{"title":"Cramer-rao lower bound for localization in environments with dynamical obstacles","authors":"Riming Wang, Jiu-chao Feng","doi":"10.1109/ICCWAMTIP.2014.7073359","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073359","url":null,"abstract":"Cramer-Rao Lower Bound (CRLB) of location estimation under Gaussian distribution is widely used in localization applications. However, under the environments with dynamical obstacles, the existing CRLB does not represent the effect of the non-line-of-sight (NLOS) bias caused by dynamical obstacles. In this paper, based on received signal strength (RSS) measurements, a uniform random variable is used to model the NLOS bias effect. Furthermore, The corresponding maximum likelihood estimator (MLE) and CRLB under the joint distribution of Gaussian distribution and uniform distribution are derived. Numerical results validate that the proposed MLE and CRLB are effective in environments with dynamic obstacles.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yiou Sun, Jingwen Xie, Junhai Guo, Haifang Wang, Yang Zhao
{"title":"A novel CKF method for target tracking","authors":"Yiou Sun, Jingwen Xie, Junhai Guo, Haifang Wang, Yang Zhao","doi":"10.1109/ICCWAMTIP.2014.7073361","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073361","url":null,"abstract":"This paper presents a new target tracking method. The presented method which named marginalized cubature Kalman filter is based on standard cubature Kalman filter and marginalized moment estimator. The marginalized moment estimator uses sigma-points sampling and Guass-Hermite integration to estimate the mean and covariance. The proposed algorithm which is called MCKF in short, uses marginalized moment estimator to calculate the state's mean and covariance in the CKF framework and gets a better accuracy and keep the covariance matrix being positive definite. Simulation indicates the presented algorithm's feasibility and improved performance.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"1149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124713496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nadir Mustafa, Jian-ping Li, K. Kumar, Saeed Ahmed Khan, Mohammed Khalil, Giess Mohaned
{"title":"Medical image De-noising schemes using wavelet transform with fixed form thresholding","authors":"Nadir Mustafa, Jian-ping Li, K. Kumar, Saeed Ahmed Khan, Mohammed Khalil, Giess Mohaned","doi":"10.1109/ICCWAMTIP.2014.7073435","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073435","url":null,"abstract":"Medical Imaging is currently a hot area of biomedical engineers, researchers and medical doctors as it is extensively used in diagnosing of human health and by health care institutes. The imaging equipment is the device, which is used for better image processing and highlighting the important features. These images are affected with random noise during acquisition, analyzing and transmission process. This results in blurry image visible in low contrast. The Image De-noising System (IDs) is used as a tool for removing image noise and preserving important data. Image de-noising is one of the most interesting research areas among researchers of technology-giants and academic institutions. For Criminal Identification Systems (CIS) & Magnetic Resonance Imaging (MRI), IDs is more beneficial in the field of medical imaging. This paper proposes algorithm for de-noising medical images using different types of wavelet transform, such as Haar, Daubechies, Symlets and Biorthogonal. In this paper noise image quality has been evaluated using filter assessment parameters like Variance, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). It has been observed form the numerical results that, the performance of proposed algorithm reduced the mean square error and achieved best value of peak signal to noise ratio (PSNR). In this paper, the wavelet based de-noising algorithm has been investigated on medical images along with threshold.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sealed-BID electronic auction without the third party","authors":"Shaobo Li, Xiao Li, Ming-Xing He, Shengke Zeng, Xiaolong Tang","doi":"10.1109/ICCWAMTIP.2014.7073421","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073421","url":null,"abstract":"The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme adopts the ideal of the conditionally anonymous ring signcryption to guarantee the secure requirements of sealed- bid electronic auction.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124105849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaolong Tang, Zhongyu Tao, Panshi Tang, Jian-Pin Li
{"title":"Edge detection method based on PCNN","authors":"Xiaolong Tang, Zhongyu Tao, Panshi Tang, Jian-Pin Li","doi":"10.1109/ICCWAMTIP.2014.7073383","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073383","url":null,"abstract":"Pulse-Coupled Neural Network is known as third generation artificial neural network. It is created by visual cortex neurons, a synchronous pulse release phenomenon of mammals. Compare to traditional artificial neural network, PCNN has the characteristics of dynamic neural network, integrated space-time, automatic propagation and synchronous pulse release. PCNN has tendency for image retention information and edge detection.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flame detected in video based on color moments","authors":"Lei Chen, Ji-Feng Huang","doi":"10.1109/ICCWAMTIP.2014.7073398","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073398","url":null,"abstract":"After analyzing the motion area of flame blocks and fluctuations of flame pixels in complex scenes video, this paper detects motion area by using blocks in spatial consecutive video frames. For the color information of the flame block, motion area is analyzed by the second order color moments in HSV color space, and then it extracts the suspected flame color motion area. For each pixel of the block area, this paper chooses spatial continuous images to do wavelet analysis and extracts pixels which meet the flame fluctuation rules as the flame pixels. Use local weighted operator to filter out non-flame discrete pixels, make the adjacent flame pixels area form connected areas and give an alarm. Experimental results show that this method can detect the video flame area taken by ordinary video cameras quickly and give an alarm, meanwhile, it also has a better robustness.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123221005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A shared pixel ambient occlusion method in ray tracing","authors":"Yuxiao Guo, Leiting Chen, Tao Wu, Xin Li, Yue Cao","doi":"10.1109/ICCWAMTIP.2014.7073401","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073401","url":null,"abstract":"Ambient occlusion is an illumination simulation approach used in ray tracing for decades. However, huge consume of multiple sample times, for a high re-solution, in ambient occlusion restricts its development. We propose an algorithm decreasing the sample times with adjacent pixels shared information in sampling process. By introducing this nova approach, we get a big improvement when comparing to previous methods.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on time management method based on vector time","authors":"Liu Minmin","doi":"10.1109/ICCWAMTIP.2014.7073422","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073422","url":null,"abstract":"The time synchronization among simulation federates could be realized through logical time by traditional time management of distributed simulation. There are two types popular time management of distributed simulation based on logical time, conservative time advance mechanism and optimistic time advance mechanism. Conservative time advance mechanism restricted the causal relationship between simulation federates and might lead to poor simulation efficiency and deadlock while the difficulty in rollback might exist in optimistic time advance mechanism. Based on the vector time, an optimistic time managing mechanism was put forward, the updating algorithm of vector time was introduced and the rollback control based on vector time was researched. The application in intelligent detection simulation system of carrier rockets demonstrated that in the environment of small number federates, the algorithm could control rollback storm effectively and would show high efficiency and reliability.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"531 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124513275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huan Zeng, Yan Ren, Qing-xian Wang, Neng-Qiang He, Xu-Yang Ding
{"title":"Detecting malware and evaluating risk of app using Android permission-API system","authors":"Huan Zeng, Yan Ren, Qing-xian Wang, Neng-Qiang He, Xu-Yang Ding","doi":"10.1109/ICCWAMTIP.2014.7073445","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073445","url":null,"abstract":"The popularity and widely use of cellphone have greatly stimulated the spread of the apps. Meanwhile, security issues are increasing quickly, particularly for Android based devices. In this paper, through analyzing the android permissions system and android API system, we want to find out the relationship between permissions and APIs. Furthermore, we propose an approach to detect message intercepting malware. The contribution of this paper is threefold: first, we perform static analysis on the app to extract permissions and system APIs. In order to avoid permissions and APIs over declaration, we build java function call graph and find the system APIs been used; secondly, we proposed a light weight method to dynamic find out and update the relationship between permissions and APIs; third, we proposed a dynamic controlled method to detect android malwares. This proposed method is verified by extensive experiments.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130345423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A nondeterministic approach to infer context free grammar from sequence","authors":"Yuan Li, Jim X. Chen","doi":"10.1109/ICCWAMTIP.2014.7073350","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073350","url":null,"abstract":"Grammar induction has received a lot of attention from researchers in the past decades because of its practical and theoretical impact on data compression, pattern discovery and computation theory. There are a bunch of grammar induction algorithms for a given sequence are introduced. Most existing work on learning grammar for a given sequence is based on deterministic approach. Such deterministic approaches used by grammar induction algorithms can be categorized as greedy heuristics. In addition, there are many grammars, which can be learned from a given sequence. The smallest grammar problem is defined by some researchers to evaluate different grammars learned from a given sequence by different algorithms. Such problem is proved as NP-hard. In this work, we introduce a nondeterministic approach to address grammar induction for a given sequence based on genetic algorithm. We demonstrate that our grammar induction algorithm can effectively identify smaller grammar than a well-known grammar induction algorithm. Experimental results, which are presented, illustrate that our approach and algorithm are feasible to resolve difficult problems such as identifying patterns of DNA sequence.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}