By Topic

Intelligent Networks and Intelligent Systems (ICINIS), 2010 3rd International Conference on

Date 1-3 Nov. 2010

Filter Results

Displaying Results 1 - 25 of 189
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1193 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - xv
    Request permission for commercial reuse | PDF file iconPDF (182 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2010, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Lists

    Publication Year: 2010, Page(s):xix - xx
    Request permission for commercial reuse | PDF file iconPDF (100 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010, Page(s):xxi - xxii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Novel Non-local Means Method for Image Denoising

    Publication Year: 2010, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    An improve method of the block wise non-local means (BNL - means) is proposed for removing noise in the digital image. This method consists of the spectral decomposition of the Gaussian weighted matrix, the pseudo filter constructions, computations of the pseudo weighted coefficients and image denoising using the weighted sum of Gaussian. Experimental results show that this method is simpler, more... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chinese Coin Recognition Based on Unwrapped Image and Rotation Invariant Template Matching

    Publication Year: 2010, Page(s):5 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (706 KB) | HTML iconHTML

    This paper proposes a Chinese coin recognition method based on unwrapped image and rotation invariant template matching. At first unwrap the reference coin and the specimen coin, which makes a rotation of the coins convert to a translation of the profile. Then lengthened the unwrapped specimen coin image and the unwrapped reference coin image always lies in the unwrapped specimen if they are the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rock Segmentation, Matching and 3D Reconstruction Based on Stereo Vision

    Publication Year: 2010, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1014 KB) | HTML iconHTML

    Rock evaluation and return are important work of lunar exploration, they should be done by the lunar rover's hardware and software. A series of algorithms related to rock segmentation, stereo matching and 3D reconstruction which are realized by stereo vision are described in this paper. The experiments based on real image show the validity of the algorithms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Effective Method for Calculating the Area of Enclosed Region

    Publication Year: 2010, Page(s):12 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    It is a frequently encountered problem to calculate the area of target region in image processing. Based on an improved algorithm of contour extracting, a method for calculating the area of target region was advanced. First, the contour is extracted from the binary image, while note the location and type information of the contour points. Next, the area of target region is calculated by weighting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of Fundamental Matrix High-Precision Estimation Based on Particle Swarm Optimization

    Publication Year: 2010, Page(s):16 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    The paper researches the issue that fundamental matrix is recovered in images. Firstly, the corners are detected by Harris operator, and matches cross-correlation corners. According to the definition of polar equation, the polar of feature point must pass corresponding point in matching images. Then, to extract correctly matching points and eliminate error by the criterion which is the distance be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of Moving Targets Tracking Algorithm Based on Kalman Filtering

    Publication Year: 2010, Page(s):20 - 23
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    The purpose of moving targets tracking is to determine the trajectories of moving targets, the key of which is to establish the corresponding relationships between the detected prospect targets and the tracked moving targets. The established corresponding relations are equivalent to the matching problem of target features in consecutive image frames. In the paper, Kalman filter is used as the moti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flame Front Detection by Line Enhance Active Contour from OH-PLIF Images

    Publication Year: 2010, Page(s):24 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (768 KB) | HTML iconHTML

    This paper presents a new Line Enhance Active Contour model (LEAC model) to detect the flame front boundaries from high speed Planar Laser Induced Fluorescence (PLIF) images. The model first enhances the crack region and the gradient of flame front by the Line Enhance Filtering algorithm, and then extracts flame front boundaries and crake edges from the enhanced PLIF images using the CV model. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Illumination Normalization Based on Different Smoothing Filters Quotient Image

    Publication Year: 2010, Page(s):28 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    The illumination variation problem is still an open question in face recognition in uncontrolled environment. To cope with this problem, many methods are proposed to strengthen illumination compensation and feature enhancement, among which quotient image based methods are reported to be a simple yet practical technique. Recently the SQI, MQI and DMQI are reported to obtain good results in illumina... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of the Remote Monitor Server Based on Video Image

    Publication Year: 2010, Page(s):32 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    The problems of large numbers of image data and concurrent client connection requests to the remote video server in C / S mode was resolved by using IOCP (I/O Completion Port) mechanism in image characteristic transmission. The multiple concurrent threads are managed and controlled by IOCP mechanism which makes the system achieve an efficient network performance. The image processing and transmiss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eye Detection and Recognition in the Fatigue Warning System

    Publication Year: 2010, Page(s):36 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    For a driver fatigue warning system, one of the most important problems to solve is eye detection and recognition. The blink information was used to preliminary eye location. Modified Susan operator of eye inner corner extraction to accurate eye location. According to the characteristics of the external environment are less prone to interference from eye inner corner, small template of the eye inn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel Image Enhancement Algorithm Based on Wavelet Multiscale

    Publication Year: 2010, Page(s):39 - 42
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Traditional algorithm of image enhancement enhances the contrast grade and noise of image at the same time. So, noise reduction is needed. Wavelet enhancement considers the spatial domain and frequency domain of image signal, but not the nonlinearity of vision. Aim at the problem of enhanced noise in image enhancement, a new algorithm for image enhancement based on wavelet multiscale is proposed b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Method of Human Facial Expression Recognition Based on Wavelet Transformation Reducing the Dimension and Improved Fisher Discrimination

    Publication Year: 2010, Page(s):43 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1654 KB) | HTML iconHTML

    The segmentation of skin color region is carried on through the mathematics morphology processing, using Hough transform to locate the eyes, and then the expression image is proceeded by geometry standardization. After using wavelet transform to reduce the dimension of images, the feature extraction of facial expression can be realized with the discrimination of improved Fishier. It can solve actu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation and Optimization of the Eye Gaze Tracking System Based on DM642

    Publication Year: 2010, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Real-time eye detection is important for many HCI applications, including eye gaze tracking, auto stereoscopic displays, video conferencing, face detection, and recognition. Currently, the eye gaze tracking systems are usually implemented on general purpose processors. As eye gaze tracking algorithms move from research labs to the real world, power consumption and cost become critical issues. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Algorithm for Image Authentication Based on Fragile Watermarking

    Publication Year: 2010, Page(s):52 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    The algorithm of discrete wavelet transform and Arnold transform combined is developed to achieve the integrity authentication of color image contents through embedding fragile watermarking. Firstly, a new watermarking image is generated with the XOR between the original binary watermarking and the image which is processed with Arnold transform. When the watermark is embedded, the original image c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Medical Image Feature Extraction Algorithm

    Publication Year: 2010, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (357 KB) | HTML iconHTML

    A new algorithm to combine the advantages of both canny operator and the nonsubsampled contour let transform for medical image feature extraction is proposed. Canny operator is the optimum edge detection module. The nonsubsampled contour let transform has the properties of multi-scale and multi-direction. Firstly, the canny operator is used to detect the edges of image, and then the edge image is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medical Image Retrieval Algorithm Using Setting Up Weight Automatically

    Publication Year: 2010, Page(s):60 - 63
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    Integrating multiple features content-based image retrieval can overcome the problems of single feature, but how to combine these features and feature representation methods is important in image retrieval. In this paper an image feature retrieval setting up weight automatically based on particle swarm optimization algorithm is proposed, which could guide the movement direction for particles, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.