Loading...

Proceedings of

3rd International Conference on Advances in Computing, Communication and Information Technology CCIT 2015

Date
27-May-2015
Location
perry Barr , United Kingdom
Authors
79
ISBN
978-1-63248-061-3

26 Articles Published

1. IMPLEMENTING SIMULATION–BASED APPROACHES FOR HEALTHCARE WORKFLOW ANALYSIS THE CASE OF A DEPARTMENT OF LABORATORY MEDICINE IN SOUTH ITALY

Authors: ADRIANO TORRI , ALESSANDRO PEPINO , OSCAR TAMBURIS

Abstract: The Discrete Event Simulation (DES) approach has become a popular technique for problem solving in healthcare, as it provides a very realistic picture of the actual system. A simulation–based operational paradigm by means of the SIMUL8 software suite was implemented in the Department of Laboratory Medicine (DLM) of the "San Paolo” Hospital in Naples (Italy), as support of the Business Process Management (BPM) methodology, to analyse and improve the performances the current working performances

Keywords: Healthcare Management; Performance Evaluation; Discrete event simulation; business process management; department of laboratory medicine

Pages: 1 - 4 | DOI: 10.15224/978-1-63248-061-3-11

2. MORPHLOGICAL ASF AND K-MEANS CLUSTERING SEGMENTATION FOR TUMOR DETECTION

Authors: RADHAKRISHNAN PALANIKUMAR

Abstract: Image segmentation is important feature detection in digital image processing. Identify the significant tumor presence in brain is the most worthwhile in human beings health precaution. The medical imaging, consider the pixels of particular tumor tissues for segmentation. In this paper, we propose a method to segment the tumor using k-means clustering and morphological alternative sequential filters (ASF). There are many methods proposed but our method identifies the tumor in unique manner. Brain magnetic resonance imaging (MRI) is used to segment the tumor by the combination of k-means clustering and morphological alternative sequential filters. The results are significant for identifying tumor pixels with unique segmentation process.

Keywords: Morphological transformations; segmentation; edge detection; k-means clustering; tumor detection

Pages: 5 - 9 | DOI: 10.15224/978-1-63248-061-3-12

3. GALILEO SIGNALS ACQUISITION USING ENHANCED SUBCARRIER ELIMINATION CONVERSION AND FASTER PROCESSING

Authors: ALI ALBU-RGHAIF , HENDRIK ROGIER , IHSAN A. LAMI , MAHER AL-ABOODI , PATRICK VAN TORRE

Abstract: To solve multipath and to enhance the localisation accuracy in a harsh environment, BOC modulation has been adopted in modern GNSS transmission, such as GPS-M-code and Galileo-OS-code signals. The designers of the BOC technique have pointed out that the correlation function becomes ambiguous when the received signal is correlated with the reference BOC signal at code phase resolutions of 0.5 Chip. This has motivated many contributions to resolving this ambiguity, for example, by processing each side of the BOC lobes as a BPSK signal. Our literature survey concluded that solutions claiming to have mitigated this ambiguity actually have resulted in a more complex receiver implementation. The Enhanced Subcarrier Elimination (ESCE) method detailed in this paper proposes combining the two side lobes into a single lobe centered at the main frequency, thus gaining 2dB more signal power as well as reducing the correlation requirements (signal’s mixing and transforming operations) to the half;

Keywords: BOC modulation; Unambiguous Galileo signal Subcarrier elimination;

Pages: 10 - 14 | DOI: 10.15224/978-1-63248-061-3-13

4. OGSR: A LOW COMPLEXITY GALILEO SOFTWARE RECEIVER USING ORTHOGONAL DATA AND PILOT CHANNELS

Authors: ALI ALBU-RGHAIF , IHSAN A. LAMI , MAHER AL-ABOODI

Abstract: To improve localisation accuracy and multipath rejection, the Galileo-OS signal offers a new modulation with efficient power distribution technique between the two data and pilot navigation components. To achieve the full benefits of this modulation, a robust acquisition and tracking methods must be deployed. For example, using two parallel correlation channels to acquire these data and pilot will gain 3dB over using a single channel acquisition correlating with either one of them. However, dual channel SW receivers cost more processing overheads. In this paper, the authors propose to orthogonalise the received data and pilot signals so to enable their acquisition in a single correlation channel bandpass sampling receiver. Our simulation results, using Simulink, prove that OGSR performance is maintained (preserving the 3dB gain) with less processing time while the implementation complexity is reduced by 50%.

Keywords: Composite BOC; Galileo Acquisition; Orthogonaldata-pilot;

Pages: 15 - 19 | DOI: 10.15224/978-1-63248-061-3-14

5. FIRST HOP REDUNDANCY PROTOCOLS IN IPV6 NETWORK ASSESSMENT USING CISCO INTERNETWORKING DEVICES

Authors: ADAM RATAJ , MACIEJ ROSTANSKI

Abstract: The article presents first hop redundancy concept and the means for its realization in IPv6 network. The research regarding the performance comparison and challenges and issues regarding different solutions is revealed and conclusions are shown. The implementation based on Cisco internetworking devices was chosen, including HSRP and GLBP protocols, as well as built-in IPv6 method for router discovery - NDP protocol.

Keywords: IPv6, Computer Networks, Availability, FHRP, NDP

Pages: 20 - 24 | DOI: 10.15224/978-1-63248-061-3-15

6. FIRST HOP REDUNDANCY PROTOCOLS IN IPV6 NETWORK ASSESSMENT USING CISCO INTERNETWORKING DEVICES

Authors: IVAN GLESK , MD SHAKIL AHMED

Abstract: Achieving effective solution for lasing on Silicon is a critical and important step for the successful implementation of Photonic Integrated Circuits in our quest to develop the next generation of ultrahigh bandwidth communication devices. In this overview paper various options of hybrid, monolithic and rare earth doping are discussed with the aim to offer the latest state-of-the-art on this topic. Monolithic integration of particular composition of Gallium and its alloys having the direct bandgap property and lattice constant similarity with silicon has been shown as promising. This is then compared with a Rare Earth doped Gallium Nitride approach as another possibility for the ‘lasing on silicon’ solution.

Keywords: gallium alloys, lasing on silicon, integrated optics, telecommunication

Pages: 25 - 29 | DOI: 10.15224/978-1-63248-061-3-16

7. BIOMETRIC AUTHENTICATION AN INTRODUCTION

Authors: K.R.BADHITI

Abstract: Providing security has become a challenging factor in today’s advanced computerized engineering and Technological environment. Traditional methods like memorizing passwords, carrying ID cards have their own draw backs. Biometric Authentication has become more and more reliable, secured and most convenient tool. Simply Biometrics refers to establishing identity based on the physical and behavioral characteristics of an individual such as face, fingerprint, hand geometry, iris, keystroke, signature, voice, etc. Biometric systems offer several advantages over traditional authentication schemes. They are inherently more reliable than password-based authentication as Biometric traits cannot be lost or forgotten.This paper explains various Biometric Traits which helps in authentication process and explain how iris is more reliable,when compared with other Biometrictraits.

Keywords: BiometricAuthentication,Traditional Authentication,Biometric Traits

Pages: 30 - 34 | DOI: 10.15224/978-1-63248-061-3-17

8. SIMULTANEOUS SIGNAL SEPARATION AND DENOISING IN DCT DOMAIN FOR WIRELESS COMMUNICATION APPLICATIONS

Authors: F. E. ABD EL-SAMIE , M. ELKORDY , O. ZAHRAN , R. ALI

Abstract: This paper addresses the problem of blind signal separation (BSS) for the system of multiple input and multiple output signals (MIMO). Different modulation techniques such as quadrature phase shift keying (QPSK), minimum shift keying (MSK), and Gaussian minimum shift keying (GMSK) have been considered. Several methods have been investigated to solve this problem such as principle component analysis (PCA), independent component analysis (ICA), and multi user kurtosis (MUK) algorithms. Different modulation techniques and different algorithms in the separation have been investigated to for comparison between results. In this paper, we propose wavelet denoising with PCA, ICA and MUK methods. We use the separation algorithm for the discrete cosine transforms (DCT) for blind of mixed signals, instead of separating the mixtures themselves, as a technique that achieves a great result in eliminating the noise. The proposed algorithm is used with multi user kurtosis (MUK) that used for blind of

Keywords: BSS, MIMO, PCA, ICA, MUK, MSK, GMSK, QPSK, DCT MSE, SNR.

Pages: 35 - 39 | DOI: 10.15224/978-1-63248-061-3-18

9. THE IMPACT OF DIGITAL INTEGRATION FOR LIBRARY NETWORKING SERVICES IN NIGERIA: NATIONAL LIBRARY OF NIGERIA IN PERSPECTIVE

Authors: AKANMIDU , OLUMIDE JOHNSON , MBATSORON , VICTORIA MEMBER , UPEV , MICHAEL T

Abstract: Networks have changed the economics of information distribution world-wide. Once a work is put on the internet it becomes instantaneously available to millions of people. Digitalized information like the integration of Management Information System (MIS) of any given library organization has also changed the economics of information and communication flow by making works and services available to the library users as well as the staffs at the appropriate time. The advent of information and communication technologies (ICTs) has had implications for both Librarians and Library users to have easy access to information through networking services within an organization at different locations. Hence, this paper tries to assess the impact of an integrated systems of the Nigerian Libraries through Digital information in the 21st century, using National Library of Nigeria as the pace setter.

Keywords: Digital Integration Management Information Systems, Digital Library Networking, National Library of Nigeria

Pages: 40 - 44 | DOI: 10.15224/978-1-63248-061-3-19

10. THE MEDICAL MODULE FOR DISASTER INFORMATION SYSTEMS

Authors: BAHA SEN , ELIF CALIK , FATIH VEHBI CELEBI , HILAL KAYA , KEMAL AKYOL , RIDVAN ATILLA

Abstract: The aim of this study is to improve a medical module providing data flow between data center and prehospital disciplines like nearby hospitals, field hospital, temporary inhabiting areas such as tent city and vehicles for transportation by using the internet. This study is conducted by using Microsoft Access database and SQL query to inform database applications so that the real-time information flow between health care experts and health care team in the disaster area is provided. System has been created on Microsoft .Net platform using C# language. MMDIS can be used kind of a field like all the pre-hospital processes. Web application enables access to database. On the other hand, the professionals who use this application have different permissions to access this database. The professionals’ duties specify those permissions. Interfaces have been created to access the database that enables data entry, data query, data storage, delete data etc. The users’ access to the web application

Keywords: Disaster Information System, Medical Module, Disaster, Medical Informatics

Pages: 45 - 48 | DOI: 10.15224/978-1-63248-061-3-20

11. THE TYPES OF ONLINE TO OFFLINE BUSINESS MODEL

Authors: ABBY S. T. YANG , SHARI S. C

Abstract: Online-to-Offline (O2O), a brand-new business model that drives online visitors to purchase in-store by offering services online, has received a great deal of attention. The O2O business model has been adopted by companies across a variety of industries, such as Target in retailing, Uniqlo in apparel, Warby Parker in accessories and McDonald’s in food. However, less attention has been paid in the literature to the clear definition and scope of both online and offline businesses in the O2O business model, and there is limited understanding of how to build a successful O2O project. The objective of this study is to organize comprehensive information for the O2O business model and to examine the types of O2O business model. This study plans an empirical study. We build a preliminary finding regarding the 5 major types of O2O business models—(1) Commerce O2O; (2) Try-on O2O; (3) Promotional O2O; (4) Experience O2O; and (5) Crowdsourcing O2O—based on the literature and more than 50 practica

Keywords: location-based, gamification, experience, loyalty, design element,

Pages: 49 - 54 | DOI: 10.15224/978-1-63248-061-3-21

12. A SURVEY ON BOTNET COMMAND AND CONTROL TRAFFIC DETECTION

Authors: IBRAHIM GHAFIR , VACLAV PRENOSIL , JAKUB SVOBODA

Abstract: Internet users have been attacked by widespread email viruses earlier, but now scenario has been changed. Now attackers are no more interested to just attract media attention by infecting a large number of computers on the network; in fact, their interest has been shifted to compromising and controlling the infected computers for their personal profits. This new attack trend brings the concept of botnets over the global network of computers. With the high reported infection rates, the vast range of illegal activities and powerful comebacks, botnets are one of the main threats against the cyber security. This paper provides the readers with a background on botnet life-cycle, architecture and malicious activities. It also classifies botnet detection techniques, reviews the recent research works on botnet traffic detection and finally indicates some challenges posed to future work on botnet detection.

Keywords: Cyber security, malware, botnet, C&C server, intrusion detection system.

Pages: 55 - 60 | DOI: 10.15224/978-1-63248-061-3-22

13. ACCURATE AND EFFICIENT VISUAL SEARCH ON EMBEDDED SYSTEMS

Authors: A. GARBO , C. LOIACONO , D. PATTI , G. CABODI , G. FRANCINI

Abstract: Recent developments in embedded processors have enabled heterogeneous computing on mobile devices using open-access general-purpose computing languages. Following the MPEG CDVS standard, this paper presents an efficient feature computation phase, completely implemented on embedded devices supporting the OpenCL framework. Following our contribution to the MPEG-CDVS standard, we present the new born CDVS detector and its design for multicore parallel GPUs. We show how to adjust algorithmic choices and implementation details to target the intrinsic characteristics of the embedded platforms selected. We compare our GPU implementation of the ALP keypoint detector with the CPU based implementation of the CDVS standard. We present data on different GPUs showing that our solution is up to 7x faster than the CPU version. To sum up, one of the main feature of our algorithm is to be fast enough to be able to open new visual search scenarios exploiting entire real-time on-board computations with n

Keywords: image processing, visual search, feature detection, compact descriptor, general purpose GPUs, embedded systems

Pages: 61 - 66 | DOI: 10.15224/978-1-63248-061-3-23

14. GPU -BASED FUZZY C MEANS CLUSTERING MODEL FOR BRAIN MR IMAGE

Authors: CHE-LUN HUNG , CHIA-CHEN LIN , JIEH-SHAN YEH , YAW-LING LIN , YU-CHEN HU

Abstract: In the computer aided medical image process, image segmentation is always required as a preprocess stage. Fuzzy c-means (FCM) clustering algorithm has been commonly used in many medical image segmentations, particularly in the analysis of magnetic resonance (MR) brain image. However, all of these FCM methods are computation consuming that is difficult to be used in real time application. In the paper, we proposed a Parallel FCM algorithm based on graphic process units (GPUs) to accelerate computation speed of timeconsuming FCM applications. The experimental results show that the proposed algorithm can reduce the computational cost dramatically.

Keywords: Fuzzy C-Means, Magnetic Resonanace, Brain, White Matter, GPU, Parallel Processing

Pages: 67 - 71 | DOI: 10.15224/978-1-63248-061-3-24

15. EVALUATION OF MOBILE HEALTHCARE COMMUNICATION SYSTEM

Authors: MASUMI YAJIMA , TOSHIYUKI MAEDA , YAE FUKUSHIGE

Abstract: —mobile communication, healthcare support, email-based communication, system evaluation This paper addresses a new healthcare communication system based on email communication, which is designed and developed from view of previous research results and problems. The system is an email-based communication independent with the sorts of terminals, based on mailing-list system and approved various communications by one-stop account, and offers users' availability for checking their own data which is reflected by every day's reply data, and daily mails have many variations because they are not automatically sent but nurses writes and sends every day, which let emails not routinely but humane and improved. We have evaluated the system by the operation test, where we have many important data and discussion.

Keywords: mobile communication, healthcare support, email-based communication, system evaluation

Pages: 72 - 75 | DOI: 10.15224/978-1-63248-061-3-25

16. AN INTELLIGENT METHOD OF INFORMATION PROVISIONING IN AN ACADEMIC SOCIAL NETWORK

Authors: PALLAPA VENKATARAM , SWAPNIL S. NINAWE

Abstract: The rapid development of communication and networking has lessened geographical boundaries further to social networking, which enables to set up relations among people who share common interests, activities or connections. In social networks, actors (or people) often want to acquire information based on their activities, education, role, etc. The social network concept handles human relationships in networks efficiently to achieve the information provision. Due to advent of social networks, the need for flexible, adaptable and rapid response time to information provision has become increasingly important. An academic social network is grouping of a specific academic faculty group members at different levels. For example, a communication group in a research institution could have the members like professor, faculty, research students, graduate students, project staff, lab assistants, etc. At each level group members, they need relevant information on the projects currently leading on el

Keywords: information, actor, relation, level, social network

Pages: 76 - 80 | DOI: 10.15224/978-1-63248-061-3-26

17. UNDERSTANDING INTUITIVE USE OF SCREEN-BASED USER INTERFACES IN A SKILLED WORKER ENVIRONMENT

Authors: STURLA BAKKE

Abstract: n this paper, I discuss some aspects of the possible relationship between participatory design and its implications for the actual end state of the graphical user interface and its capacity for intuitive use. This paper discuss the relation between users’ skills and an employed tool, and how we might support the notion of intuitive action through the user interface in a human-computer interaction context. This paper briefly investigate the possible connection between mutual learning in user/designer relationship, which is a central concept in participatory design and the extent to which the final version of a computer system supports intuitive flow in the interaction between user and tool. This paper suggests that a participatory design approach may have a positive impact on the perceived intuitive use of user interfaces, and that co-location may be a prerequisite for the sufficient exchange of information needed for mutual learning to occur

Keywords: intuitive use of user interfaces, participatory design, mutual learning, co-location.

Pages: 81 - 87 | DOI: 10.15224/978-1-63248-061-3-27

18. AN EXPERIMENTAL PARAMETER VALIDATION APPROACH

Authors: A. CHATZINIKOLAOU , C. ANGELI

Abstract: The development of model-based fault detection methods for engineering systems requires a high degree of consistency between the behaviour of mathematical model and the actual system in order to produce reliable results. It means that the mathematical model must be very accurate. Due to the usually complicated equations describing the dynamic behaviour of these systems, some parameters can be roughly estimated based on the steady-state analysis. It is necessary to use alternative approaches that optimise the parameter values and make them more accurate. This paper presents a parameter validation approach that can be used in the case of incomplete information of the system state and improve the quality of a model. The approach is used for the determination of the acceptable deviation limits between model and system.

Keywords: Modelling, Simulation, Fault detection, Parameter Validation.

Pages: 88 - 92 | DOI: 10.15224/978-1-63248-061-3-54

19. THE METHOD OF PROBABILISTIC NODES COMBINATION IN 2D INFORMATION RECONSTRUCTION, OBJECT RECOGNITION AND MODELING

Authors: DARIUSZ JACEK JAKOBCZAK

Abstract: Proposed method, called Probabilistic Nodes Combination (PNC), is the method of 2D curve modeling and handwriting identification by using the set of key points. Nodes are treated as characteristic points of signature or handwriting for modeling and writer recognition. Identification of handwritten letters or symbols need modeling and the model of each individual symbol or character is built by a choice of probability distribution function and nodes combination. PNC modeling via nodes combination and parameter γ as probability distribution function enables curve parameterization and interpolation for each specific letter or symbol. Two-dimensional curve is modeled and interpolated via nodes combination and different functions as continuous probability distribution functions: polynomial, sine, cosine, tangent, cotangent, logarithm, exponent, arc sin, arc cos, arc tan, arc cot or power function.

Keywords: handwriting identification, shape modeling, curve interpolation, PNC method, nodes combination, probabilistic modeling

Pages: 93 - 98 | DOI: 10.15224/978-1-63248-061-3-55

20. VIRTUAL SAILING COPILOT

Authors: C. CALLES-ARRIAGA , L. BORTONI-ANZURES , M. HERNANDEZ-ORDONEZ

Abstract: This paper does an inventory of the navigation systems under development which promise to be key systems in the following decades. But the main aim of the article is to add some complementary tools of the spot light to the navigation systems to assure they arrive at the port, based on information technologies and social structures. Weather Information, conditions of the infrastructure and social movements may be sources of efforts to improve a mature technology. The Global Positioning System shows you the way to get there, but the virtual sailing master shows you how to get there.

Keywords: navigation, driver asistence, copilot.

Pages: 99 - 103 | DOI: 10.15224/978-1-63248-061-3-64

21. FINANCIAL MARKET FLUCTUATIONS IN ECONOPHYSICS: FTSE, DJIA & BIST-100

Authors: CEM CAGRI DONMEZ , TOLGA ULUSOY

Abstract: This article aims at reviewing recent empirical and theoretical structures of entropy, temperature and energy of stock markets in the manner of statistical physics are obtained. What are the main characteristics of Econophysics? In what follows, we will try to summarise some basic principles. Each of them will be illustrated by one or several researches performed by econophysicists. On the basis of some hypothesis of quantum mechanics, this paper considers stock markets as quantum systems and investors as particles. A quantum model of stock price fluctuations is defined in a theoretical framework. Essentially, the models are based upon models of statistical physics and quantum mechanics in which energy is conserved in exchange processes. The relative entropy is used as a measure of stability and maturity of financial markets from financial information about some considered emerging markets (Turkey) and some considered mature markets (England, United States). The model analytically calc

Keywords: Finance, Physics, Econophysics, Entropy, Temperature and energy of stock markets

Pages: 104 - 110 | DOI: 10.15224/978-1-63248-061-3-65

22. TRUST RELATIONSHIP MODEL TO ENHANCE SECURITY AND PRIVACY FOR CLOUD ENVIRONMENT

Authors: DANA AL-TEHMAZI , HUDA AL-JOBORI

Abstract: These days the common term used for distinguishing the services such as availability, data mobility, cost effective, privacy and security is “Cloud Computing Technology”. Cloud computing can solve technical issues, reduce organization cost, and make data available anytime, anywhere. Like many technologies, cloud computing is facing lot of challenges; one of these challenges is “Trust relationship”. In this paper we will propose a model called “Cloud Computing Trust Relationship Model (CCTRM)”. This model will enhance the security and privacy for cloud computing environment. CCTRM model will be used in telecommunication and nontelecommunication organizations, governments sectors, and private sectors to implement trust relationship between them and cloud computing service providers. This trust will allow the organization to obtain cloud computing services safely without the need to be worry about security and privacy on their cloud.

Keywords: Cloud Computing, Trust Relationship, Trust Model, Infrastructures as a Service.

Pages: 111 - 117 | DOI: 10.15224/978-1-63248-061-3-69

23. NETWORK MONITORING APPROACHES: AN OVERVIEW

Authors: VACLAV PRENOSIL , IBRAHIM GHAFIR , JAKUB SVOBODA

Abstract: Network monitoring and measurement have become more and more important in a modern complicated network. In the past, administrators might only monitor a few network devices or less than a hundred computers. The network bandwidth may be just 10 or 100 Mbps; however, now administrators have to deal with not only higher speed wired network (more than 10 Gbps and ATM (Asynchronous Transfer Mode) network) but also wireless networks. Network administrators are constantly striving to maintain smooth operation of their networks. Network monitoring is a set of mechanisms that allows network administrators to know instantaneous state and long-term trends of a complex computer network. This paper provides the readers with an overview of the current network monitoring approaches, their architectures, features and properties. In addition, it presents a comparison between those approaches.

Keywords: Network monitoring, traffic duplication, packet capture, deep packet inspection, flow observation.

Pages: 118 - 123 | DOI: 10.15224/978-1-63248-061-3-72

24. PRHOLO: INTERACTIVE HOLOGRAPHIC PUBLIC RELATIONS

Authors: ALDRIC NEGRIER , JANIO MONTEIRO , JOAO M.F. RODRIGUES , LUIS SOUSA , PAULO BICA , PEDRO J.S. CARDOSO , RICARDO ALVES

Abstract: The expansion from regional to global markets is nowadays a normal step in the life cycle of many successful companies. Public relations are company's first contact with potential clients, requiring them to give a small explanation but yet accurately enough on what the company does and how the client can benefit from it. By combining a 3D depth sensor with a holographic representation, an installation was developed capable of natural interaction with users, which can be configured for the company's needs, while passing important information. Users are capable of interacting with the holographic form using intuitive gestures and the system is capable to record users’ interactions, creating key statistics to return to the company about their main products, the attention given to each presented content, user’s actions, favourite menus, etc., including the creation of a personalized visitor cards with the users face.

Keywords: Human-Computer Interaction, Applications, Gesture Recognition, Holography, Computer Vision.

Pages: 124 - 128 | DOI: 10.15224/978-1-63248-061-3-74

25. A NEW FAULT TOLERANT APPROACH FOR LOAD-BALANCING IN ROUTING AND WAVELENGTH ASSIGNMENT IN WDM NETWORKS

Authors: NISHA SARWADE , SURENDRA BHOSALE

Abstract: Wavelength Division Multiplexing (WDM) technology is employed in fiber-optic communication systems to multiplex optical carrier signals to a single optical fiber using different wavelengths. Fault tolerance is an important parameter in WDM networks. When a fault occurs the network requires a fault tolerance technique to repair the fault. In this paper, a new fault tolerance technique is proposed for the load balancing routing and wavelength assignment (RWA) problem. In RWA problem the fault protection issue is alienated to fault tolerant routing and fault tolerant wavelength assignment for traffic in WDM networks. The wavelength assignment is done using an advanced reservation algorithm. In routing, the primary path is set by applying max-flow load balancing technique. Then a backup path is computed for handling the link failures based on the class of request. The backup path is used for link restoration when primary path fails. Based on the class, we find the available bandwidth for b

Keywords: WDM networks, Fault Tolerance, Routing and Wavelength Assignment (RWA)

Pages: 129 - 133 | DOI: 10.15224/978-1-63248-061-3-75

26. DIALECTICAL POLYPTYCH: AN INTERACTIVE MOVIE

Authors: BRUNO SILVA , JOAO M.F. RODRIGUES , RUI ANTONIO

Abstract: Most of the known video games developed by big software companies usually establish an approach to the cinematic language in an attempt to create a perfect combination of narrative, visual technique and interaction. Unlike most video games, interactive film narratives normally involve an interruption in time whenever the spectator has to make choices. “Dialectical Polyptych” is an interactive movie included in a project called “Characters looking for a spectactor”, which aims to give the spectator on-the-fly control over film editing, thus exploiting the role of the spectator as an active subject in the presented narrative. This paper presents a system based on a 3D sensor for tracking the spectator's movements and positions, which allows seamless real-time interactivity with the movie. Different positions of the body prompt a change in the angle or shot within each narrative, and hand swipes allow the spectator to alternate between the two parallel narratives, both producing a complem

Keywords: Audiovisual, Interactive film, Multinarrative, 3D sensors

Pages: 134 - 138 | DOI: 10.15224/978-1-63248-061-3-83

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study