automatic calibration for optical see-through displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223385/12OmNynJMQZ", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icicse/2013/5118/0/5118a100", "title": "A Convenient Method of Video See-Through Augmented Reality Based on Image-Guided Surgery System", "doi": null, "abstractUrl": "/proceedings-article/icicse/2013/5118a100/12OmNzSQdqd", "parentPublication": { "id": "proceedings/icicse/2013/5118/0", "title": "2013 Seventh International Conference on Internet Computing for Engineering and Science (ICICSE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2011/2183/0/06162910", "title": "An empiric evaluation of confirmation methods for optical see-through head-mounted display calibration", "doi": null, "abstractUrl": "/proceedings-article/ismar/2011/06162910/12OmNzwpUfP", "parentPublication": { "id": "proceedings/ismar/2011/2183/0", "title": "2011 10th IEEE International Symposium on Mixed and Augmented Reality", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2018/3365/0/08446429", "title": "Impact of Alignment Point Distance Distribution on SPAAM Calibration of Optical See-Through Head-Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/vr/2018/08446429/13bd1gCd7Sz", "parentPublication": { "id": "proceedings/vr/2018/3365/0", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2018/7592/0/08699217", "title": "Closed &#x2013; Loop Calibration for Optical See-Through Near Eye Display with Infinity Focus", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2018/08699217/19F1NirKmsw", "parentPublication": { "id": "proceedings/ismar-adjunct/2018/7592/0", "title": "2018 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1CJcAaH6aYg", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2022", "__typename": "ProceedingType" }, "article": { "id": "1CJe3HP2vx6", "doi": "10.1109/VRW55335.2022.00332", "title": "Distant Hand Interaction Framework in Augmented Reality", "normalizedTitle": "Distant Hand Interaction Framework in Augmented Reality", "abstract": "Recent augmented reality (AR) head-mounted displays support shared experiences among multiple users in real physical spaces. While previous research looked at different embodied methods to enhance interpersonal communication cues, so far, less research looked at distant interaction in AR and, in particular, distant hand communication, which can open up new possibilities for scenarios, such as large-group collaboration. In this demonstration, we present a research framework for distant hand interaction in AR, including mapping techniques and visualizations. Our techniques are inspired by virtual reality (VR) distant hand interactions, but had to be adjusted due to the different context in AR and limited knowledge about the physical environment. We discuss different techniques for hand communication, including deictic pointing at a distance, distant drawing in AR, and distant communication through symbolic hand gestures.", "abstracts": [ { "abstractType": "Regular", "content": "Recent augmented reality (AR) head-mounted displays support shared experiences among multiple users in real physical spaces. While previous research looked at different embodied methods to enhance interpersonal communication cues, so far, less research looked at distant interaction in AR and, in particular, distant hand communication, which can open up new possibilities for scenarios, such as large-group collaboration. In this demonstration, we present a research framework for distant hand interaction in AR, including mapping techniques and visualizations. Our techniques are inspired by virtual reality (VR) distant hand interactions, but had to be adjusted due to the different context in AR and limited knowledge about the physical environment. We discuss different techniques for hand communication, including deictic pointing at a distance, distant drawing in AR, and distant communication through symbolic hand gestures.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Recent augmented reality (AR) head-mounted displays support shared experiences among multiple users in real physical spaces. While previous research looked at different embodied methods to enhance interpersonal communication cues, so far, less research looked at distant interaction in AR and, in particular, distant hand communication, which can open up new possibilities for scenarios, such as large-group collaboration. In this demonstration, we present a research framework for distant hand interaction in AR, including mapping techniques and visualizations. Our techniques are inspired by virtual reality (VR) distant hand interactions, but had to be adjusted due to the different context in AR and limited knowledge about the physical environment. We discuss different techniques for hand communication, including deictic pointing at a distance, distant drawing in AR, and distant communication through symbolic hand gestures.", "fno": "840200a962", "keywords": [ "Augmented Reality", "Gesture Recognition", "Groupware", "Helmet Mounted Displays", "Virtual Reality", "Distant Hand Communication", "Research Framework", "Virtual Reality", "Distant Drawing", "Distant Communication", "Symbolic Hand Gestures", "Distant Hand Interaction Framework", "Recent Augmented Reality Head Mounted Displays", "Shared Experiences", "Multiple Users", "Physical Spaces", "Different Embodied Methods", "Interpersonal Communication Cues", "Distant Interaction", "Particular Hand Communication", "Visualization", "Three Dimensional Displays", "Head Mounted Displays", "Conferences", "Collaboration", "User Interfaces", "Planning", "Human Centered Computing", "Human Computer Interaction HCI", "Interaction Paradigms", "Augmented Reality" ], "authors": [ { "affiliation": "University of Central Florida", "fullName": "Jesus Ugarte", "givenName": "Jesus", "surname": "Ugarte", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida", "fullName": "Nahal Norouzi", "givenName": "Nahal", "surname": "Norouzi", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida", "fullName": "Austin Erickson", "givenName": "Austin", "surname": "Erickson", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida", "fullName": "Gerd Bruder", "givenName": "Gerd", "surname": "Bruder", "__typename": "ArticleAuthorType" }, { "affiliation": "University of Central Florida", "fullName": "Greg Welch", "givenName": "Greg", "surname": "Welch", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2022-03-01T00:00:00", "pubType": "proceedings", "pages": "962-963", "year": "2022", "issn": null, "isbn": "978-1-6654-8402-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "840200a960", "articleId": "1CJexFbyxUI", "__typename": "AdjacentArticleType" }, "next": { "fno": "840200a964", "articleId": "1CJeOwwf1Nm", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vrw/2022/8402/0/840200a590", "title": "Augmented Reality Fitts&#x0027; Law Input Comparison Between Touchpad, Pointing Gesture, and Raycast", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a590/1CJcB3cmKuk", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a584", "title": "Investigating Display Position of a Head-Fixed Augmented Reality Notification for Dual-task", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a584/1CJd297BiDu", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a870", "title": "X-Ray Device Positioning with Augmented Reality Visual Feedback", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a870/1CJfmBHBffW", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a175", "title": "Towards a Desktop-AR Prototyping Framework: Prototyping Cross-Reality Between Desktops and Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a175/1J7WgIHKkVy", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2022/5365/0/536500a686", "title": "Exploring Augmented Reality Notification Placement while Communicating with Virtual Avatar", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2022/536500a686/1J7WgWfFoOs", "parentPublication": { "id": "proceedings/ismar-adjunct/2022/5365/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a470", "title": "Perceptibility of Jitter in Augmented Reality Head-Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a470/1JrQZ2SKCuQ", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2020/5608/0/09089433", "title": "Glanceable AR: Evaluating Information Access Methods for Head-Worn Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2020/09089433/1jIxf3ZEs0w", "parentPublication": { "id": "proceedings/vr/2020/5608/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/07/09253561", "title": "AR-Loupe: Magnified Augmented Reality by Combining an Optical See-Through Head-Mounted Display and a Loupe", "doi": null, "abstractUrl": "/journal/tg/2022/07/09253561/1oDXHeBJHNe", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2021/4057/0/405700a569", "title": "Investigation of Microcirculatory Effects of Experiencing Burning Hands in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2021/405700a569/1tnXxLHfCOQ", "parentPublication": { "id": "proceedings/vrw/2021/4057/0", "title": "2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar-adjunct/2021/1298/0/129800a352", "title": "Heat Pain Threshold Modulation By Experiencing Burning Hands in Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar-adjunct/2021/129800a352/1yeQKcrGZvG", "parentPublication": { "id": "proceedings/ismar-adjunct/2021/1298/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1cI6akLvAuQ", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2019", "__typename": "ProceedingType" }, "article": { "id": "1cJ0K0zJcv6", "doi": "10.1109/VR.2019.8797916", "title": "DepthMove: Hands-free Interaction in Virtual Reality Using Head Motions in the Depth Dimension", "normalizedTitle": "DepthMove: Hands-free Interaction in Virtual Reality Using Head Motions in the Depth Dimension", "abstract": "Hands-free interactions are very handy for virtual reality (VR) head-worn display (HWD) systems because they allow users to interact with VR environments without the need for a hand-held device. This paper explores the potential of a new approach that we call DepthMove to allow hands-free interactions that are based on head motions towards the depth dimension. With DepthMove, a user can interact in a VR system proactively by moving towards the depth dimension with an HWD. We present the concept and implementation of DepthMove in VR HWD systems and demonstrate its potential applications. We further discuss the advantages and limitations of using DepthMove.", "abstracts": [ { "abstractType": "Regular", "content": "Hands-free interactions are very handy for virtual reality (VR) head-worn display (HWD) systems because they allow users to interact with VR environments without the need for a hand-held device. This paper explores the potential of a new approach that we call DepthMove to allow hands-free interactions that are based on head motions towards the depth dimension. With DepthMove, a user can interact in a VR system proactively by moving towards the depth dimension with an HWD. We present the concept and implementation of DepthMove in VR HWD systems and demonstrate its potential applications. We further discuss the advantages and limitations of using DepthMove.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Hands-free interactions are very handy for virtual reality (VR) head-worn display (HWD) systems because they allow users to interact with VR environments without the need for a hand-held device. This paper explores the potential of a new approach that we call DepthMove to allow hands-free interactions that are based on head motions towards the depth dimension. With DepthMove, a user can interact in a VR system proactively by moving towards the depth dimension with an HWD. We present the concept and implementation of DepthMove in VR HWD systems and demonstrate its potential applications. We further discuss the advantages and limitations of using DepthMove.", "fno": "08797916", "keywords": [ "Augmented Reality", "Helmet Mounted Displays", "Human Computer Interaction", "VR Environments", "Hands Free Interaction", "Head Motions", "Depth Dimension", "VR HWD Systems", "Virtual Reality Head Worn Display Systems", "Depthmove", "Switches", "Motion Pictures", "Virtual Reality", "Headphones", "Sensors", "Human Factors", "Pediatrics" ], "authors": [ { "affiliation": "Xi'an Jiaotong-Liverpool University", "fullName": "Difeng Yu", "givenName": "Difeng", "surname": "Yu", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi'an Jiaotong-Liverpool University", "fullName": "Hai-Ning Liang", "givenName": "Hai-Ning", "surname": "Liang", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi'an Jiaotong-Liverpool University", "fullName": "Tianyu Zhang", "givenName": "Tianyu", "surname": "Zhang", "__typename": "ArticleAuthorType" }, { "affiliation": "Xi'an Jiaotong-Liverpool University", "fullName": "Wenge Xu", "givenName": "Wenge", "surname": "Xu", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2019-03-01T00:00:00", "pubType": "proceedings", "pages": "1257-1258", "year": "2019", "issn": null, "isbn": "978-1-7281-1377-7", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08798327", "articleId": "1cJ0HmmdfUY", "__typename": "AdjacentArticleType" }, "next": { "fno": "08798288", "articleId": "1cJ1fOEaYRa", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/ismar/2016/3641/0/3641a100", "title": "TactileVR: Integrating Physical Toys into Learn and Play Virtual Reality Experiences", "doi": null, "abstractUrl": "/proceedings-article/ismar/2016/3641a100/12OmNvFHfKP", "parentPublication": { "id": "proceedings/ismar/2016/3641/0", "title": "2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892375", "title": "Experiencing guidance in 3D spaces with a vibrotactile head-mounted display", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892375/12OmNy5hRo2", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a074", "title": "An Exploration of Hands-free Text Selection for Virtual Reality Head-Mounted Displays", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a074/1JrRaeV82L6", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2019/07/08723303", "title": "Errata to &#x201C;RingText: Dwell-Free and Hands-Free Text Entry for Mobile Head-Mounted Displays Using Head Motions&#x201D; [May 19 1991-2001]", "doi": null, "abstractUrl": "/journal/tg/2019/07/08723303/1aqzjJfQFCU", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797904", "title": "Audio Reproduction in Virtual Reality Cinemas &#x2013; Position Paper", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797904/1cJ0JpXbP32", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08797901", "title": "DepthText: Leveraging Head Movements towards the Depth Dimension for Hands-free Text Entry in Mobile Virtual Reality Systems", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08797901/1cJ13BSrOkU", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2019/0987/0/08943683", "title": "DepthMove: Leveraging Head Motions in the Depth Dimension to Interact with Virtual Reality Head-Worn Displays", "doi": null, "abstractUrl": "/proceedings-article/ismar/2019/08943683/1grOLPil98k", "parentPublication": { "id": "proceedings/ismar/2019/0987/0", "title": "2019 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090445", "title": "It Is Complicated: Interacting with Children in Social Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090445/1jIxz87dXEs", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2021/05/09382869", "title": "Hands-free interaction in immersive virtual reality: A systematic review", "doi": null, "abstractUrl": "/journal/tg/2021/05/09382869/1saZCLk2sSI", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2021/0158/0/015800a118", "title": "Exploring Head-based Mode-Switching in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2021/015800a118/1yeD1RhEseY", "parentPublication": { "id": "proceedings/ismar/2021/0158/0", "title": "2021 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1jIxhEnA8IE", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "acronym": "vrw", "groupId": "1836626", "volume": "0", "displayVolume": "0", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1jIxpR1CPOo", "doi": "10.1109/VRW50115.2020.00143", "title": "VR Piano Learning Platform with Leap Motion and Pressure Sensors", "normalizedTitle": "VR Piano Learning Platform with Leap Motion and Pressure Sensors", "abstract": "Aiming at helping novices to learn and practice playing piano without a real piano teacher, we propose a virtual reality (VR) piano system which can record the user&#x2019;s piano fingering data. Our system uses two Leap Motion sensors for wide-range hand tracking, and we developed a method to calibrate and compose the tracking results of two Leap Motion sensors. However, Leap Motion sensors fail to accurately detect whether a finger presses a key because the precision of the estimated depth is not high enough. Hence, we employ multiple pressure sensors attached on the user&#x2019;s fingertips to more accurately check whether the user is pressing the piano key or not. An HTC Vive headset is used to display the immersive VR environment while the user practices. Moreover, a transparent acrylic board is mounted above the Leap Motion sensors so that the player can directly play on the board, which enhances the immersion and presence by touching a physical object. The experimental results show that our VR piano system provides users a great piano-playing experience and is helpful for piano learning.", "abstracts": [ { "abstractType": "Regular", "content": "Aiming at helping novices to learn and practice playing piano without a real piano teacher, we propose a virtual reality (VR) piano system which can record the user&#x2019;s piano fingering data. Our system uses two Leap Motion sensors for wide-range hand tracking, and we developed a method to calibrate and compose the tracking results of two Leap Motion sensors. However, Leap Motion sensors fail to accurately detect whether a finger presses a key because the precision of the estimated depth is not high enough. Hence, we employ multiple pressure sensors attached on the user&#x2019;s fingertips to more accurately check whether the user is pressing the piano key or not. An HTC Vive headset is used to display the immersive VR environment while the user practices. Moreover, a transparent acrylic board is mounted above the Leap Motion sensors so that the player can directly play on the board, which enhances the immersion and presence by touching a physical object. The experimental results show that our VR piano system provides users a great piano-playing experience and is helpful for piano learning.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Aiming at helping novices to learn and practice playing piano without a real piano teacher, we propose a virtual reality (VR) piano system which can record the user’s piano fingering data. Our system uses two Leap Motion sensors for wide-range hand tracking, and we developed a method to calibrate and compose the tracking results of two Leap Motion sensors. However, Leap Motion sensors fail to accurately detect whether a finger presses a key because the precision of the estimated depth is not high enough. Hence, we employ multiple pressure sensors attached on the user’s fingertips to more accurately check whether the user is pressing the piano key or not. An HTC Vive headset is used to display the immersive VR environment while the user practices. Moreover, a transparent acrylic board is mounted above the Leap Motion sensors so that the player can directly play on the board, which enhances the immersion and presence by touching a physical object. The experimental results show that our VR piano system provides users a great piano-playing experience and is helpful for piano learning.", "fno": "09090628", "keywords": [ "Headphones", "Pressure Sensors", "Tracking", "Sensor Systems", "Presses", "Conferences", "Human Centered Computing", "Human Computer Interaction", "Interaction Paradigms", "Virtual Reality" ], "authors": [ { "affiliation": "National Cheng Kung University,Department of Computer Science and Information Engineering", "fullName": "Febrina Wijaya", "givenName": "Febrina", "surname": "Wijaya", "__typename": "ArticleAuthorType" }, { "affiliation": "National Cheng Kung University,Department of Computer Science and Information Engineering", "fullName": "Ying-Chun Tseng", "givenName": "Ying-Chun", "surname": "Tseng", "__typename": "ArticleAuthorType" }, { "affiliation": "National Cheng Kung University,Department of Computer Science and Information Engineering", "fullName": "Wan-Lun Tsai", "givenName": "Wan-Lun", "surname": "Tsai", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Department of Computer Science", "fullName": "Tse-Yu Pan", "givenName": "Tse-Yu", "surname": "Pan", "__typename": "ArticleAuthorType" }, { "affiliation": "National Tsing Hua University,Department of Computer Science", "fullName": "Min-Chun Hu", "givenName": "Min-Chun", "surname": "Hu", "__typename": "ArticleAuthorType" } ], "idPrefix": "vrw", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-03-01T00:00:00", "pubType": "proceedings", "pages": "584-585", "year": "2020", "issn": null, "isbn": "978-1-7281-6532-5", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "09090670", "articleId": "1jIxwAw9Z9C", "__typename": "AdjacentArticleType" }, "next": { "fno": "09090571", "articleId": "1jIxrXeGmdi", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892229", "title": "6-DOF VR videos with a single 360-camera", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892229/12OmNAlvHtF", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/irc/2017/6724/0/07926560", "title": "Gamification of Hand Rehabilitation Process Using Virtual Reality Tools: Using Leap Motion for Hand Rehabilitation", "doi": null, "abstractUrl": "/proceedings-article/irc/2017/07926560/12OmNqGiu27", "parentPublication": { "id": "proceedings/irc/2017/6724/0", "title": "2017 First IEEE International Conference on Robotic Computing (IRC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icis/2016/0806/0/07550836", "title": "Digital scrum board using leap motion", "doi": null, "abstractUrl": "/proceedings-article/icis/2016/07550836/12OmNywfKz1", "parentPublication": { "id": "proceedings/icis/2016/0806/0", "title": "2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cyberc/2015/9200/0/9200a411", "title": "A Real-Time ASL Recognition System Using Leap Motion Sensors", "doi": null, "abstractUrl": "/proceedings-article/cyberc/2015/9200a411/12OmNzayN04", "parentPublication": { "id": "proceedings/cyberc/2015/9200/0", "title": "2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icpr/2018/3788/0/08545834", "title": "Activity Detection using Fusion of Multi-Pressure Sensors in Insoles", "doi": null, "abstractUrl": "/proceedings-article/icpr/2018/08545834/17D45WHONox", "parentPublication": { "id": "proceedings/icpr/2018/3788/0", "title": "2018 24th International Conference on Pattern Recognition (ICPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iwecai/2022/7997/0/799700a305", "title": "Design of VR Experimental System Based on Leap Motion Gesture Recognition", "doi": null, "abstractUrl": "/proceedings-article/iwecai/2022/799700a305/1Cugz3W5wI0", "parentPublication": { "id": "proceedings/iwecai/2022/7997/0", "title": "2022 3rd International Conference on Electronic Communication and Artificial Intelligence (IWECAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iscer/2022/8478/0/847800a262", "title": "Piano Beginner: A Glove-based Finger Training VR Application", "doi": null, "abstractUrl": "/proceedings-article/iscer/2022/847800a262/1Hbby1S94oE", "parentPublication": { "id": "proceedings/iscer/2022/8478/0", "title": "2022 International Symposium on Control Engineering and Robotics (ISCER)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2022/5325/0/532500a317", "title": "WriArm: Leveraging Wrist Movement to Design Wrist&#x002B;Arm Based Teleportation in VR", "doi": null, "abstractUrl": "/proceedings-article/ismar/2022/532500a317/1JrRkBbpP1K", "parentPublication": { "id": "proceedings/ismar/2022/5325/0", "title": "2022 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/iiai-aai/2019/2627/0/262700b037", "title": "Proposal of Character Input Method in VR Environment using Leap Motion", "doi": null, "abstractUrl": "/proceedings-article/iiai-aai/2019/262700b037/1hrLxruNVXq", "parentPublication": { "id": "proceedings/iiai-aai/2019/2627/0", "title": "2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09440798", "title": "Robust Optical Based Hand Interaction for Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09440798/1tTpcF5rJTy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1kecGUxjQC4", "title": "2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020) (FG)", "acronym": "fg", "groupId": "1002160", "volume": "0", "displayVolume": "1", "year": "2020", "__typename": "ProceedingType" }, "article": { "id": "1kecI0aXAje", "doi": "10.1109/FG47880.2020.00027", "title": "Sign Language Recognition in Virtual Reality", "normalizedTitle": "Sign Language Recognition in Virtual Reality", "abstract": "A real-time system for signal language recognition in virtual reality (VR) is presented in this paper. The system makes use of an egocentric view with the Vive HTC VR headset along with a Leap Motion controller. In this demo, a random forest is used to classify the 26 letters of the alphabet, in American Sign Language, from hand-crafted features extracted from the Leap Motion controller. We detail offline classification results showing the expressive power of the features used for recognition.", "abstracts": [ { "abstractType": "Regular", "content": "A real-time system for signal language recognition in virtual reality (VR) is presented in this paper. The system makes use of an egocentric view with the Vive HTC VR headset along with a Leap Motion controller. In this demo, a random forest is used to classify the 26 letters of the alphabet, in American Sign Language, from hand-crafted features extracted from the Leap Motion controller. We detail offline classification results showing the expressive power of the features used for recognition.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "A real-time system for signal language recognition in virtual reality (VR) is presented in this paper. The system makes use of an egocentric view with the Vive HTC VR headset along with a Leap Motion controller. In this demo, a random forest is used to classify the 26 letters of the alphabet, in American Sign Language, from hand-crafted features extracted from the Leap Motion controller. We detail offline classification results showing the expressive power of the features used for recognition.", "fno": "307900a185", "keywords": [ "Feature Extraction", "Handicapped Aids", "Image Classification", "Natural Language Processing", "Random Forests", "Sign Language Recognition", "Virtual Reality", "Leap Motion Controller", "Virtual Reality", "Real Time System", "Signal Language Recognition", "Egocentric View", "Vive HTC VR Headset", "Random Forest", "American Sign Language", "Hand Crafted Feature Extraction", "Sign Language Recognition", "Gesture Recognition", "Assistive Technology", "Feature Extraction", "Real Time Systems", "Random Forests", "Face Recognition", "Virtual Environments" ], "authors": [ { "affiliation": "University of South Florida,Computer Science and Engineering,Tampa,Florida", "fullName": "Jacob Schioppo", "givenName": "Jacob", "surname": "Schioppo", "__typename": "ArticleAuthorType" }, { "affiliation": "University of South Florida,Computer Science and Engineering,Tampa,Florida", "fullName": "Zachary Meyer", "givenName": "Zachary", "surname": "Meyer", "__typename": "ArticleAuthorType" }, { "affiliation": "University of South Florida,Computer Science and Engineering,Tampa,Florida", "fullName": "Diego Fabiano", "givenName": "Diego", "surname": "Fabiano", "__typename": "ArticleAuthorType" }, { "affiliation": "University of South Florida,Computer Science and Engineering,Tampa,Florida", "fullName": "Shaun Canavan", "givenName": "Shaun", "surname": "Canavan", "__typename": "ArticleAuthorType" } ], "idPrefix": "fg", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2020-11-01T00:00:00", "pubType": "proceedings", "pages": "917-917", "year": "2020", "issn": null, "isbn": "978-1-7281-3079-8", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "307900a184", "articleId": "1kecHZOOSac", "__typename": "AdjacentArticleType" }, "next": { "fno": "307900a327", "articleId": "1kecI9LUOWs", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2017/6647/0/07892309", "title": "Data fragment: Virtual reality for viewing and querying large image sets", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892309/12OmNqFrGve", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icsiit/2017/9899/0/9899a001", "title": "Gesture Recognition for Indonesian Sign Language Systems (ISLS) Using Multimodal Sensor Leap Motion and Myo Armband Controllers Based-on Naïve Bayes Classifier", "doi": null, "abstractUrl": "/proceedings-article/icsiit/2017/9899a001/12OmNxEjYcd", "parentPublication": { "id": "proceedings/icsiit/2017/9899/0", "title": "2017 International Conference on Soft Computing, Intelligent System and Information Technology (ICSIIT)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2017/3588/0/3588a001", "title": "Gesture-Based Manipulation of Virtual Terrains on an Augmented Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/svr/2017/3588a001/12OmNxzMnKG", "parentPublication": { "id": "proceedings/svr/2017/3588/0", "title": "2017 19th Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2022/8402/0/840200a866", "title": "Irish Sign Language in a Virtual Reality Environment", "doi": null, "abstractUrl": "/proceedings-article/vrw/2022/840200a866/1CJdanxd9W8", "parentPublication": { "id": "proceedings/vrw/2022/8402/0", "title": "2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icvrv/2017/2636/0/263600a180", "title": "A Chinese Sign Language Recognition System Using Leap Motion", "doi": null, "abstractUrl": "/proceedings-article/icvrv/2017/263600a180/1ap5CgJ7w7S", "parentPublication": { "id": "proceedings/icvrv/2017/2636/0", "title": "2017 International Conference on Virtual Reality and Visualization (ICVRV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798241", "title": "A Collaborative Virtual Reality Escape Room with Passive Haptics", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798241/1cJ12YU0C1G", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/svr/2018/0604/0/060400a001", "title": "Prior Experience as an Influencer in the Momentary User Experience: An Assessment in Immersive Virtual Reality Game Context", "doi": null, "abstractUrl": "/proceedings-article/svr/2018/060400a001/1cJ7zP2WN0c", "parentPublication": { "id": "proceedings/svr/2018/0604/0", "title": "2018 20th Symposium on Virtual and Augmented Reality (SVR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vrw/2020/6532/0/09090472", "title": "Natural user Interfaces for Mixed Reality: Controlling Virtual Objects with your Real Hands", "doi": null, "abstractUrl": "/proceedings-article/vrw/2020/09090472/1jIxrhSDKgw", "parentPublication": { "id": "proceedings/vrw/2020/6532/0", "title": "2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/icmeae/2019/6037/0/09140172", "title": "Toward a Mexican Sign Language System using Human Computer Interface", "doi": null, "abstractUrl": "/proceedings-article/icmeae/2019/09140172/1lu6Wbmibok", "parentPublication": { "id": "proceedings/icmeae/2019/6037/0", "title": "2019 International Conference on Mechatronics, Electronics and Automotive Engineering (ICMEAE)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2022/12/09440798", "title": "Robust Optical Based Hand Interaction for Virtual Reality", "doi": null, "abstractUrl": "/journal/tg/2022/12/09440798/1tTpcF5rJTy", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "13bd1eJgoia", "title": "2018 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "acronym": "vr", "groupId": "1000791", "volume": "0", "displayVolume": "0", "year": "2018", "__typename": "ProceedingType" }, "article": { "id": "13bd1ftOBDh", "doi": "10.1109/VR.2018.8446477", "title": "Auto-Scaled Full Body Avatars for Virtual Reality: Facilitating Interactive Virtual Body Modification", "normalizedTitle": "Auto-Scaled Full Body Avatars for Virtual Reality: Facilitating Interactive Virtual Body Modification", "abstract": "Virtual reality avatars and the illusion of virtual body ownership are increasingly attracting attention from researchers [1] [2]. As a continuation to our previous work with avatars [3], we updated our existing RUIS for Unity toolkit [4] with new capabilities that facilitate the creation of virtual reality applications with adaptive and customizable avatars.", "abstracts": [ { "abstractType": "Regular", "content": "Virtual reality avatars and the illusion of virtual body ownership are increasingly attracting attention from researchers [1] [2]. As a continuation to our previous work with avatars [3], we updated our existing RUIS for Unity toolkit [4] with new capabilities that facilitate the creation of virtual reality applications with adaptive and customizable avatars.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "Virtual reality avatars and the illusion of virtual body ownership are increasingly attracting attention from researchers [1] [2]. As a continuation to our previous work with avatars [3], we updated our existing RUIS for Unity toolkit [4] with new capabilities that facilitate the creation of virtual reality applications with adaptive and customizable avatars.", "fno": "08446477", "keywords": [ "Avatars", "Human Computer Interaction", "Auto Scaled Full Body Avatars", "Interactive Virtual Body Modification", "Virtual Reality Avatars", "Virtual Body Ownership", "Adaptive Avatars", "Customizable Avatars", "RUIS", "Unity Toolkit", "Avatars", "Tracking", "Three Dimensional Displays", "Torso", "Computer Science", "Mirrors" ], "authors": [ { "affiliation": "Department of Computer Science, Aalto University, Finland", "fullName": "Tuukka M. Takala", "givenName": "Tuukka M.", "surname": "Takala", "__typename": "ArticleAuthorType" }, { "affiliation": null, "fullName": "Heikki Heiskanen", "givenName": "Heikki", "surname": "Heiskanen", "__typename": "ArticleAuthorType" } ], "idPrefix": "vr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2018-03-01T00:00:00", "pubType": "proceedings", "pages": "1-1", "year": "2018", "issn": null, "isbn": "978-1-5386-3365-6", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [], "adjacentArticles": { "previous": { "fno": "08446527", "articleId": "13bd1fdV4lV", "__typename": "AdjacentArticleType" }, "next": { "fno": "08446469", "articleId": "13bd1eSlysL", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/vr/2016/0836/0/07504735", "title": "FaceBo: Real-time face and body tracking for faithful avatar synthesis", "doi": null, "abstractUrl": "/proceedings-article/vr/2016/07504735/12OmNBRbkpf", "parentPublication": { "id": "proceedings/vr/2016/0836/0", "title": "2016 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2015/1727/0/07223377", "title": "Avatar embodiment realism and virtual fitness training", "doi": null, "abstractUrl": "/proceedings-article/vr/2015/07223377/12OmNCcKQFn", "parentPublication": { "id": "proceedings/vr/2015/1727/0", "title": "2015 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2017/6647/0/07892339", "title": "Simulating anthropomorphic upper body actions in virtual reality using head and hand motion data", "doi": null, "abstractUrl": "/proceedings-article/vr/2017/07892339/12OmNCmGO1G", "parentPublication": { "id": "proceedings/vr/2017/6647/0", "title": "2017 IEEE Virtual Reality (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2018/04/08263407", "title": "The Impact of Avatar Personalization and Immersion on Virtual Body Ownership, Presence, and Emotional Response", "doi": null, "abstractUrl": "/journal/tg/2018/04/08263407/13rRUILtJqW", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "trans/tg/2013/04/ttg2013040597", "title": "Drumming in Immersive Virtual Reality: The Body Shapes the Way We Play", "doi": null, "abstractUrl": "/journal/tg/2013/04/ttg2013040597/13rRUwbs20V", "parentPublication": { "id": "trans/tg", "title": "IEEE Transactions on Visualization & Computer Graphics", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cw/2018/7315/0/731500a229", "title": "REVAM: A Virtual Reality Application for Inducing Body Size Perception Modifications", "doi": null, "abstractUrl": "/proceedings-article/cw/2018/731500a229/17D45XeKgnO", "parentPublication": { "id": "proceedings/cw/2018/7315/0", "title": "2018 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2022/9617/0/961700a843", "title": "Redirecting Desktop Interface Input to Animate Cross-Reality Avatars", "doi": null, "abstractUrl": "/proceedings-article/vr/2022/961700a843/1CJcxEyRQ64", "parentPublication": { "id": "proceedings/vr/2022/9617/0", "title": "2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798169", "title": "Stand-alone, Wearable System for Full Body VR Avatars: Towards Physics-based 3D Interaction", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798169/1cJ126EVaVi", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/ismar/2020/8508/0/850800a462", "title": "Body Weight Perception of Females using Photorealistic Avatars in Virtual and Augmented Reality", "doi": null, "abstractUrl": "/proceedings-article/ismar/2020/850800a462/1pysu9tPcGc", "parentPublication": { "id": "proceedings/ismar/2020/8508/0", "title": "2020 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2021/1838/0/255600a065", "title": "The Embodiment of Photorealistic Avatars Influences Female Body Weight Perception in Virtual Reality", "doi": null, "abstractUrl": "/proceedings-article/vr/2021/255600a065/1tuAAOZpdoQ", "parentPublication": { "id": "proceedings/vr/2021/1838/0", "title": "2021 IEEE Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }
{ "proceeding": { "id": "1yeHGyRsuys", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "acronym": "cvpr", "groupId": "1000147", "volume": "0", "displayVolume": "0", "year": "2021", "__typename": "ProceedingType" }, "article": { "id": "1yeILFPUeE8", "doi": "10.1109/CVPR46437.2021.00511", "title": "StylePeople: A Generative Model of Fullbody Human Avatars", "normalizedTitle": "StylePeople: A Generative Model of Fullbody Human Avatars", "abstract": "We propose a new type of full-body human avatars, which combines parametric mesh-based body model with a neural texture. We show that with the help of neural textures, such avatars can successfully model clothing and hair, which usually poses a problem for mesh-based approaches. We also show how these avatars can be created from multiple frames of a video using backpropagation. We then propose a generative model for such avatars that can be trained from datasets of images and videos of people. The generative model allows us to sample random avatars as well as to create dressed avatars of people from one or few images. The code for the project is available at saic-violet.github.io/style-people.", "abstracts": [ { "abstractType": "Regular", "content": "We propose a new type of full-body human avatars, which combines parametric mesh-based body model with a neural texture. We show that with the help of neural textures, such avatars can successfully model clothing and hair, which usually poses a problem for mesh-based approaches. We also show how these avatars can be created from multiple frames of a video using backpropagation. We then propose a generative model for such avatars that can be trained from datasets of images and videos of people. The generative model allows us to sample random avatars as well as to create dressed avatars of people from one or few images. The code for the project is available at saic-violet.github.io/style-people.", "__typename": "ArticleAbstractType" } ], "normalizedAbstract": "We propose a new type of full-body human avatars, which combines parametric mesh-based body model with a neural texture. We show that with the help of neural textures, such avatars can successfully model clothing and hair, which usually poses a problem for mesh-based approaches. We also show how these avatars can be created from multiple frames of a video using backpropagation. We then propose a generative model for such avatars that can be trained from datasets of images and videos of people. The generative model allows us to sample random avatars as well as to create dressed avatars of people from one or few images. The code for the project is available at saic-violet.github.io/style-people.", "fno": "450900f147", "keywords": [ "Avatars", "Backpropagation", "Clothing", "Feature Extraction", "Image Colour Analysis", "Image Motion Analysis", "Image Texture", "Video Signal Processing", "Generative Model", "Fullbody Human Avatars", "Parametric Mesh Based Body Model", "Neural Texture", "Mesh Based Approaches", "Sample Random Avatars", "Dressed Avatars", "Style People", "Hair", "Geometry", "Computer Vision", "Avatars", "Computational Modeling", "Clothing", "Video Sequences" ], "authors": [ { "affiliation": "Samsung AI Center,Moscow", "fullName": "Artur Grigorev", "givenName": "Artur", "surname": "Grigorev", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung AI Center,Moscow", "fullName": "Karim Iskakov", "givenName": "Karim", "surname": "Iskakov", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung AI Center,Moscow", "fullName": "Anastasia Ianina", "givenName": "Anastasia", "surname": "Ianina", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung AI Center,Moscow", "fullName": "Renat Bashirov", "givenName": "Renat", "surname": "Bashirov", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung AI Center,Moscow", "fullName": "Ilya Zakharkin", "givenName": "Ilya", "surname": "Zakharkin", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung AI Center,Moscow", "fullName": "Alexander Vakhitov", "givenName": "Alexander", "surname": "Vakhitov", "__typename": "ArticleAuthorType" }, { "affiliation": "Samsung AI Center,Moscow", "fullName": "Victor Lempitsky", "givenName": "Victor", "surname": "Lempitsky", "__typename": "ArticleAuthorType" } ], "idPrefix": "cvpr", "isOpenAccess": false, "showRecommendedArticles": true, "showBuyMe": true, "hasPdf": true, "pubDate": "2021-06-01T00:00:00", "pubType": "proceedings", "pages": "5147-5156", "year": "2021", "issn": null, "isbn": "978-1-6654-4509-2", "notes": null, "notesType": null, "__typename": "ArticleType" }, "webExtras": [ { "id": "1yeILxNKdmU", "name": "pcvpr202145090-09578099s1-mm_450900f147.zip", "size": "17.9 MB", "location": "https://www.computer.org/csdl/api/v1/extra/pcvpr202145090-09578099s1-mm_450900f147.zip", "__typename": "WebExtraType" } ], "adjacentArticles": { "previous": { "fno": "450900f137", "articleId": "1yeHPjaFH4A", "__typename": "AdjacentArticleType" }, "next": { "fno": "450900f157", "articleId": "1yeHISakMXS", "__typename": "AdjacentArticleType" }, "__typename": "AdjacentArticlesType" }, "recommendedArticles": [ { "id": "proceedings/cw/2017/2089/0/2089a178", "title": "A Method for Autonomous Positioning Avatars in a Group", "doi": null, "abstractUrl": "/proceedings-article/cw/2017/2089a178/12OmNAle6XI", "parentPublication": { "id": "proceedings/cw/2017/2089/0", "title": "2017 International Conference on Cyberworlds (CW)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2018/8425/0/842500a098", "title": "Detailed Human Avatars from Monocular Video", "doi": null, "abstractUrl": "/proceedings-article/3dv/2018/842500a098/17D45Vw15t7", "parentPublication": { "id": "proceedings/3dv/2018/8425/0", "title": "2018 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600s8632", "title": "Neural Head Avatars from Monocular RGB Videos", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600s8632/1H1htwlAaNa", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600u0438", "title": "PINA: Learning a Personalized Implicit Neural Avatar from a Single RGB-D Video Sequence", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600u0438/1H1k1cLWWWI", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2022/6946/0/694600u0395", "title": "gDNA: Towards Generative Detailed Neural Avatars", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2022/694600u0395/1H1kTUQK6Xe", "parentPublication": { "id": "proceedings/cvpr/2022/6946/0", "title": "2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/3dv/2022/5670/0/567000a197", "title": "HVTR: Hybrid Volumetric-Textural Rendering for Human Avatars", "doi": null, "abstractUrl": "/proceedings-article/3dv/2022/567000a197/1KYsovTRTC8", "parentPublication": { "id": "proceedings/3dv/2022/5670/0", "title": "2022 International Conference on 3D Vision (3DV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/vr/2019/1377/0/08798122", "title": "An Initial Investigation into Stereotypical Influences on Implicit Racial Bias and Embodied Avatars", "doi": null, "abstractUrl": "/proceedings-article/vr/2019/08798122/1cJ0MR4xjWg", "parentPublication": { "id": "proceedings/vr/2019/1377/0", "title": "2019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/wacv/2021/0477/0/047700b809", "title": "SMPLpix: Neural Avatars from 3D Human Models", "doi": null, "abstractUrl": "/proceedings-article/wacv/2021/047700b809/1uqGEOYnosg", "parentPublication": { "id": "proceedings/wacv/2021/0477/0", "title": "2021 IEEE Winter Conference on Applications of Computer Vision (WACV)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900l1728", "title": "Pixel-aligned Volumetric Avatars", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900l1728/1yeHX163Xnq", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" }, { "id": "proceedings/cvpr/2021/4509/0/450900a064", "title": "Pixel Codec Avatars", "doi": null, "abstractUrl": "/proceedings-article/cvpr/2021/450900a064/1yeMmobLlwQ", "parentPublication": { "id": "proceedings/cvpr/2021/4509/0", "title": "2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)", "__typename": "ParentPublication" }, "__typename": "RecommendedArticleType" } ], "articleVideos": [] }