{"title":"A General Method for Shot Boundary Detection","authors":"Ling Xue, L. Chao, Li Huan, Xiong Zhang","doi":"10.1109/MUE.2008.102","DOIUrl":"https://doi.org/10.1109/MUE.2008.102","url":null,"abstract":"Shot boundary detection is a fundamental step for the organization of large video data. A general shot boundary detection method is proposed. To improve the performance of the algorithm and reduce the calculation, smooth intervals inside shots are first concatenated from the original video. After that, features, like intensity pixel-wise difference, color histograms in HSV space and edge histograms in X and Y direction, are extracted from the new video sequence and used as the input vectors to the support vector machine (SVM). Consequently, we use the SVM to classify the frames. The outputs of the SVM are divided into four categories, which are respectively abrupt cuts, gradual changes and etc. After the classification, a detection algorithm is applied to the result sequence of the SVM classification to fulfill the shot boundary detection. Experimental results show that the proposed algorithm produces good detection results.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image-Based Modeling of Virtual Pagoda of China","authors":"Wu Guo, Yi Li, Wenhui Li, Meiying Sun","doi":"10.1109/MUE.2008.39","DOIUrl":"https://doi.org/10.1109/MUE.2008.39","url":null,"abstract":"This paper introduces an image-based pagodas modeling and simulation system that takes a single photo as input. To implement the pagoda modeling system, we have built a component model library of pagodas by L system (e.g. square, hexagonal, and octagonal box, eaves bending upwards or downwards etc.) and a corresponding feature library. Feature points have been detected by improved feature detection algorithm. Once the feature points are detected, they are first checked to see whether they match with the predefined feature library. If so, a corresponding model in component model library is assigned to them. XML code is used to control the process of pagoda generation in detail and ratio parameter added to ensure the coherent architecture styles of ancient vernacular pagodas. Because of the advantages (accurate modeling and rapid generating) of this modeling system, it can be applied to the preserving of the digital heritage in China vernacular architecture.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130864077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of ATA-Based Virtual Storage System for Mobile Device","authors":"Yu-Shu They, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim","doi":"10.1109/MUE.2008.14","DOIUrl":"https://doi.org/10.1109/MUE.2008.14","url":null,"abstract":"Mobile technology is an essential element in constructing a ubiquitous computing environment. However, the storage limitation on mobile devices has become a significant problem due to the rapid development of data-intensive mobile applications nowadays. In this paper, we present the design and implementation of a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a counter to the above problem. This protocol enables the ATA device commands to be transported over the TCP/IP network and hence allows an ATA hard disk to be mounted remotely from a wireless connected mobile device. Due to the popularity of wireless infrastructures and ATA technologies, iATA is considered as a relatively cost effective and lightweight solution if compared to card storages or other network storage protocols. The result of prototype implementation shows that our proposed solution is feasible to be applied on a resource limited device.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130842315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Security for Inter-space Surveillance Applications","authors":"G. Kim, Deok-Gyu Lee, J. Han, Sang Wook Kim","doi":"10.1109/MUE.2008.22","DOIUrl":"https://doi.org/10.1109/MUE.2008.22","url":null,"abstract":"As ubiquitous computing environment is expanding into our real society and the majority of IT technologies are focusing on ubiquitousness, the procedure for identifying an entity is getting more significant in the future security system. However, users should be authenticated by every security application since they are heterogeneous and not collaborative each other. So in this paper, we propose a new authentication mechanism for guaranteeing ubiquitousness and usability with intelligent collaborations among authentication applications and surveillance systems for inter-space intelligent security applications.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Negotiation Mechanism for Resolution Conflicts between Replicas in Data Grid","authors":"Ghalem Belalem, Belabbes Yagoubi","doi":"10.1109/MUE.2008.52","DOIUrl":"https://doi.org/10.1109/MUE.2008.52","url":null,"abstract":"Large scale systems such as computational grid are distributed computing infrastructure that can provide globally available network resources. Grid computing has emerged as a framework for supporting complex compilations over large data sets. In general, grids enable the efficient sharing and management of computing resources for the purpose of performing large complex tasks. In particular, grids have been defined as anything from batch schedulers to peer-to-peer platforms. To be able to sharing data, it is recommended to use the replication technique, it makes data accessible by user who is kept transparent to node and network crashes and communication failure since the user data is redundantly available on more than one site. The replication management and their implementation is not a simple task and produces many additional problems, like replicas consistency problem. One of the concerns major in the consistency management approaches called optimistic, it is the conflicts resolution between replicas. In this paper we present an hybrid negotiation mechanism based on the various negotiation forms between virtual consistency agents to be able to critical situation for sites and to reduce the number of conflicts between replicas to converge them more quickly in data grids.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet Management","authors":"Hayoung Oh, K. Chae","doi":"10.1109/MUE.2008.91","DOIUrl":"https://doi.org/10.1109/MUE.2008.91","url":null,"abstract":"Wireless Sensor Networks (WSNs) is a very attractive technique for a variety of applications due to many merits such as compact form, low-power and potential low cost. However, the more the number of sensor node is increased, the more difficult the manager monitors WSNs individually. And faults such as the malfunction of the sensor device itself are common due to the vulnerable security. Therefore, a new approach to manage secure sensorNet considering scalability, energy- efficiency and faulty tendency is needed. Therefore, we propose an abnormal area scanning algorithm using spatial, temporal correlation and in-network aggregation for scalable and energy- efficient secure sensorNet management. Simulations show that our scheme has good scalability and energy-efficiency characteristics, compared to the previous scheme and it can clearly identify the abnormal sensors with high accuracy even in the existence of normal sensors, abnormal sensor and event- detecting sensors.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cost Effective Rate Control for Streaming Video Dedicated to Wireless Handheld Devices","authors":"Youn-Sik Hong, Hwa-Seok Lim, Jun-Sik Hong","doi":"10.1109/MUE.2008.21","DOIUrl":"https://doi.org/10.1109/MUE.2008.21","url":null,"abstract":"In a recent VoD application, a stationary VoD server delivers video stream to a mobile device, particularly PDA, over wireless. Typically, the sending rate at the server is faster than the playback rate at a handheld device. Therefore, it can't receive streaming video as possible as the sending rate even if there is no congestion and extremely low BER over wireless. Our objective is to develop a simple cost effective rate control scheme using a buffer level at a mobile device. We classify the buffer at a mobile device into three distinct states depending on its level (occupancy). For each of these states a different rate control scheme is formulated. Since the sending rate increases as the inter-packet delay (IPD) at the sender decreases, we vary IPD to control the rate with its state. Adjustable parameters used in our proposed method are calibrated using our empirical results. These measurements were carried out on a test-bed which reproduces a real prototype of the wired-cum-wireless topology.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OntoCBR: Ontology-Based CBR in Context-Aware Applications","authors":"Yun Bai, Juan Yang, Yuhui Qiu","doi":"10.1109/MUE.2008.56","DOIUrl":"https://doi.org/10.1109/MUE.2008.56","url":null,"abstract":"Current context-aware applications are widely using ontology to describe context. However, most rules of the ontology-based reasoning in them are pre-defined or user-defined. They are short of flexibility to cope with the variant requirements. This paper proposes a ontology-based case-based reasoning model named OntoCBR. OntoCBR compares the similarity between contexts. We also provide the way to get the similarity of the ontology-based contexts.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"12 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115101910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Hybrid Model for Information Processing Basing on Rough Sets and Fuzzy SVM","authors":"Guang-ming Xian, Bi-qing Zeng","doi":"10.1109/MUE.2008.68","DOIUrl":"https://doi.org/10.1109/MUE.2008.68","url":null,"abstract":"Rough set theory (RST) is a new effective tool in dealing with vagueness and uncertainty information from a large number of data. Fuzzy support vector machine (FSVM) has become the focus of research in machine learning. And it greatly improves the capabilities of fault-tolerance and generalization of standard support vector machine. The hybrid model of RS-FSVM inherits the merits of RS and FSVM, and is applied into fused image quality evaluation in this paper. RST is used as preprocessing step to improve the performances of FSVM. A large number of experimental results show that when the number training samples are enough RS-SVM can achieve higher precision of classification than methods of FSVM and SVM.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128564517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Evaluation Method Basing on Support Vector Machines","authors":"Guang-ming Xian, Bi-qing Zeng","doi":"10.1109/MUE.2008.111","DOIUrl":"https://doi.org/10.1109/MUE.2008.111","url":null,"abstract":"Recently support vector machine (SVM) has become a more and more popular classification tool. We presented our two-phase, efficient, and fair evaluation method for DRMs (digital right management system) basing on SVM. Influence of three difference methods and test set number on evaluation result is discussed. After analysized by binary logistic regression, odds ratio comparison of SVM with multi-phase fuzzy synthesized evaluation and FCM illustrates that SVM is the most excellent in these three approaches. Through detailed experimental evaluations under various data set of samples and approaches, our evaluation method of SVM is illustrated to be scalable and accurate.","PeriodicalId":203066,"journal":{"name":"2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127475076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}