By Topic

Digital Content, Multimedia Technology and its Applications (IDCTA), 2011 7th International Conference on

Date 16-18 Aug. 2011

Filter Results

Displaying Results 1 - 25 of 44
  • [Front cover]

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1102 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1 - 6
    Save to Project icon | Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • A computer simulation method on the electronic probability distribution of hydrogen atom

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (108 KB) |  | HTML iconHTML  

    The values I and H in HIS color model is employed respectively to denote the electronic probability of the hydrogen atom in two-dimensional and three-dimensional cases. The perfect visualization distribution of the electronic probability of the hydrogen atom is obtained, with which we can directly observe the overall appearance and the inner concrete distribution of the electronic cloud. By changing the traversal method and making use of the symmetry of the electronic probability distribution of the hydrogen atom, the calculation efficiency is greatly improved, and the simulation software becomes very practical. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable video transmission over unreliable networks using multiple description wavelet coding

    Page(s): 5 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (146 KB) |  | HTML iconHTML  

    Scalable video coding (SVC) and multiple description coding (MDC) are the two different adaptation schemes for video transmission over heterogeneous and best-effort networks such as the Internet. We present a new approach to combine the advantages of SVC and MDC to provide reliable video communication over a wider range of communication networks and/or satisfy application requirements. Our proposed method utilizes 3D discrete wavelet transform and a modified embedded zero tree data structure to group the coefficients in different descriptions. The proposed method reduces the impact of the drift error by organizing the frames in a hierarchical structure. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital image forgery detection through data embedding in spatial domain and cellular automata

    Page(s): 11 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (882 KB) |  | HTML iconHTML  

    In this paper we present a new algorithm to detect digital image forgery based on cellular automata and data embedding in spatial domain. The original JPEG image will be partitioned into some regions. We use region-based segmentation to specifying the desired regions of interest from the input image. First we extract the visual attributes of the original image and achieve the statistical information for the selected region. Then we apply linear cellular automata rules to create a robust cipher key from these values. We embed the cipher key into the spatial domain to authenticate and validate the original image. The proposed algorithm is applied on 100 numbers of grayscale images (size 800 × 600). The results have demonstrated the robustness and stable time complexity of the proposed method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategic management system for academic world: Expert system based on composition of cloud computing and case based reasoning system

    Page(s): 16 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (156 KB) |  | HTML iconHTML  

    The presented work in this paper explores the relationship between Information Technology (IT) and Process Redesign (PR) in academic world. Existing processes for student's and faculties' vital data collection require a great deal of labor work to collect, input and analyze the information. These processes are usually slow and error prone, introducing a latency that prevents real-time data accessibility. We propose a solution to automate this process by using “documents” attached to existing faculty/ student datasheet that are inter-connected to exchange service. The proposal is based on the concepts of utility computing and cloud computing networks. The information becomes available in the “cloud” from where it can be processed by expert systems and/or distributed to administrative staff. The proof-of-concept design applies commodity computing integrated to legacy education devices, ensuring cost effectiveness and simple integration. In the presented paper, author suggests that IT also have a stronger role in software realization of an expert system. Author would like to assemble experts experience in our dumb box (Personal Computer) as knowledge base. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Retraction
    A new audio zero-watermark algorithm for copyright protection based on audio segmentation and wavelet coefficients mapping

    Page(s): 22 - 26
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (331 KB) |  | HTML iconHTML  

    Notice of Retraction

    After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

    The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

    A widely studied scheme for digital audio copyright protection is based on digital watermarking technology. In this paper, to make audio watermarking both avoid the contradictions strong robustness and transparency, and resist the attack of random large-area cropping, a novel audio zero-watermarking scheme is proposed. An audio segmentation algorithm based on Bayesian Information Criterion (BIC) is introduced to divide audio signal into many different size segments. After that, each segment is extracted Double-direction Mapping Matrix (DMM) and implemented watermark embedding or detection. In the procedure of extracting DMM, we employ a novel method to map the approximate coefficients of wavelet transform of an audio segment into a binary matrix, which is the key process of zero-watermarking algorithm proposed in the paper. The experimental results demonstrate that the proposed zero-watermark scheme has more excellent performance in terms of security, robustness, anti-cropping compared to the earlier audio watermarking schemes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A construction method of music features libraries in QBH

    Page(s): 27 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (375 KB) |  | HTML iconHTML  

    How to construct music feature libraries properly is significant to Query by Humming (QBH) in a cross-media information retrieval (CMIR) system. On the foundation of content-based retrieval for audio media such as speech, music or song, sound, this paper divides the music features metadata into three parts: MIDI pure structured (PS) music data, WAV real example (RE) music data and keyword sound (WS) text-information data. Firstly, we introduce our system architecture. Secondly, we propose anew construction method for music feature libraries in order to achieve more satisfactory results. Thirdly, we present and design the novel mix-indexing architectural structure in order to carry out some efficacious searching algorithms. At last some pilot experiment results show the feasibility of our study work. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A quality-aware approach towards the integration of feature-based geospatial data

    Page(s): 33 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (373 KB) |  | HTML iconHTML  

    Integrating geospatial data acquired from diverse resources has been drawing a tremendous attention in recent years. Although many barriers have been successfully removed by the Open GIS technology, merely superimposing the acquired geospatial data together in the map interface certainly does not suffice the needs for correct application use. We argued that every distributed geospatial feature must be equipped with quality information that can characterize its unique property and enable future applications to unambiguously and automatically parse the necessary information to aid the making of integration decisions. Such a quality-aware approach helps users to build a knowledge-based working environment where the quality difference of acquired data can be correctly identified and analyzed. Furthermore, the design of GIS-based functions can incorporate built-in GIS processing knowledge to ensure the precision and accuracy of the analyzed results. As the future GIS-based application will largely depend on data dynamically collected from other resources, we successfully demonstrated that the necessity of data quality information and how it can be incorporated into the design of future data sharing environment, e.g., SDI. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel low-swing transceiver for interconnection between NoC routers

    Page(s): 39 - 44
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (300 KB) |  | HTML iconHTML  

    For interconnect between NoC (Network-on-Chip) routers, power consumption is high and data rates are limited when conventional transceivers are used. In this paper, a novel high-speed and low-power source-synchronous transceiver is proposed. An improved low-swing FIR (Finite Impulse Response) filter with resistive pre-emphasis in combination with a double-tail sense amplifier enables a achievable data-rate of 9Gb/s over a 2mm twisted differential interconnect, while consuming only 181fJ/b. By transmitting the clock signals with reduced swing, power consumption of the source-synchronous clock is reduced by 66%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in healthcare and welfare intercloud

    Page(s): 45 - 48
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    In this paper, we introduce healthcare and welfare provisioning intercloud on an example of Aging in Place platform. We relate it to earlier work both in healthcare and intercloud domain. We describe goals and architecture of the platform and demonstrate benefits of applying Cloud Computing solutions to previously identified challenges. Subsequently, we list and analyze challenges that seem to be unique to such setting and identify risk factors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A case study on building Web3D virtual reality and its applications to joyful learning

    Page(s): 49 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (409 KB) |  | HTML iconHTML  

    The study constructs joyful Web 3D virtual situational learning materials with the perspectives of learners, and takes Tainan Confucian Temple as an example to allow the learners to learn and experience freely in virtual reality. The joyful learning environment is presented in the virtual situation through vivid text, sound, a guided picture tour, and a game-like learning mechanism. Different from the passive “knowledge giving model” in the past virtual situational learning system, the “joyful learning component” is integrated into the virtual situation to change knowledge imparting from “passive” to “active” to effectively enhance the learning motivation of learners and improve their learning effectiveness. Finally, grade 5 students are applied as the experimental subjects in the study analysis focusing on the satisfaction of learning system application and the significance difference of the learning result before and after the system is applied. The study result shows that the application of a joyful virtual situation can indeed achieve the same effectiveness of on-site experimental learning. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • N-gram based text classification for Persian newspaper corpus

    Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (261 KB) |  | HTML iconHTML  

    Statistical n-gram language modeling is applied in many domains like speech recognition, language identification, machine translation, character recognition and topic classification. Most language modeling approaches work on n-grams of words. In this paper, we employ language models classifier based on word level n-grams for Persian text classification. The presented approach computes the occurrence probability on word sequence in training data. Then by extracting the word sequence in test data, it can predict the highest probability for related class to given news text. We show that statistical language modeling can significantly cause high classification performance. The experimental results on Hamshahri corpus show satisfactory results and n-grams of length 3 are the most useful for Persian text classification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-encoded spread spectrum for multirate multimedia communication in multipath channel

    Page(s): 60 - 63
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (147 KB) |  | HTML iconHTML  

    In this paper, we propose the self-encoded spread spectrum (SESS) with multirate multimedia communication in multipath channel. In multirate multimedia SESS system, each application has their own transmission bit rate. The signal is transmitted through multipath channels each with different channel gain and time delay. We view the main path as the signal resource and other paths as interference. At the receiver side, decorrelation scheme is employed for the main path combined signal not only to reduce the crosstalk between different applications, but also to provide a better estimation for the despreading sequence in the main path. Interference cancellation (IC) in the main path is adopted to improve the correlation detection and iterative detection(ID) performance. Finally the ID is employed to improve the bit error rate (BER). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malicious objects trafficking in the network

    Page(s): 64 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (134 KB) |  | HTML iconHTML  

    Traffic control and management is the crucial factor for the smooth running of the network and network management. When a packet travels in the cyber space it moves according to the routing protocols. But still there are traffic problems and an attempt is made to solve this problem with mathematical modeling using querying theory. Internet traffic contains different type of packets such as IP, TCP, UDP, SMTP, FTP, ARP, etc. These packets are vulnerable to cyber attacks, which leads to various problems in the network and cost damages in the network. Various cyber attacks such as DDoS which consume excessive bandwidth can easily be detected by using queuing model. In this paper we propose a queuing model for the incoming traffic. Our aim is to filter malicious information in the early stage of the attack and reduce the unnecessary false positives. We consider the Poisson distribution of the traffic arrival and model the system as M/M/1/∞/∞ queuing model to detect the malicious traffic. We also incorporate the concept of self-similarity to detect the self-similar patterns in the traffic (which a major cause of the cyber attacks) and the abnormal behavior of the internet traffic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of the parallel files transmitting problems based on Petri nets

    Page(s): 70 - 75
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (356 KB) |  | HTML iconHTML  

    The optimized scheme for file transfer model is a major network communication and resource sharing problem among Net engineering. We focus on Petri Nets and proposed an optimized scheme by analyzing the characteristics of the file concurrent transmission control system. The model without conflict is constructed and its rationality verified. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved asymmetric digital watermarking system

    Page(s): 76 - 79
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    A kind of image asymmetric digital watermarking algorithm based on eigenvector of symmetric matrix is proposed in this paper. The algorithm used correlation detection and the watermarking can be detected in a blinding way. The experimental results indicate the algorithm is robust to rotation, scaling, noise and some other attacks, especially to the combination of some attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of color constancy methods for skin color under colored illuminants

    Page(s): 80 - 83
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (217 KB) |  | HTML iconHTML  

    This paper considers well-known color constancy methods for recovering and detecting skin color - the methods are compared by using the facial images with various skin colors acquired under colored illuminants. For quantitative evaluation, we created the experimental images based on the Caltech Face Database and used standard deviation on their Cb-Cr histograms as an evaluation factor. The experimental results showed that the color constancy method can be used to reduce the effects of colored illuminant and color difference in skin regions caused by the colored illuminant is reduced by GW method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real time head tracking of depth sequence with error recovery

    Page(s): 84 - 88
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (378 KB) |  | HTML iconHTML  

    Generally head tracking is based on the texture of face. The appearance template methods (skin-color-depended or texture) tracking results largely depend on a statistical color models obtained by observed image set for initialization. However, it remains an open problem on how to accurately initialize of models according to large variability in appearance of human with different clothing altering in appearance due to movement over time. It challenged tracking process with texture and illumination problem. This paper presents a real-time solution for head tracking without sensitive to texture and illumination, which based on sequence captured by depth sensor can handle the extreme rotation e.g. face totally turning backward. And the solution has the advantage of preliminary tracking error detecting and self error recovery. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and development of web-assisted instruction system for university physics course

    Page(s): 89 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (118 KB) |  | HTML iconHTML  

    The methods and solutions have been proposed to design and develop the web-assisted instruction system (WAIS) for university physics course based on Web 2.0. In this paper the architecture and design principles of the system are given. In addition, the function and implementation of the main modules are also presented in details. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A portable authoring tool for organizing and indexing curricular materials

    Page(s): 94 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (410 KB) |  | HTML iconHTML  

    Internet use has been encouraged for K-12 students in Taiwan, and many educators would like to break through the confines of traditional textbook-centered teaching to present activities that encourage students to explore and construct their own knowledge. But many educators are not well prepared to teach curricular materials in form of multimedia with the internet, and internet use is limited in scope and substance. Since this requires developing innovative materials and curriculum tailored to local students, educators have neither the time nor the information to do much of this from scratch. The internet provides a medium for sharing innovative pedagogical resources broadly. Governmental projects and educator organizations have already begun to post curriculum ideas on internet servers. However, it is difficult to obtain the right resources that meet specific needs, and play their multimedia materials in classrooms under a limited-bandwidth transmission environment. Educators need productivity tools for organizing lesson plans and presenting their collected materials off-line; moreover, they need tools for locating sites of materials by surfing the network, searching the individual curricular sources, adapting retrieved materials to their classrooms, organizing these resources in coherent lesson plans. This study designed and prototyped a portable authoring tool based on a Pedagogical Service Platform (PSP) that provides authoring and presentation supports for educators so they can make effective use of contemporary pedagogical resources posted on the internet by Taiwanese governmental agencies. PSP maintains information for finding pedagogical resources distributed on the internet and provides query and browsing mechanisms to explore what is available. The portable authoring tool are included for tailoring retrieved resources, creating supplementary materials, and designing innovative curriculum. Additionally, The framework also explores and demonstrates how the i- - nternet shapes and is shaped by classroom practices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded system for disaster detection and rescue based on an improved CAMSHIFT framework

    Page(s): 100 - 105
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (479 KB) |  | HTML iconHTML  

    Fire accidents and some other nature disasters have been great threats to the human society. However, there's no uniform framework for detecting and monitoring such disasters. Therefore, we proposed a prototype embedded system for early fire detection and monitoring based on computer vision techniques, aiming at high reliability and low cost. By employing a bidirectional histogram training method and an extended CAMSHIFT tracking framework, the proposed fire detection system can detect the suspicious fire region accurately and robustly with very low hardware costs. This framework can be conveniently extended to some disaster detection and rescue projects like the search for survivors from the shipwrecks. Experimental results have proved our proposed system a promising one for massive deployment and daily usage. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-dimensional transfer functions design based on boundary model

    Page(s): 106 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (235 KB) |  | HTML iconHTML  

    Direct volume rendering is an important method for visualizing complex dataset. However, many information is lost in the process of generating 2D data from 3D data. Since the lack of prior information of volume data, designing transfer function becomes a time-consuming and unintuitive work. Most direct volume renderings employ one-dimensional transfer functions, which assign color and opacity to the volume base on the single scalar quantity, but their capability for extracting specific material boundaries is not satisfied. In this paper, we describe the application of multi-dimensional transfer functions to scalar data. The data value's first and second directional derivatives along the gradient direction help us find the exact boundaries of interested structures. Through analyzing the boundary model, we can quickly and easily design our transfer functions. Experimental results show that this approach can solve the locating of interested structures, and the rendering results completely meet clinical needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the evaluation of the rural informatization of Jiangsu province based on SOM neural network

    Page(s): 111 - 114
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (115 KB) |  | HTML iconHTML  

    In order to promote the development of agricultural modernization, the evaluation of the rural informatization is very significant. By the study of the domestic rural informatization evaluation methods, a new evaluating index system, including 18 indicators, is constructed for Jiangsu province. On the basis of SOM neural network model, which is able to simulate the self-organizing learning without supervision in the training, the index system evaluates the information technology in rural areas of Jiangsu province scientifically. From the evaluation, it is concluded that the overall development of rural informatization in Jiangsu Province, including rural information resource base, information application, information professionals, information production and consumption, is not balanced. The evaluation has a very important significance in guiding the planning and construction of rural informatization. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrate social simulation content with game designing curriculum to foster computational thinking

    Page(s): 115 - 118
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (133 KB) |  | HTML iconHTML  

    Computational thinking is a fundamental analytical ability to solve problems, design systems, and understand human behavior based on the fundamental concepts of computer science. The concept of computational thinking is almost needed on every profession in the computerization of society. Teaching computational thinking to cultivate problem solving ability by computer is a challenge of computer science education, especially for the K-12 level. Although studies introduce computational concepts by programming design, computational thinking and computer science are not computer programming. The study uses social simulation content (i.e. NetLogo, which uses muti-agent technology) to scaffold learning computational thinking concepts, such as simple genetic algorithm, parallel computing, artificial neural net, or deadlock (such as dining philosophers). To stimulate learning transfer onto computational thinking, NetLogo models library will be used to motivate reflection and meta-cognition development. Preliminary experimental results came from both questionnaires and artifacts. In the future, Gero's (1990) function-behaviour-structure (FBS) ontology will be used for the qualitative analysis to explain the outcomes of learning transfer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.