2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing最新文献

筛选
英文 中文
Acupoint Teaching System Based on Android 基于Android的穴位教学系统
Zhixiang Zhang, Ziming Zhang, Yuhui Gao, Xin Zhi, Jianfei Zhao
{"title":"Acupoint Teaching System Based on Android","authors":"Zhixiang Zhang, Ziming Zhang, Yuhui Gao, Xin Zhi, Jianfei Zhao","doi":"10.1109/IIH-MSP.2013.60","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.60","url":null,"abstract":"According to the good visualization interface and WiFi wireless function of the Android, We put forward a kind of pressure strength training system for medical students teaching, formulating the basic standards of the pressing position and the strength on the acupoint by experienced doctors, aims to training qualified students. Firstly using a low-power STM32 family of processors to complete data collection and AD conversion, and then develop Android mobile terminal software, as a visual teaching interface. We get the medical teaching purposes by interactive feedback wireless communication.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-channel LED Driver with PWM Dimming and Temperature Self-Protection 多通道LED驱动器与PWM调光和温度自我保护
Shih-Chang Hsia, Jyun-Jia Ciou, Sheng-Yueh Lai
{"title":"Multi-channel LED Driver with PWM Dimming and Temperature Self-Protection","authors":"Shih-Chang Hsia, Jyun-Jia Ciou, Sheng-Yueh Lai","doi":"10.1109/IIH-MSP.2013.34","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.34","url":null,"abstract":"In this paper, we propose a novel LED driver chip for multi-channels based on current mirrors. The driver can change the LED brightness with a pulse width modulation (PWM). The chip built a four-order temperature sensor for chip protection. The chip is implemented with TSMC 0.25 UM CMOS HIGH VOLTAGE MIXED SIGNAL BASED. Using 60V power MOS for two channels LED driver, this chip can drive 120W LED string for smart street lighting. The chip core occupied about 1215um x 900um silicon area. The driving efficiency can achieve up to near 90%.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129678090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Integrated Framework for Disaster Event Analysis in Big Data Environments 大数据环境下灾害事件分析集成框架
P. Tin, Thi Thi Zin, T. Toriu, H. Hama
{"title":"An Integrated Framework for Disaster Event Analysis in Big Data Environments","authors":"P. Tin, Thi Thi Zin, T. Toriu, H. Hama","doi":"10.1109/IIH-MSP.2013.72","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.72","url":null,"abstract":"Today world has witnessed the catastrophic consequences of natural and man-made disasters are demanding the urgent need for more research to advance fundamental knowledge and innovation for disaster prevention, mitigation and management. At the same time, the world is in the age of the Big Data revolution which holds the potential to mitigate the effects of disaster events by enabling access to critical real time information. Thus, in this paper an integrated framework for analyzing disaster events by using the Big Data analytics is proposed. The proposed framework shall address three key components to perform data organization, data integration and analysis, information presentation to users by utilizing Big Data with respect to disaster events. In doing so, the paper shall create a disaster domain-specific search engine using co-occurring theory and Markov chain concepts for preparing impacts of disaster attacks to make the society better aware of the situations. Specifically, stochastic clustering with constraints is used to automatically extract disaster events by defining the set of structural attributes. Some illustrative simulations are shown by using Big Data sources for the Great East Japan earthquake, tsunami and nuclear disaster events of 2011.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130597516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Designing and Realization of 3D Video Capture and Transfer System Based on Kinect 基于Kinect的三维视频采集与传输系统的设计与实现
Meng Yao, Ke-bin Jia
{"title":"Designing and Realization of 3D Video Capture and Transfer System Based on Kinect","authors":"Meng Yao, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.44","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.44","url":null,"abstract":"This paper presents the design and implementation of a real-time 3D video capture and transfer system based on Microsoft Kinect. On the collecting layer, multiple views of texture images and depth images are acquired by 3 Kinect cameras, which are placed as a parallel array. Hole filling and noise filtering techniques are used to fill holes and smooth noise in depth image on the processing layer. On the coding layer, video stream is processed using stereo video coding or multi-view video plus depth coding methods to deal with the huge amounts of data, and then transported in network on the transport layer. At last, media stream is decoded at the decoder layer, and shown on the stereoscopic display. Experimental results show that the proposed system presented in this paper can be well effective to fill the holes and reduce the noise for depth image. Stereo video coding and multi-view video plus depth coding method are also included in this system. This system can be applied to 3D video conferences, 3D entertainment and 3D security monitoring, etc.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131660200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption in High Dynamic Range Images for RGBE Format RGBE格式的高动态范围图像加密
Jing-Ya Yan, Tzungher Chen, Chih-Hung Lin
{"title":"Encryption in High Dynamic Range Images for RGBE Format","authors":"Jing-Ya Yan, Tzungher Chen, Chih-Hung Lin","doi":"10.1109/IIH-MSP.2013.128","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.128","url":null,"abstract":"This paper presents a new encryption scheme of high dynamic range (HDR) images. HDR images are more and more popular and network bandwidth is large enough to transmit large data, therefore, HDR images need to be properly protected, such as encryption. Here we use a new tool to achieve the purpose of encryption. The features of elementary cellular automata (ECA) that make us choose it as an encryption tool. ECA allows this encryption scheme be implemented easily and executed efficiently. The experimental results prove this encryption scheme sufficient security and doesn't need expensive computing resources.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"59 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Benchmark for Emergency Management Based on OGC WFS 基于OGC WFS的应急管理基准
Gang Liu, Pu Li, Y. Sha
{"title":"Benchmark for Emergency Management Based on OGC WFS","authors":"Gang Liu, Pu Li, Y. Sha","doi":"10.1109/IIH-MSP.2013.94","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.94","url":null,"abstract":"This paper presents a benchmark consisting of 11 queries based on WFS standards formulated by OGC. The purpose of our study is to provide a reference standard, when the performance test is conducted on a geospatial web service platform which supports OGC WFS. This benchmark has the novel characteristic that it uses geospatial datasets and queries that are representative of WFS. We selected GeoServer as the WFS server, used Jmeter as a test tool and adopted the Texas data as test data set in order to carry out related experiments. Also included in the paper are benchmark results, which show the feasibility of our benchmark.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Packet Loss Recovery of G.729 Speech Using Discriminative Model and N-Gram 基于判别模型和N-Gram的G.729语音丢包恢复
Takeshi Nagano, A. Ito
{"title":"A Packet Loss Recovery of G.729 Speech Using Discriminative Model and N-Gram","authors":"Takeshi Nagano, A. Ito","doi":"10.1109/IIH-MSP.2013.75","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.75","url":null,"abstract":"In a VoIP application, packet losses degrade speech quality. Especially, IP network under a large-scale disaster should cause severe packet losses. We have investigated the relationship between parameter loss and speech quality for G.729 codec. In this paper, we propose packet loss recovery method under severe packet loss condition, where the relationship was modeled by Support Vector Machine (SVM). Compared with the \"repetition\" method, the proposed method could improve speech quality. When we used both SVM and N-gram for concealing packet losses, we could obtain further improvement of speech quality.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Robust Watermarking Scheme Based on Features Classification Tree 一种新的基于特征分类树的鲁棒水印方案
Y. Hsieh, Chia-Sung Chang, Jau-Ji Shen
{"title":"A New Robust Watermarking Scheme Based on Features Classification Tree","authors":"Y. Hsieh, Chia-Sung Chang, Jau-Ji Shen","doi":"10.1109/IIH-MSP.2013.125","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.125","url":null,"abstract":"Digital watermarking technique is a common solution to image authentication and authorization. Numerous researches in this area use modification method to alter the pixel value or the coefficients of transform domain to succeed the watermarking purpose. In this paper, we propose a novel watermarking scheme using the concept of association rules to build a features classification tree and Chinese remainder theorem to embed the index of the tree instead of watermark's native values, and via the inverse process the watermark extraction is accomplished. Additionally, it has application ability to any watermarking techniques in the same principle of modification method. Our experimental results show not only the robustness against different image processing attacks, but also the enlargement of capacity to progressively accept the gray scale watermark.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Head-Related Transfer Function Modeling Based on Finite-Impulse Response 基于有限脉冲响应的头部相关传递函数建模
Jian Zhang, Risheng Xia, Chundong Xu, Junfeng Li, Yonghong Yan, S. Sakamoto
{"title":"Head-Related Transfer Function Modeling Based on Finite-Impulse Response","authors":"Jian Zhang, Risheng Xia, Chundong Xu, Junfeng Li, Yonghong Yan, S. Sakamoto","doi":"10.1109/IIH-MSP.2013.87","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.87","url":null,"abstract":"Head-related transfer functions (HRTFs) or its time-domain counterpart, head-related impulse responses (HRIRs) play a crucial role in 3-D audio rendering. The HRIRs with a couple of hundred-sample lengths result in the high computation cost for the real-time 3-D audio applications especially when multiple sound sources are rendered simultaneously. To overcome this problem, various modeling approaches have been reported to shorten HRIRs. In this research, an efficient finite-impulse-response (FIR) model is studied which is essentially based on the concept of the minimum-phase modeling technique. In this method, the measured HRIRs are represented by the interaural time delay (ITD) and the magnitude spectra that are approximated by two FIR filters. To investigate the accuracy dependence of this modeling approach on the order of FIR filter, two psychoacoustic listening experiments were conducted. In the examinations, two HRIR databases (MIT and CIPIC) are exploited and evaluated in terms of sound source localization and sound quality by comparing the synthesized stimuli with the measured HRIRs and those with the FIR models of different orders. Experimental results indicated that the measured hundred-sample-length HRIRs can be sufficiently modeled by the low-order (a dozen of coefficients) FIR model from the perceptual point of view, which represents an important reduction in the computational cost for implementing real-time 3-D audio applications.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Designing and Accomplishing a Multiple Water Quality Monitoring System Based on SVM 基于支持向量机的多重水质监测系统的设计与实现
Zihan Pang, Ke-bin Jia
{"title":"Designing and Accomplishing a Multiple Water Quality Monitoring System Based on SVM","authors":"Zihan Pang, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.39","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.39","url":null,"abstract":"Along with the fast development of economy, the rational allocation of water resources has become one of the prerequisites which ensure the sustainable development of a country. Building a water quality surveillance and evaluation mechanism serving for managing regional water environment and addressing sudden contamination accident is of great importance. Based on the monitoring data on water quality, a multiple water quality monitoring system based on SVM is designed and accomplished. It established a corresponding water quality evaluation model by using the Gauss Radial Basis Function, and through offline studies of samples to guarantee the effectiveness and timeliness of this system. Besides the corresponding water quality classifying categories and instance interface are also figured out in the paper. This system has been successfully applied in the Central Line Project of South-to-North Water Diversion project, and according to the results the system is stable, effective and safety.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134321248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信