By Topic

2010 International Computer Symposium (ICS2010)

16-18 Dec. 2010

Filter Results

Displaying Results 1 - 25 of 190
  • [Front cover]

    Publication Year: 2010, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (809 KB)
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (894 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Message from conference chairs

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Organizers

    Publication Year: 2010, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Opening speech

    Publication Year: 2010, Page(s):1 - 10
    Request permission for commercial reuse | PDF file iconPDF (167 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):1 - 22
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Facial expression recognition using contourlets and regularized discriminant analysis-based boosting algorithm

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    This paper presents a facial expression recognition based on contourlet features and a regularized discriminant analysis (RDA)-based boosting algorithm. The proposed method utilizes a RDA-based boosting algorithm with effective contourlet features to recognize the facial expressions. Entropy criterion is applied to select the informative contourlet feature which is a subset of informative and nonr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abnormal behavior detection with fuzzy clustering for elderly care

    Publication Year: 2010, Page(s):6 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    Home care for the elders who live alone is considered in this research. We focus on the movements of the elders at home. The RFID technology is used to collect the movement data first. Active RFID tags are deployed in the home environment. The elder carries a reader that can detect the signals sent from the tags in real time. The collected signals give us the movements of the elder at home. Cluste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of support vector regression for phyciological emotion recognition

    Publication Year: 2010, Page(s):12 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Cases of physical and mental diseases caused by stress and negative emotions have increased annually. Many emotion recognition methods have been proposed. Facial expression is widely used for emotion recognition. However, since facial expressions may be expressed differently by different people, inaccurate results are unavoidable. Nerve and Physiological responses are incontrollable native respons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A music recommendation system with consideration of personal emotion

    Publication Year: 2010, Page(s):18 - 23
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Emotions evoked by were analyzed. An estimation of the correlation coefficient was applied to determine features of music that evoke an emotion. These features were then used to train two support vector machines (SVMs) for an individual subject to classify music that evokes happiness, anger, sadness, and peacefulness. The proposed approach can be used to classify music that evokes an emotion and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using salient region constraints on Active Appearance Model initialization for facial feature extraction

    Publication Year: 2010, Page(s):24 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Due to the high robustness, Active Appearance Model algorithm (AAM) has been adopted to find face feature points. However, if the initial position of the AAM does not properly cover these feature points, AAM will converge to an illogical location. To resolve this problem, this paper develops salient region constraints on AAM initialization for facial feature extraction. In this approach, we first ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new matrix decode scheme for error diffusion on visual share images

    Publication Year: 2010, Page(s):28 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1782 KB) | HTML iconHTML

    Halftone visual cryptography is an encryption mechanism that a secret image is encoded into halftone shares for showing meaningful images. You only need to superimpose part of these share images. Then, images can be shown the original confidential. In this paper, we propose an encoding scheme to improve the efficiency of visual secret sharing technology. We use the relative location information of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Basic unit layer rate control for video security

    Publication Year: 2010, Page(s):34 - 37
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Video security is one of multi-view video applications. However the current multi-view video coding (MVC) software does not contain any rate control technique, this paper proposes a rate control algorithm for MVC based on the quadratic rate-distortion (R-D) model. The proposed algorithm adopts the fluid-flow traffic model, HRD (hypothetical reference decoder) and linear prediction model of MAD (th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust watermarking scheme based on singular value decomposition and quantization technique

    Publication Year: 2010, Page(s):38 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1261 KB) | HTML iconHTML

    In this paper, a robust watermarking scheme using singular value decomposition (SVD) and quantization is proposed. The SVD technique is used to extract important features from a host protected image; the important features are preserved in the singular values which are resistant to a rotation attack. Due to the sensitivity of singular values, the quantization technique is applied to find an approp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust oblivious watermarking technique

    Publication Year: 2010, Page(s):44 - 47
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Digital watermarking is an effective and popular technique to disapprove illegal copying and distribution of copyrighted digital content. One of the important issues of watermarking is the robustness subject to resist the lossy compression of the watermarked image. In addition, in JPEG quantification, there is a question which is that the two similar DCT coefficients will be quantified to the same... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive weighting color palette image

    Publication Year: 2010, Page(s):48 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (522 KB) | HTML iconHTML

    In this paper, we will propose a data hiding method to embed the color information into the grayscale image and then only authorized users can recover the original color image. At the same time, according to the viewer's reliability, image owners can distribute the different embedding color image information. In other words, they will assign the more closer to the original image color information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feasibility study of using FM radio for data transmission in a vehicular network

    Publication Year: 2010, Page(s):55 - 60
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    This paper uses GNU Radio and USRP boards to implement a feasibility study of using FM radio for data transmission in vehicular networks. Specifically, it implemented packet transmission with GNU Radio, USRP boards and FM radio (88MHz~108MHz) and observed the packet loss rate, packet correct rate with different distances. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RISE: RIpple Sink Exploration in wireless sensor network

    Publication Year: 2010, Page(s):61 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (417 KB) | HTML iconHTML

    With routing paths being modified after each sink movement, delivering data to a mobile sink in a wireless sensor network (WSN) can be a challenging issue. Updating the sink location with messages to maintain a route frequently could result in great energy consumption in the sensors. Moreover, the number of message collisions is proportional to the control overhead of the sink location update. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cross-layer cooperative routing for vehicular networks

    Publication Year: 2010, Page(s):67 - 72
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Vehicular Networks are more and more considerable recently. With the rapid advance of information technology, it becomes easy to support low cost inter-vehicle communication. In particular, the demand for delay sensitive applications, such as streaming media distribution, is increasing. However, due to the high mobility, links between roadside units and wireless nodes are intermittent, unreliable ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of fast restoration multipath routing in VANETs

    Publication Year: 2010, Page(s):73 - 78
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB) | HTML iconHTML

    Vehicular ad hoc networks (VANETs) using WLAN technology have recently received considerable attention. One of the critical research challenges consists of the design of scalable routing algorithms that are robust to frequent path breakage caused by high mobility of vehicles. In this paper, we propose a multipath routing protocol for VANET named Fast Restoration On-demand Multipath Routing (FROMR)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAODV-based multisource multicast routing with fast route recovery scheme in MANETs

    Publication Year: 2010, Page(s):79 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    MAODV (Multicast Ad-hoc On-demand Distance Vector), a well-known multicast routing protocol in MANETs, has been proposed over ten years. It is originally designed for single-source multicast operation and thus inefficient when applied to multisource scenario. In addition, MAODV requires a route rediscovery procedure to recover multicast routing tree from partition of the tree and takes a long time... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The scheduling algorithm in road side unit for vehicular ad hoc applications

    Publication Year: 2010, Page(s):85 - 90
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    This paper focuses on the design of communication strategies between vehicle to roadside unit (RSU). For reducing the contention probability and increasing the probability of uploading high-priority data to the RSU, the IEEE 802.11 PCF MAC protocol is used within the signal coverage rage of RSU. Based on the PCF MAC, a priority-based bandwidth request scheme is applied to increase the probability ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A ZigBee network application in emergency exit guiding

    Publication Year: 2010, Page(s):91 - 94
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    The emergency exit lights are important devices for fire alarm fighting. Most of the emergency exit lights are illuminated for 24 hours and then waste much energies. This paper proposed a wireless alarm system with multi-functional power-saving emergency exit indicating lights. A ZigBee network is constructed for the alarm system. The gas and the smoke sensors are used to report the emergency even... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.