Scheduled System Maintenance
On Tuesday, September 26, IEEE Xplore will undergo scheduled maintenance from 1:00-4:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007)

13-15 Dec. 2007

Go

Filter Results

Displaying Results 1 - 25 of 101
  • International Conference on Computational Intelligence and Multimedia Applications - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • International Conference on Computational Intelligence and Multimedia Applications - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • International Conference on Computational Intelligence and Multimedia Applications - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • International Conference on Computational Intelligence and Multimedia Applications - Table of contents

    Publication Year: 2007, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (214 KB)
    Freely Available from IEEE
  • Patron's message

    Publication Year: 2007, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • General Chair's message

    Publication Year: 2007, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (32 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing chair's message

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2007, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Digital Image/ Video Forensics

    Publication Year: 2007, Page(s): xxi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Control of a Class of Nonlinear Systems Using Radial Basis Function Neural Networks

    Publication Year: 2007, Page(s):3 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    This paper presents an online optimal control technique for a class of nonlinear systems. The technique is based on approximating the solution to the corresponding generalized Hamilton-Jacobi-Bellman (GHJB) equation for optimal control using radial basis function neural networks (RBFNN). The GHJB equation is solved by adjusting the parameters (weights and centers) of RBFNN online. The proposed opt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A State Space Model for the Long Term Blood Pressure Regulation

    Publication Year: 2007, Page(s):8 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This paper presents a linear state variable description of the long term arterial blood pressure regulation, developed for the analysis of the system properties. The influence of model parameters on the stability and dynamic behavior is analyzed using system theory concepts. The eigenvalues under normal and diseased states have been evaluated through root locus techniques, which could provide clin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid GA Fuzzy Controller for pH Process

    Publication Year: 2007, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Control of a pH process is great difficulty due to time varying and nonlinear characteristics. Fuzzy logic has been successfully applied to many applications in control with uncertainties. An important consideration in designing any fuzzy control system is the formation of the fuzzy rules and the membership functions. Generally the rules and the membership functions are formed from the experience ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stabilizing Network Control for Pneumatic Systems with Time-Delays

    Publication Year: 2007, Page(s):19 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    This paper is concerned with the design problem of the robust control for a networked control system (NCS) with time-varying communication delays. It has been known that time delays may not only degrade the system performance, but also destabilize the controlled plant. To alleviate the influence resulting from time delays while maintaining performance, a mixed fuzzy-PID/neural network compensating... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Multiagent Architecture for Congestion Control to Access Remote Energy Meters

    Publication Year: 2007, Page(s):24 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (681 KB) | HTML iconHTML

    In country like India the electricity board to read the meter readings from remote energy meters uses human agents. To overcome the disadvantage of using human agents, our initial works proposed mobile agents for accessing the remote energy meters from the electricity board .But with a single mobile agent, problems like load, lack of memory space and improper communication with clients cannot be s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intelligent Framework for CAD of Complex Systems

    Publication Year: 2007, Page(s):29 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    The fast growing complexity of today's control systems necessitates new design methods and tools to face the problems of design, analysis, integration and validation of complex systems. Conventional computer aided design (CAD) approaches do not address the requirements of today's complexity in systems development. This paper describes the specification, design and implementation framework that use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Routing Using Ant Colony Method and RPS Algorithm

    Publication Year: 2007, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Soft computing is one of the emerging fields used in many application problems. This paper mainly deals with the emerging soft computing technique (i.e.) Ant colony algorithm for the optimized network routing and clustering method for the optimized network design. In the design of networks the fundamental problem is to transmit the packets of information from source node to destination node. An im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Image Transmission over Wireless Channels

    Publication Year: 2007, Page(s):44 - 48
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (653 KB) | HTML iconHTML

    The advances in communication technology have seen strong interest in digital signal transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. Data security has become a critical issue. In order to protect valuable data from undesirable readers, data encryption is essential. Furthermore, the wireless channels have fluctuating chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Fuzzy Watermarking for 3D Models

    Publication Year: 2007, Page(s):49 - 53
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB) | HTML iconHTML

    Watermarking algorithms have a basic requirement that the watermark amplitude should be as high as possible for robustness and at the same time the watermark should not introduce any perceptible artifacts. Thus, the design of watermarking algorithms involves a tradeoff between imperceptibility and robustness. This paper proposes a novel state of the art algorithm, which is based on wavelet and fuz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Question-Based CAPTCHA

    Publication Year: 2007, Page(s):54 - 58
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (375 KB) | HTML iconHTML

    Today there are many Internet sites which require only the entry by human users but unfortunately some computer softwares called bots are designed by some hackers to enter these sites and use their resources through false registration. As a result some systems named CAPTCHA have been introduced to tell apart human users and computer software. This paper introduces a new CAPTCHA method. In this met... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust Watermarking in Transform Domain Using Edge Detection Technique

    Publication Year: 2007, Page(s):59 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    Digital Watermarking is used to embed copyright marks into the digital contents to check copyright violation. In this paper a novel robust watermarking technique is presented. The watermark is embedded robustly either in Discrete Hartley transform (DHT) domain or in discrete cosine transform (DCT) domain depending upon the number of edges in the blocks of the original image. The watermark is embed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaos Based Audio Watermarking

    Publication Year: 2007, Page(s):64 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    A method of encryption for embedding secret information in the spatial and frequency domains of a cover audio signal is described. The method permutes the secret data according to the pseudorandom sequence, generated through pseudorandom sequence generator. The permuted data is then broken into blocks of 128 bits and further encrypted using the Logistic map whose initial value is derived from 128-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Scheme of Data Hiding in Binary Images

    Publication Year: 2007, Page(s):70 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (759 KB) | HTML iconHTML

    This paper proposes a new method to embed data in compressed binary images (JPEG), including scanned text, figures, and signatures. The method manipulates "fiippable" pixels to embed data without distorting image. Shuffling is applied before embedding to provide more security. The hidden data can be extracted without using the original image. The proposed method uses look up table which is to be u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Digital Watermarking of Satellite Image at Third Level DWT Decomposition

    Publication Year: 2007, Page(s):78 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    Digital watermarking has been proposed to increase the digital data security, confidentiality and integrity. Satellite image watermarking is a special category of image watermarking in the sense that the images have special requirements. Particularly, watermarked satellite images should not differ perceptually from the the original counterparts, because the purpose of taking the image must not be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless Steganography on AVI File Using Swapping Algorithm

    Publication Year: 2007, Page(s):83 - 88
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    Steganography is the art of communicating a message by embedding into multimedia data. The purpose is to send maximum hidden information while preserving security against detection by an unauthorized person. A steganographic system is perfectly secure when the statistics of the 'cover data' (multimedia file) and 'stegodata' (encrypted message) are identical. Experimental results with existing tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.