By Topic

2010 International Conference on Multimedia Technology

29-31 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 615
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2010, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2010, Page(s):4 - 8
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of contents - volume 1

    Publication Year: 2010, Page(s):9 - 51
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • "Anti-Planning" Methodology and the Application on the Plans for the Land Utilization

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    "Anti-planning" Methodology advocates that the urban planning should first consider the land for others but not for construction.The fast urbanization of China leads to growing increasingly tense between people and land, such as land used for construction and agriculture, economic development and ecological environment. Under the circumstances, this paper discussed the necessity and feasibility of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Face Modeling from Video

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    In this paper, a novel 3D face modeling approach from monocular video is proposed. The core of the approach is to deform the generic face model based on the facial feature information extracted from video frames in order to reconstruct a specific 3D face model. The approach composed of following steps: marking facial feature points for the first video frame, and extracting face contour at the begi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D Visualization of Seismic Buildings in Yushu Earthquake for Disaster Management

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB) | HTML iconHTML

    The 2010 Yushu earthquake caused tremendous life and economic loss in Yushu county, Qinghai, China. More than hundred thousand buildings were totally or partially collapsed. This paper focuses on the 3D visualization of disaster environment in both coarse scale and fine scale for further disaster management. In the study area, different data resources were used in different scales for different pu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Hybrid Clustering Algorithm Incorporating K-Means into Canonical Immune Programming Algorithm

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    A novel Hybrid Clustering Algorithm (HCA) that incorporates the K-means into the canonical Immune Programming Algorithm (IPA) is proposed after analyzing the advantages and disadvantages of the classical k-means clustering algorithm in the paper. The theory analysis and experimental results show the algorithm not only avoids the local optima and is robust to initialization, but also increases the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Calibration Method for Extrinsic Parameters Based on Four Points

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    In order to solve the calibration of camera extrinsic parameters problem in texture mapping,this paper presents a geometric calibration method based on four point pairs.The first one select three points in the world coordinate system and calculate their coordinates in the camera coordinate system(world point, light heart, and image point are colinear). Transform the coordinates to a reference coor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Condition to the Existence of Periodic-3 Orbit and Implication of Chaos in a Kind of Roseneweig - Macorthur Discrete System

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    A condition to the existence of periodic-3 orbit and implication of chaos in a kind of Roseneweig-Macorthur discrete system is presented in the paper, and it's proven in this condition, the periodic-3 orbit of Roseneweig-Macorthur discrete system is not unique, and such researches will have important ecological significances on the prediction of ecological environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Content-Based Retrieval Algorithm for Document Image Database

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (299 KB) | HTML iconHTML

    This paper makes a study on content-based image retrieval algorithm for document image database. Given a query image the system returns overall similar images in database. For document images, we propose the algorithm based on hierarchical matching tree. First segment an image into several regions with paragraph marking based on paragraph height estimation, and then segment the region into line bl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Creditability Validation Algorithm for Paper-Based Documents

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    It's a challenge to identify whether the paper archive is credible when it is printed out by the credible electronic archives system. First, this paper improves a DCT-based binary image digital watermarking algorithm. The universal algorithm not only applies to text, but also other binary image. It's so robust that can withstand more than three times attack of paper print-scans; the image is modif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Design of Music Teleteacher Based on VS1053 Decorder

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    This research elaborates the innovative ideas and the design thinking of music teletutor. It explores how to achieve the playing of MIDI files through VS1053 decorder, how to achieve such important functions as the real-time display of musical notes,track solos and settings of tempos by analysing and integrating the MIDI files through the users' programing softwares. The purpose of this design is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Digital Watermarking Method for Mobile Video Transmission

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Embedding information into multimedia data, also called watermarking, became recently a pressing need especially with the rapid growth of transmission techniques. In this paper, we present a copyright protection method for mobile video transmission, processing with customized watermarking data at a communication device utilizing received global positioning (GPS) data and communicating the watermar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distribution Technology Based on Segmentation Prefetching and Pipelining in Classified Streaming Media Service

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (147 KB) | HTML iconHTML

    A proxy server is presented and divides the streaming media service that users access to in the 3G network into different types. According to the characteristics of service types, the proxy server uses different segmentation prefetching to improve the efficiency. Meanwhile, this paper introduces the assembly line technology which improves the speed of the streaming media distribution, effectively ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Temporal Error Concealment Algorithm for H.264

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB)

    Packet losses or errors of high compressed video stream during transmission over error-prone channel may cause serious decline in video quality. Error concealment (EC) at decoder side is an effective technology to reduce this video degradation. This paper proposes a Dynamic Temporal Error Concealment (DTEC) algorithm for H.264, which chooses different error concealment approach according to the va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Variable Precision Template Matching Algorithm Based on Hybrid Genetic Algorithm

    Publication Year: 2010, Page(s):1 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (446 KB) | HTML iconHTML

    Conventional algorithms for image matching are slow and inefficient, and standard genetic algorithm (SGA) in image matching is not high in accuracy. In order to solve these problems, a fast and variable precision template matching algorithm based on hybrid genetic algorithm is proposed in this article. The algorithm combines GA and hill-climbing algorithm in an efficient way and performs fast both... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A First Study on Genetic Algorithms Based-Evolvable Motivation Model for Virtual Agents

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    In video games, it's very important to model a virtual agent with motivation variables. In previous researches, a virtual agent's motivation variables are always static. An evolvable motivation system for a virtual agent is set up, priority sequence of an agent's behaviors is decided by the priority sequence of its motivations, the priority sequences of an agent's motivations are determined by gen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Gamut Expansion Algorithm Based on Saturation for Wide-Gamut Displays

    Publication Year: 2010, Page(s):1 - 3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    To avoid color distortion and meanwhile exert display advantage of wide gamut displays, there needs gamut expansion mapping from the current standard gamut to the gamut of these devices. A gamut expansion method based on saturation enhancement in CIE-xy chromaticity diagram is proposed. The algorithm first divides the gamut triangle into two parts, the achromatic region and the normal color region... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HAB Mathematical Model of Competition between Two Algae Species in the Yangtze River Estuary and Its Adjacent Waters

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    Field observations in high frequent harmful algal bloom (HAB) occurrence area around Yangtze River Estuary show that during HAB, nutrients concentration and their distribution are the main factors leading to the population succession between two main dominant HAB species, Skeletonema costatum and Prorocentrum donghaiense. Based on such a succession mechanism, a HAB ecological mathematical model is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Handwriting Numeral Character Recognition System

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    This paper presents a novel handwriting numeral recognition system based on wavelet and neural network. In the first part, we describe a general Optical Character Recognition (OCR) system and point out that selection of a feature extraction method and design of classifier are the most important factor in achieving high recognition performance in character recognition system. In the Second part, we... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A HDV Acquisition and Process Solution for Mine Black Environment

    Publication Year: 2010, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    For the problems that bad imaging result, small adapt range of optical and can't work under the low light intensity mine environment in the existing solutions and products, we proposed a HDV acquisition, process and wireless transmit ion solution that accords with the intrinsically security standard for the low light intensity environment, including two aspects: HDV acquisition front-end and mine ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Performance Fully Pipelined Architecture for Lossless Compression of Satellite Image

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (133 KB) | HTML iconHTML

    This paper presents a novel hardware implementation of the adaptive JPEG-LS in field programmable gate array (FPGA), based on the low complexity lossless compression for images (LOCO-I) compression scheme. Differently from what previously reported in literature, this design achieves a much lower complexity and super high data throughput through an improved prediction model by breaking the feedback... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Improved Anti-Collision Algorithm in RFID System of Internet of Things

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    The anti-collision problem is one of the difficulties of RFID in IOT. In the IOT system, there may be more than one tag in the working range of one reader. When the reader start these tags, all of them will transmit data to the reader at the same time, it will cause the reader can not read the data from the tags correctly. Use the anti-collision technology the IOT can prevent multiple tags simulta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.