Proceedings of the 1st International Conference on Information Technologies in Education and Learning

Session: computer session

9 articles
Proceedings Article

A novel object detection technique for dynamic scene

Xiu Li, Liansheng Chen, Zhixiong Yang, Wanlu Zhang
Object detection in video streams plays an important role in many computer vision applications and background subtraction is the most popular method which compares each new frame to a model of the background. However, the static background is practically impossible and dynamic background makes the perfect...
Proceedings Article

An Approach for Reducing the Numeric Rating Bias

Xiu Li, Huimin Wang, Jian Xu
There is bias in customer reviews and the associated ratings. We propose a method to identify and reduce such bias on the part of reviewers. There are three phases in our approach. Firstly, we conduct Rating-aware sentiment analysis for each review text accompanied with the numeric ratings. Then, we...
Proceedings Article

Joint Depth Map Upsampling via Prior Minimum Spanning Tree

Xiu Li, Zhixiong Yang, Lulu Xie
Depth map is the fundamental of various 3D applications. While consumer-level depth cameras have gained much attention recently due to their affordable cost, the low resolution and bad quality of depth maps generated by them have obstructed their applications in practice. In this paper, we propose a...
Proceedings Article

Research and development on ticketing system based on SQL database

Yuntao Duan, Siping Hu
Currently, all of the transport sectors such as the aviation, rail, highway, marine and other areas' automated ticketing system have been basically able to quickly meet the needs of people-smart, saving manpower and material resources. However, small businesses and individuals need to further expand...
Proceedings Article

Research on Security Portocol of Scheduled Services on Cloud Computing

Yang Li, Xiang Chen, Xiaoying Lu, Yalin Xing, Chengbin Li
With the large growth of wireless sensor network, the current security architecture couldn't solve the problems. This paper provides a security protocol of scheduled service based on cloud computing. The system consists of three groups that are domain server domain register server domain and functional...
Proceedings Article

Persomalized recommendation system K-neighbor algorithm optimization

Huanming Wang, Ge Yu
This paper mainly discussed the recommended userbased collaborative filtering algoeithm. from the modeling system to generate recommeded to do a detailed discussion of the results, and pointed out the problems in the K-nearest neighbors algorithm. Proposed to the K-nearest neighbors algorithm improvement...
Proceedings Article

Voltage Sag Diagnosis Using Big Data Analysis

Bingbing Zhao, Zhongda Yuan, Junwei Cao, Huaying Zhang, Zhengguo Zhu, Senjing Yao
We propose a data-driven approach for voltage sag diagnosis in this paper. Rather than traditional features such as frequency, amplitude and duration, we apply temporal distribution as a new feature to distinguish whether the sag is caused by power system faults or heavy load switching. Sags caused by...
Proceedings Article

New Prime Factorization Algorithm and Its Parallel Computing Strategy

Lican Huang
Prime factorization is vitally important for mathematics and RSA security system. In this paper we present a new algorithm to factorize numbers and a new parallel strategy for prime factorization, which may help to find the fault of RSA system and design safer RSA keys, and to arise the discussion about...
Proceedings Article

Generating Digests From Educational Articles Automatically Based on Second Order HMM

Canli Wu, Lican Huang
Automatically generating summary of articles is very important when we encounter explosive reading information; computers can help people on text compression, extraction, representation and obtain core text content automatically. However, computer still encounters a lot of difficulties, for example,...