By Topic

Multimedia Communications (Mediacom), 2010 International Conference on

Date 7-8 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 84
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Request Permissions | PDF file iconPDF (2486 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Request Permissions | PDF file iconPDF (63 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Request Permissions | PDF file iconPDF (101 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Request Permissions | PDF file iconPDF (120 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - ix
    Request Permissions | PDF file iconPDF (155 KB)  
    Freely Available from IEEE
  • Message from General Co-chair

    Publication Year: 2010 , Page(s): x
    Request Permissions | PDF file iconPDF (102 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010 , Page(s): xi
    Request Permissions | PDF file iconPDF (91 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010 , Page(s): xii
    Request Permissions | PDF file iconPDF (95 KB)  
    Freely Available from IEEE
  • The Set-Up of System of ISDN-based Remote Video Teaching and Conferencing in Sign Language for the Deaf

    Publication Year: 2010 , Page(s): 3 - 4
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (178 KB) |  | HTML iconHTML  

    The system of ISDN-based remote video teaching and conferencing in sign language for the deaf is used by Technical College for the Deaf at Tianjin University of Technology for the remote real-time teaching and the video communicating in sign language with National Technical Institute for the Deaf at Rochester Institute of Technology and National University Corporation Tsukuba University of Technol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Development and Design of the Student Management System Based on the Network Environment

    Publication Year: 2010 , Page(s): 5 - 8
    Request Permissions | Click to expandAbstract | PDF file iconPDF (297 KB) |  | HTML iconHTML  

    This paper discusses the method of the management informationization in higher education. On the basis of a comprehensive investigation and analysis on the student management in higher education, we establish the models of the college students' management informationization by adopting the advanced information technology, and construct the student management informationization platform. Moreover, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Image Denoising Algorithm Based on Non-uniform Rectangular Partition and Interpolation

    Publication Year: 2010 , Page(s): 9 - 12
    Request Permissions | Click to expandAbstract | PDF file iconPDF (1449 KB) |  | HTML iconHTML  

    This paper proposes a novel denoising algorithm according to the image approximation after the Non-Uniform Rectangular Partition. A given image can automatically be partitioned into different sub-rectangles with different dimensions and the bivariate polynomial is used to do the Optimal Quadratic Approximation to gray values of image in each sub-rectangle. When the approximation error and bivariat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A View of Support Vector Machines Algorithm on Classification Problems

    Publication Year: 2010 , Page(s): 13 - 16
    Request Permissions | Click to expandAbstract | PDF file iconPDF (257 KB) |  | HTML iconHTML  

    Support vector machine (SVM) algorithm has shown a good learning ability and generalization ability in classification, regression and forecasting. This paper mainly analyzes the the performance of support vector machine algorithm in the classification problem, including the algorithm in the kernel function selection, parameter optimization, and integration of other algorithms and to deal with mult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Performance Trade-Off for Multi-core Embedded Systems

    Publication Year: 2010 , Page(s): 17 - 19
    Request Permissions | Click to expandAbstract | PDF file iconPDF (320 KB) |  | HTML iconHTML  

    This paper focuses on scheduling periodic tasks on systems with discrete frequencies to achieve energy consumption minimization without sacrificing performance. Based on regulated directed a cyclic graphs, an approach is proposed to solve the problem. An algorithm called list scheduling-based task scheduling (LSTS) algorithm is designed to complete task mapping and frequency selection. We conduct ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constructing Knowledge Management System in E-business Enterprises

    Publication Year: 2010 , Page(s): 20 - 23
    Request Permissions | Click to expandAbstract | PDF file iconPDF (202 KB) |  | HTML iconHTML  

    Knowledge management has long been considered a successful developmental pattern by education and business community, and dubbed as the 21st century management Bible. Many e-business enterprises have established their own knowledge management system. it is commonly accepted as an extended system to sustain its innovation ability. Based on the theory of knowledge management, the paper analyses the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Image Encryption Algorithm Based on Fractional Fourier Transform and Chaotic System

    Publication Year: 2010 , Page(s): 24 - 27
    Request Permissions | Click to expandAbstract | PDF file iconPDF (933 KB) |  | HTML iconHTML  

    In order to cope with the shortage of present image encryption algorithm, a novel image encryption algorithm based on chaotic system and fractional Fourier transform is proposed in this paper. The image encryption process includes two steps: first the image is encrypted by employing Fractional Fourier domain double random phase, then the confusion image is encrypted by using confusion matrix which... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Role of Path Editing Based on 3D Motion

    Publication Year: 2010 , Page(s): 28 - 30
    Request Permissions | Click to expandAbstract | PDF file iconPDF (180 KB) |  | HTML iconHTML  

    This paper discusses one of the important ways of virtual role of motion path editing sports, the Motion Path Editing. Many jobs have been done on how to make the existing motion capture data move along different paths. In this paper we will focus on adopting automatic feature recognition method to extract the physical and some other constraint features of motion data, by increasing constraints in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Intelligent Monitoring System for Greenhouse

    Publication Year: 2010 , Page(s): 31 - 34
    Request Permissions | Click to expandAbstract | PDF file iconPDF (232 KB) |  | HTML iconHTML  

    In order to solve the defects of traditional methods in measuring and adjusting the parameters of greenhouse environment, a micro controller-based automatic controlling system of temperature and humidity is designed in this paper. It introduced the hardware, software flow chart and the RS-485-based communications network. The slave machines are mainly responsible for collecting the data, displayin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method of Bridge Target Detection on ASAR Imagery

    Publication Year: 2010 , Page(s): 35 - 38
    Request Permissions | Click to expandAbstract | PDF file iconPDF (455 KB) |  | HTML iconHTML  

    The result of linear target detection is advantageous to the content analysis and interpretation of ASAR imagery and can be regarded as the imagery matching reference as well as the GIS platform input to realize the map automatic update. On the foundation of the previous studies, the method of bridge target detection based on Combined wavelet transformation and mathematical morphology analysis is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Firework Simulation Based on Particle System in Virtual Scene

    Publication Year: 2010 , Page(s): 39 - 41
    Request Permissions | Click to expandAbstract | PDF file iconPDF (465 KB) |  | HTML iconHTML  

    Fireworks simulation based on particle system is studied in this paper. Different patterns of firework are simulated by mathematical functions to control the trajectory of the explosion of fireworks. In addition, by adding the appropriate background and sound, we make the simulation of fireworks not only visually but also acoustically more realistic. Related methods about fireworks simulation are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smoke Simulation Based on Particle System in Virtual Environments

    Publication Year: 2010 , Page(s): 42 - 44
    Cited by:  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (354 KB) |  | HTML iconHTML  

    The realistic rendering of smoke scene is one of the most challenging tasks in computer graphics. Smoke simulation based on particle system is studied in this paper. In the real-time animation simulation of smoke model, we consider the impact of the wind on smoke particles. Different dense smokes are simulated by controlling the amounts of smoke particle. The realistic rendering of smoke scene is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy Comprehensive Evaluation of Civil Aviation Safety Supervisor

    Publication Year: 2010 , Page(s): 45 - 48
    Request Permissions | Click to expandAbstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    An examination model was proposed for safety performance of civil aviation supervisor, by the use of Fuzzy Comprehensive Evaluation method. This model considered the impact of safety responsibility of civil aviation supervisor and influence from surveillance actions to those who being supervised. This included, safety policy, safety risk management, safety assurance, safety promotion, 4 top-level ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regular Abstract of Concept Lattice in Network Communication

    Publication Year: 2010 , Page(s): 49 - 52
    Request Permissions | Click to expandAbstract | PDF file iconPDF (277 KB) |  | HTML iconHTML  

    The web page in network communication were partitioned to Hub web page and Authority web page. Simplifying the H-A web page set was more researched by making abstract method in this paper. Existing condition of the regular abstract was deeply researched and discussed, and the solution to the regular abstraction was given too. So simplifying the huge web page concept lattice about network communica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Compiler-Based Heterogeneous Multi-core Structure

    Publication Year: 2010 , Page(s): 53 - 56
    Request Permissions | Click to expandAbstract | PDF file iconPDF (171 KB) |  | HTML iconHTML  

    Numerous new issues appear as the single processer is developing towards the multi-core processor. The research on compiler-based heterogeneous multi-core structure is the one of the issues. Starting from the structure analysis, this paper explains the effective thread management by heterogeneous multi-core structure and thus demonstrates the advantages of the compiler-based heterogeneous multi-co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Shieh-Lin-Yang-Sun Signature Scheme

    Publication Year: 2010 , Page(s): 57 - 60
    Request Permissions | Click to expandAbstract | PDF file iconPDF (256 KB) |  | HTML iconHTML  

    In 2000, Shieh et al. proposed a digital multi-signature scheme for authenticating the delegates of mobile code systems. Later, Hwang and Li showed that a forgery attack against the Shieh et al. scheme could be successful. Chang and Chang improved the Shieh et al. scheme. Their proposed scheme effectively defends against potential attacks as pointed out by Hwang-Li. Later, Zhang proved that the Ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of Cloud Image Based on Perlin Noise

    Publication Year: 2010 , Page(s): 61 - 63
    Request Permissions | Click to expandAbstract | PDF file iconPDF (494 KB) |  | HTML iconHTML  

    Fast display of realistic cloud scene is a challenging task for researchers in computer graphics. This paper describes a method of simulating cloud based on Perlin noise. The concept of Perlin noise and the method of generating Perlin noise are introduced firstly. Then related functions in our algorithm are described in detail. Some results and correspondence parameters are given. Experiment resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.