2006 Fourth International Conference on Intelligent Sensing and Information Processing

Oct. 15 2006-Dec. 18 2006

Filter Results

Displaying Results 1 - 25 of 66
  • [Front cover]

    Publication Year: 2006, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Fourth International Conference on Intelligent Sensing and Information Processing

    Publication Year: 2006, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2006, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006
    Request permission for commercial reuse | PDF file iconPDF (386 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2006, Page(s): nil7
    Request permission for commercial reuse | PDF file iconPDF (484 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2006, Page(s): nil8
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2006, Page(s): nil9
    Request permission for commercial reuse | PDF file iconPDF (283 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): nil9
    Request permission for commercial reuse | PDF file iconPDF (283 KB)
    Freely Available from IEEE
  • PDF Not Yet Available In IEEE Xplore

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB)

    The document that should appear here is not currently available. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • Can Biological Motion be a Biometric?

    Publication Year: 2006, Page(s):2 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Biological motion has successfully been used for analysis of a person's mood and other psychological traits. Efforts are made to use human gait as a non-invasive mode of biometric. In this reported work, we try to study the effectiveness of biological gait motion of people as a cue to biometric based person recognition. The data is 3D in nature and, hence, has more information with itself than the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indexing of Document Images Based on Nine-Directional Codes

    Publication Year: 2006, Page(s):5 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (702 KB) | HTML iconHTML

    In this paper, a new scheme of indexing and retrieval of document images based on B-tree is proposed. A new technique of labeling components in document images and also a document image representation technique based on nine-directional codes (NDC) are proposed. A procedure for classifying the retrieved images and a method of ranking the retrieved document images are also proposed. The retrieval r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steganalysis of LSB Embedded Images Using Variable Threshold Color Pair Analysis

    Publication Year: 2006, Page(s):11 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2013 KB) | HTML iconHTML

    Steganography and steganalysis are important areas of research in recent years involving a number of applications. Steganography is the science of embedding information into the cover image without causing statistically significant perturbations to the cover image. Steganalysis is the technology that attempts to defeat steganography by detecting the hidden information and extracting or destroying ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mosaic Generation in H.264 Compressed Domain

    Publication Year: 2006, Page(s):17 - 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1154 KB) | HTML iconHTML

    This paper presents an efficient approach to mosaic generation in H.264 compressed domain. The proposed mosaic generation approach fully exploits several new coding characteristics of the H.264 standard, i.e., variable block size and the quarter-pel accuracy of motion vector (MV). A uniformly sampled and normalized MV field is first derived from the H.264 compressed video. Then an affine model is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2006, Page(s): 22
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • An Energy-Aware Adaptive Clustering Protocol for Sensor Networks

    Publication Year: 2006, Page(s):23 - 30
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1460 KB) | HTML iconHTML

    This paper presents a new communication protocol for sensor networks which is based on and is an enhancement over the LEACH protocol proposed by Heinzelman et al. The proposed protocol is based on adaptive clustering of the sensor nodes, the nodes with the maximum amount of residual energies being selected as the cluster-heads. This is in contrast with the original LEACH protocol which employs a s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighted Aggregation Scheme with Lifetime-Accuracy Tradeoff in Wireless Sensor Network

    Publication Year: 2006, Page(s):31 - 36
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2372 KB) | HTML iconHTML

    We consider design of wireless sensor network for event detection application. An MMSE based q-bit weighted aggregation scheme (q-WAS) is proposed in which each node transmits q bits to its parent in every session. The observation of each sensor is assumed to be one bit. The simulation results show that 1-WAS achieves better accuracy than a previously proposed one bit aggregation scheme while offe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Asynchronous Clustering for Self-Organisation of Wireless Sensor Networks

    Publication Year: 2006, Page(s):37 - 42
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1407 KB) | HTML iconHTML

    This paper presents a fully distributed asynchronous clustering protocol for the self-organisation of a wireless sensor network into an infrastructure of well separated cluster heads that supports in-network processing, routing, and deployment. In this protocol, nodes volunteer asynchronously for cluster head duty and use a radio beacon to preemptively recruit members. Limited beacon range is used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing Protocols for Landslide Prediction using Wireless Sensor Networks

    Publication Year: 2006, Page(s):43 - 47
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1641 KB) | HTML iconHTML

    Landslide prediction and early warning system is an important application where sensor networks can be deployed to minimize loss of life and property. Due to the dense deployment of sensors in landslide prone areas, clustering is an efficient approach to reduce redundant communication from co-located sensors. In this paper we propose two distributed clustering and multi-hop routing protocols, CAMP... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PDF Not Yet Available In IEEE Xplore

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB)

    The document that should appear here is not currently available. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2006, Page(s): 48
    Request permission for commercial reuse | PDF file iconPDF (9 KB)
    Freely Available from IEEE
  • Fisher Linear Discriminant Analysis based Technique Useful for Efficient Character Recognition

    Publication Year: 2006, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2657 KB) | HTML iconHTML

    This paper describes the character recognition process from printed documents containing Kannada and English text. Kannada is the fifth most popular language in India and English is the most popular language in the world. Kannada is the language spoken by more than 60 million people of South India and English is the second official language at various government organizations through out India. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic text block separation in document images

    Publication Year: 2006, Page(s):53 - 58
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2023 KB) | HTML iconHTML

    Separation of printed text blocks from the non-text areas, containing signatures, handwritten text, logos and other such symbols, is a necessary first step for an OCR involving printed text recognition. In the present work, we compare the efficacy of some feature-classifier combinations to carry out this separation task. We have selected length-normalized horizontal projection profile (HPP) as the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Sharing Strategy for Guaranteeing Quality-of-Service in VoD Application

    Publication Year: 2006, Page(s):59 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1981 KB) | HTML iconHTML

    The phenomenal growth in the distributed multimedia applications has accelerated the popularity of Video-on-Demand (VoD) system. The vital task of multimedia applications is to satisfy diverse client's request for distinct video with confined resources by using assorted Quality-of-Service (QoS) procedures. In this paper a fusion of data sharing techniques like batching and recursive patching is ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear Feature Extraction using combined approach of Hough transform, Eigen values and Raster scan Algorithms

    Publication Year: 2006, Page(s):65 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1867 KB) | HTML iconHTML

    In this paper we propose a new method for linear geometric primitive identification which uses the generalized standard Hough transform (HT), Eigen value based statistical parameter analysis and Bresenham 's raster scan algorithms. In this method, we use the sparse matrix to find the Hough transform of the given image. Since sparse matrices squeeze zero elements and contain a small number of nonze... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.