Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Multimedia Technology (ICMT), 2010 International Conference on

Date 29-31 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 615
  • [Title page]

    Publication Year: 2010 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (23 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (56 KB)  
    Freely Available from IEEE
  • Welcome

    Publication Year: 2010 , Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • Committees

    Publication Year: 2010 , Page(s): 4 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (88 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Table of contents - volume 1

    Publication Year: 2010 , Page(s): 9 - 51
    Save to Project icon | Request Permissions | PDF file iconPDF (155 KB)  
    Freely Available from IEEE
  • "Anti-Planning" Methodology and the Application on the Plans for the Land Utilization

    Publication Year: 2010 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (142 KB) |  | HTML iconHTML  

    "Anti-planning" Methodology advocates that the urban planning should first consider the land for others but not for construction.The fast urbanization of China leads to growing increasingly tense between people and land, such as land used for construction and agriculture, economic development and ecological environment. Under the circumstances, this paper discussed the necessity and feasibility of introducing the "Antiplanning" to the spatial arrangement in plans for the landutilization. It will fully realize the comprehensive benefits of land resources, make the plan more scientific and reasonable, and offer reference for a new round of general land use planning revision. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Face Modeling from Video

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (323 KB) |  | HTML iconHTML  

    In this paper, a novel 3D face modeling approach from monocular video is proposed. The core of the approach is to deform the generic face model based on the facial feature information extracted from video frames in order to reconstruct a specific 3D face model. The approach composed of following steps: marking facial feature points for the first video frame, and extracting face contour at the beginning, then performing affine correction to track these feature points in the following video frames. At the same time, face contour is extracted. Generic face model is employed to adapt the actual 3D face by deformations based on the facial feature information extracted from video frames. A specific 3D face model is generated at last. Texture mapping is carried out on the 3D face geometric model to generate a realistic 3D model of a specific human face at the final step. Experiments show that this approach is effective and easy to use. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Visualization of Seismic Buildings in Yushu Earthquake for Disaster Management

    Publication Year: 2010 , Page(s): 1 - 4
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (428 KB) |  | HTML iconHTML  

    The 2010 Yushu earthquake caused tremendous life and economic loss in Yushu county, Qinghai, China. More than hundred thousand buildings were totally or partially collapsed. This paper focuses on the 3D visualization of disaster environment in both coarse scale and fine scale for further disaster management. In the study area, different data resources were used in different scales for different purpose. Information extraction of building's attributes from high-resolution remote sensing images was presented. The results obtained from this project indicted that it is very feasible and reliable for 3D visualization of seismic building in such a distractive earthquake. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Hybrid Clustering Algorithm Incorporating K-Means into Canonical Immune Programming Algorithm

    Publication Year: 2010 , Page(s): 1 - 4
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (234 KB) |  | HTML iconHTML  

    A novel Hybrid Clustering Algorithm (HCA) that incorporates the K-means into the canonical Immune Programming Algorithm (IPA) is proposed after analyzing the advantages and disadvantages of the classical k-means clustering algorithm in the paper. The theory analysis and experimental results show the algorithm not only avoids the local optima and is robust to initialization, but also increases the convergent speed, meanwhile evidently restrains the degenerating phenomenon during the evolutionary process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Calibration Method for Extrinsic Parameters Based on Four Points

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (191 KB) |  | HTML iconHTML  

    In order to solve the calibration of camera extrinsic parameters problem in texture mapping,this paper presents a geometric calibration method based on four point pairs.The first one select three points in the world coordinate system and calculate their coordinates in the camera coordinate system(world point, light heart, and image point are colinear). Transform the coordinates to a reference coordinate system and the euclidean distance is invariant. According to the homothetic triangle theory, solve the rotation matrix and translation vectoer respectively. Finally get the complete extrinsic parameters. The results from experiment show that the method is correct and feasible. This method needs only four point pairs to solve the camera extrinsic parameters, further more it has high precision and few constraints. Applied in the texture mapping, this method can establish a mapping between 3D model and digital photo, thereby it can achieve the high-precision texture mapping. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Condition to the Existence of Periodic-3 Orbit and Implication of Chaos in a Kind of Roseneweig - Macorthur Discrete System

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (104 KB) |  | HTML iconHTML  

    A condition to the existence of periodic-3 orbit and implication of chaos in a kind of Roseneweig-Macorthur discrete system is presented in the paper, and it's proven in this condition, the periodic-3 orbit of Roseneweig-Macorthur discrete system is not unique, and such researches will have important ecological significances on the prediction of ecological environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Content-Based Retrieval Algorithm for Document Image Database

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    This paper makes a study on content-based image retrieval algorithm for document image database. Given a query image the system returns overall similar images in database. For document images, we propose the algorithm based on hierarchical matching tree. First segment an image into several regions with paragraph marking based on paragraph height estimation, and then segment the region into line blocks, the algorithm for document image retrieval by regions and line blocks with hierarchical matching tree is presented. Also we describe the matching model and the texture character strings for indexing. This algorithm is tested through trials. The experiment results indicate this algorithm is accuracy and effective. The response time of retrieval is strongly reduced by image scaling. The efficiency of retrieval is highly valuable in document image database. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Creditability Validation Algorithm for Paper-Based Documents

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    It's a challenge to identify whether the paper archive is credible when it is printed out by the credible electronic archives system. First, this paper improves a DCT-based binary image digital watermarking algorithm. The universal algorithm not only applies to text, but also other binary image. It's so robust that can withstand more than three times attack of paper print-scans; the image is modified with good visual effects; watermark extraction does not require the original document. Based upon the algorithm, this paper designs and implements a creditability validation system for paper document. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Design of Music Teleteacher Based on VS1053 Decorder

    Publication Year: 2010 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (119 KB) |  | HTML iconHTML  

    This research elaborates the innovative ideas and the design thinking of music teletutor. It explores how to achieve the playing of MIDI files through VS1053 decorder, how to achieve such important functions as the real-time display of musical notes,track solos and settings of tempos by analysing and integrating the MIDI files through the users' programing softwares. The purpose of this design is to bring the learners an honest partner during the learning process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Digital Watermarking Method for Mobile Video Transmission

    Publication Year: 2010 , Page(s): 1 - 5
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (278 KB) |  | HTML iconHTML  

    Embedding information into multimedia data, also called watermarking, became recently a pressing need especially with the rapid growth of transmission techniques. In this paper, we present a copyright protection method for mobile video transmission, processing with customized watermarking data at a communication device utilizing received global positioning (GPS) data and communicating the watermarked video data to a receiving communication device. The watermarking of subsequently processed data may be adjusted based on the received feedback signal. The watermarked video data communicated to the receiving communication device may be adjusted based on one or more device parameters corresponding to the receiving communication device and/or GPS information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distribution Technology Based on Segmentation Prefetching and Pipelining in Classified Streaming Media Service

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (147 KB) |  | HTML iconHTML  

    A proxy server is presented and divides the streaming media service that users access to in the 3G network into different types. According to the characteristics of service types, the proxy server uses different segmentation prefetching to improve the efficiency. Meanwhile, this paper introduces the assembly line technology which improves the speed of the streaming media distribution, effectively utilizes bandwidth and increases the throughput of the proxy server. The simulation results show that using a variety rational of segmentation prefetching algorithms and efficient pipeline distribution can reduce the bandwidth consumptions of the proxy server and the 3G network. Furthermore, the proxy server offers a better quality of service to the users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Temporal Error Concealment Algorithm for H.264

    Publication Year: 2010 , Page(s): 1 - 4
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (363 KB)  

    Packet losses or errors of high compressed video stream during transmission over error-prone channel may cause serious decline in video quality. Error concealment (EC) at decoder side is an effective technology to reduce this video degradation. This paper proposes a Dynamic Temporal Error Concealment (DTEC) algorithm for H.264, which chooses different error concealment approach according to the variance of motion vectors of available macro-blocks (MBs) around the lost MB. Furthermore, a recovery method based Directional Temporal Boundary Match Algorithm (DTBMA) is proposed. Experimental results show that the proposed algorithm not only increases PSNR but also improves subjective video quality compared with conventional temporal error concealment algorithms in the case of the same packet loss rate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Variable Precision Template Matching Algorithm Based on Hybrid Genetic Algorithm

    Publication Year: 2010 , Page(s): 1 - 3
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (446 KB) |  | HTML iconHTML  

    Conventional algorithms for image matching are slow and inefficient, and standard genetic algorithm (SGA) in image matching is not high in accuracy. In order to solve these problems, a fast and variable precision template matching algorithm based on hybrid genetic algorithm is proposed in this article. The algorithm combines GA and hill-climbing algorithm in an efficient way and performs fast both in global search and local search. The speed and accuracy of the Algorithm is proved by the experiment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A First Study on Genetic Algorithms Based-Evolvable Motivation Model for Virtual Agents

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (302 KB) |  | HTML iconHTML  

    In video games, it's very important to model a virtual agent with motivation variables. In previous researches, a virtual agent's motivation variables are always static. An evolvable motivation system for a virtual agent is set up, priority sequence of an agent's behaviors is decided by the priority sequence of its motivations, the priority sequences of an agent's motivations are determined by genetic algorithms, the demo system shows that virtual agents can adapt to the environment better. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Gamut Expansion Algorithm Based on Saturation for Wide-Gamut Displays

    Publication Year: 2010 , Page(s): 1 - 3
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (136 KB) |  | HTML iconHTML  

    To avoid color distortion and meanwhile exert display advantage of wide gamut displays, there needs gamut expansion mapping from the current standard gamut to the gamut of these devices. A gamut expansion method based on saturation enhancement in CIE-xy chromaticity diagram is proposed. The algorithm first divides the gamut triangle into two parts, the achromatic region and the normal color region. Then colors in the normal color region are processed with increasing saturation according to the ratio of maximal saturation of the two gamuts at the same hue with the to-be-mapped color. Gamut expansion mapping simulation of sampling points and images are carried out. The average CIELUV hue difference before and after the mapping is 0.049 when sampling points is 4913, and the proposed method averagely increases the CCI of the images by 23%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HAB Mathematical Model of Competition between Two Algae Species in the Yangtze River Estuary and Its Adjacent Waters

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (278 KB) |  | HTML iconHTML  

    Field observations in high frequent harmful algal bloom (HAB) occurrence area around Yangtze River Estuary show that during HAB, nutrients concentration and their distribution are the main factors leading to the population succession between two main dominant HAB species, Skeletonema costatum and Prorocentrum donghaiense. Based on such a succession mechanism, a HAB ecological mathematical model is developed by improving a 3D coupled hydrodynamic-ecological model (COHERENS). Compared with in-situ data, the numerical simulations represent the trend of dominant HAB species succession in this sea area and effects of marine nutrients and sea water temperature on competition between these two algae species. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Handwriting Numeral Character Recognition System

    Publication Year: 2010 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    This paper presents a novel handwriting numeral recognition system based on wavelet and neural network. In the first part, we describe a general Optical Character Recognition (OCR) system and point out that selection of a feature extraction method and design of classifier are the most important factor in achieving high recognition performance in character recognition system. In the Second part, we present a feature extraction method based on ring-projection and wavelet transform, this approach is closely related to feature extraction methods by Fourier Series expansion. The objective to use an orthonormal wavelet basis rather than the Fourier basis is that wavelet coefficients provide localized frequency information. In the third part, we design a back propagation neural network (BPN) classifier, which has three layer perceptrons, the number of neurons of input layer corresponds to the dimension of the feature vector space, the number of neurons of output layer corresponds to the number of characters to be recognized. In the last part, we offer an overall scheme for this recognition system based on wavelet transform and neural network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HDV Acquisition and Process Solution for Mine Black Environment

    Publication Year: 2010 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (148 KB) |  | HTML iconHTML  

    For the problems that bad imaging result, small adapt range of optical and can't work under the low light intensity mine environment in the existing solutions and products, we proposed a HDV acquisition, process and wireless transmit ion solution that accords with the intrinsically security standard for the low light intensity environment, including two aspects: HDV acquisition front-end and mine media data process terminal. The HDV Acquisition Front-end used the technology of low light night vision with the white light assistant illumination that coupled the image intensifier and CMOS image sensor module directly; Multimedia data process terminal under mine takes the S3C6410 based on ARM11 as the CPU to achieve the video signal process and wireless transmit ion following the Wi-Fi and Mini USB communication protocols. Ground on this solution, we designed the mine Media data process system that the Power part used the low voltage design, which fulfilled the intrinsically safe standard and came out the low power of device. The test results showed that this system can implement the high-definition video images collection, compression and storage within the scope of illumination 10-4 ~ 102 Lux. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Performance Fully Pipelined Architecture for Lossless Compression of Satellite Image

    Publication Year: 2010 , Page(s): 1 - 4
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (133 KB) |  | HTML iconHTML  

    This paper presents a novel hardware implementation of the adaptive JPEG-LS in field programmable gate array (FPGA), based on the low complexity lossless compression for images (LOCO-I) compression scheme. Differently from what previously reported in literature, this design achieves a much lower complexity and super high data throughput through an improved prediction model by breaking the feedback loop of context parameters updating. The processing speed of this design is up to 75Mpixels per second, while the compression ratio is slightly lower than the standard JPEG-LS compression. Performance evaluation also indicates that design complexity and compression efficiency can be taken account at the same time to achieve satisfactory result. Such an implementation could be used for high-speed compression of satellite remote sensing image onboard. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Improved Anti-Collision Algorithm in RFID System of Internet of Things

    Publication Year: 2010 , Page(s): 1 - 4
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (122 KB) |  | HTML iconHTML  

    The anti-collision problem is one of the difficulties of RFID in IOT. In the IOT system, there may be more than one tag in the working range of one reader. When the reader start these tags, all of them will transmit data to the reader at the same time, it will cause the reader can not read the data from the tags correctly. Use the anti-collision technology the IOT can prevent multiple tags simultaneously transmit data which causes collision. The current anti-collision algorithms are mainly Slotted ALOHA method and Binary Search method. The basic ALOHA algorithm has high current efficiency, but with the increase of the tags, the efficiency of the system will decrease greatly. This paper presented an improved ALOHA algorithm. In the proposed algorithm, the number of tags was estimated dynamically, with which a suitable size of window can be chosen to get higher system efficiency. At the same time, grouping strategy was introduced into the algorithm. The simulation results have shown that the proposed algorithm has higher system efficiency and lower working time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.