By Topic

Wavelet Active Media Technology and Information Processing (ICWAMTIP), 2012 International Conference on

Date 17-19 Dec. 2012

Filter Results

Displaying Results 1 - 25 of 108
  • Nocturnal wild bird species identification by sound information using wavelet

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (504 KB) |  | HTML iconHTML  

    Nocturnal wild bird species identification by sound information using wavelet is investigated. As the method, firstly, perform frequency conversion of a bird call. From there, obtained the mean value express the strength of the frequency ingredient and the modulation spectrums express the frequency of the bird call. Next, input feature quantity into the neural network for classification. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal image fusion algorithm based on wavelet transforms

    Page(s): 4 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (515 KB) |  | HTML iconHTML  

    The fusion model in wavelet domain is proposed. To maximize fusion and enhances the hidden image's capability of resisting attacks. Method: we derive the image related scrambling transform based on least square error principle. The algorithm improves the extent of fusion. The fusion factor, the scrambling matrix and iteration number are used as secret keys with the intension of improving the algorithm's security. Result: Simulation experiments have proved that the proposed algorithm improves the fusion factor and the extent of fusion significantly, Conclusion: The algorithm can be widely used for copyright protection of electronic image products and encrypted transmission of important military information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application of image processing in flat panels

    Page(s): 8 - 11
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1217 KB) |  | HTML iconHTML  

    An image processing system has been designed, implemented and experimented for use in the Liquid Crystal Display fabrication. To improve the efficiency of throughput while LCDs conveyed in the fabrication process, an automatic system of the alignment and the dispensing detection are undertaken using image capture on an XY table. An explanation on the configuration of optics and the panel orientation correction are introduced. A cross marked key for alignment is captured by a CCD camera which provides us the coordinates and the orientation of the LCD. Implementations of the algorithm of the binarization, the edge detection and the thinning/skeletonization are executed in the Visual Basic language. The dispensing performance is investigated by calculation the dege width of the gluing material on the panels. The experimentation reveals us a satisfactory result and a user-friendly interface to personal computers. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neighbor sample membership weighted KFCM algorithm for remote sensing image classification

    Page(s): 12 - 15
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (856 KB) |  | HTML iconHTML  

    Clustering accuracy of the Kernel Fuzzy C-Means (KFCM) algorithm is affected by its equal partition trend for data sets. A Neighbor Sample Membership Weighted KFCM (NSM-WKFCM) algorithm is achieved by introducing the weighted information of the neighbor sample membership into the standard KFCM algorithm in this paper. A set of Beijing-1 micro-satellite's multispectral images is adopted to be classified by the KFCM and NSM-WKFCM algorithms. Experimental results indicate that the NSM- WKFCM algorithm significantly improve the unsupervised classification ability of remote sensing images compared with the KFCM algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community detection algorithm using the definition of community

    Page(s): 16 - 19
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (315 KB) |  | HTML iconHTML  

    On the basis of discussing the definitions of community in complex network, a new method is to put forward for the community detection. This method initially marks all nodes as unvisited, and then searches these unvisited nodes and seeks some so-called strong structures made up of a core node with a maximal degree and most of its neighbors, and marks them as visited. Subsequently the unvisited nodes are assigned to different strong structures according to some criteria. At last the existing strong structures are perhaps optimized and then different communities generate. The experiment results show that the algorithm is stable and reliable and can accurately obtain the division of community structure. In addition, the algorithm is fast and its time complexity is approximately O(n+m). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on the selection of wavelet bases for wavelet-based signal trend elimination

    Page(s): 20 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1107 KB) |  | HTML iconHTML  

    The accuracy and effectiveness of wavelet analysis for signal trend elimination could be associated with the selection of wavelet bases. A new concept named detrending error exponent (DEE) is presented and the formula for calculating the DEE is proposed. The DEE that includes global error item and part error item reflects the capability of the wavelet bases function on signal trend elimination. For different wavelet bases adopted to detrend based wavelet, the values of DEE are also different and the wavelet bases with less DEE means more suitable to eliminate signal trend. Based on a simulated signal with defined trend, the DEE values of 34 general wavelet bases are calculated by using proposed formulas with same weights of global error and part error, and top 8 wavelet bases with the least integrated DEE are selected as preferred wavelet bases. For validating the result of selection, one preferred wavelet bases “sym10” and two non-preferred wavelet bases are applied to detrend an acceleration data measured from a car body and then compared with each other. For further analysis, the integrated DEE values of 8 preferred wavelet bases are recalculated with different weights of global error and part error. The comparison of calculating result shows that the different weights of global error and part error cause the DEE values of 8 preferred wavelet bases changed, but their rank place remain unchanged. Considering the change on the components of simulated signal trend, namely the proportion of linear trend, sine trend and nonlinear trend, the DEE values of 8 preferred wavelet bases are recalculated and compared again. The result shows that the rank of 8 preferred wavelet bases is unchanged when sine trend is adjusted but changed obviously when nonlinear trends is adjusted. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D shape reconstruction from 2D ISAR measurements

    Page(s): 25 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (440 KB) |  | HTML iconHTML  

    At present, most of 3D reconstruction algorithms only use the range history of scatters for ISAR frame. The reconstruction algorithm that utilizes both range and cross range data is proposed to replace of the method using only the range, which improves the reconstruction accuracy and decreases the least image quantity for the successful reconstruction. The 3D Euclidean distances between points are used to evaluate the accuracy performance of the proposed algorithm. The experiment results show that the proposed algorithm acquire the better accuracy performance than the method for range only under the same image quantity. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A static detection model of malicious PDF documents based on naive Bayesian classifier technology

    Page(s): 29 - 32
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (454 KB) |  | HTML iconHTML  

    For the purpose of improving native detective method based on signature matching of traditional anti-virus software and inadequate performance of dynamic testing, the researchers demonstrate a new static detection model of malicious PDF documents based on naive Bayes classifier technology. The model considers with exploit techniques of heap spray, JavaScript syntax and shellcode feature. Compare to traditional detection techniques, the training samples and actual test data showed that the detection efficiency and accuracy of the model have improved greatly. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech separation based on the images analysis method in CASA

    Page(s): 33 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (757 KB) |  | HTML iconHTML  

    Traditional Computational Auditory Scene Analysis (CASA) method separates speech signal by segmenting and grouping two steps. Combining image analysis techniques acted under correlogram into speech analysis, we propose a novel scheme for these two procedures. A 2-D wavelet transform is employed to segment the speech piths, in order to implement the onset/offset detection. For grouping, we extended a seed region growing method by a new cost function for clustering the image segments of the target speech within segmented speech correlogram. The new approach has been evaluated on mixture speech data and the results demonstrated its efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved method for predicting evolutionary link in email network

    Page(s): 37 - 41
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (586 KB) |  | HTML iconHTML  

    The prediction of the evolutionary link in the email network is an important research direction in the field of network security. The weighted correlated Bayesian classification model is an extension of the Naive Bayesian classification model. In this paper, email network users were grouped by the characteristics of email content and the evolutionary links were sorted into two types: the link in the same issue group and between two issue groups respectively. By defining classification attributes for each type of evolutionary link and depending on the weighted correlated Bayesian classification model, an improved method for predicting evolutionary link was proposed. The result of experiment in email dataset showed that the accuracy and precision of the improved method is higher than Common Neighbor algorithm and Adamic-Adar algorithm. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on spatial-temporal characteristics of interannual variation of maximum daily precipitation in Jiangxi Province

    Page(s): 42 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1214 KB) |  | HTML iconHTML  

    On the basis of the daily precipitation data statistics of 17 meteorological stations from 1953 to 2010 in Jiangxi Province, this paper studied the interannual variation characteristics of maximum daily precipitation and its spatial-temporal characteristics in Jiangxi Province with the application of GIS technology and Mann-Kendall (M-K) statistic method. The results showed that there was a slightly constant rising tendency of monthly average maximum daily precipitation in flood duration in Jiangxi from 1953 to 2010, especially in the Southern Jiangxi with the confidence of 90%; For the whole province, the abrupt change of the average monthly maximum daily precipitation in flood duration took place in 1992, with the confidence of 95%; moreover, the confidence of Eastern, North Central and Southern were 95%,95% and 90%. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulating network traffic with a new DWT-based model

    Page(s): 46 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1308 KB) |  | HTML iconHTML  

    Traffic models play a significant role in the analysis and characterization of network traffic and network performance. Thorough research and accurate modeling on network traffic become an efficient way to explore network internal mechanism, control network flux and optimize network performance. In this paper, we put forward an Haar DWT-based traffic model. The scaling analysis on the four simulated traces show that our model can generate multifractal traffic data, which is in a close fit to the real trace statistics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Skin wrinkles analysis based on digital image processing

    Page(s): 50 - 53
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (460 KB) |  | HTML iconHTML  

    In this paper, we propose a novel objective approach which utilizes the wrinkles on the lower eyelid image of the human to estimate the corresponding skin aging level. Although the face is a small part of the human body and the lower eyelid occupies only a little area on the human face, it possesses important information for aging level identification owing to its vulnerability and fragility to the outside stimuli. Since the wrinkles are the symbol of the aging, it comes naturally that we would pay most attentions to them. With the help of the techniques of image processing, the proposed skin wrinkle analysis algorithm has achieved fairly good performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Controllability for large flexible spacecraft with decoupling mechanism

    Page(s): 54 - 56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (335 KB) |  | HTML iconHTML  

    A new three-axis interface system called “decoupling mechanism” is described. Dynamic equations are simple derived which indicate spacecraft with decoupling mechanism is a descriptor system. Eigenvalue mobility is utilized to measure controllability for large flexible spacecraft with the new system. Analysis is performed for descriptor decentralized control system. These comparisons between two kinds of system provide physical insight on the improvement introduced by proposed mechanism. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of JPEG2000 on Android

    Page(s): 57 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1164 KB) |  | HTML iconHTML  

    Even though it has been improved that network, multimedia technology and mobile system provide users more convenience nowadays, better performance of data transmission and storage is in urgent need. In this paper, a still image compression, JPEG2000 is transplanted on smart phone based on Android to enhance efficiency of image compression compared with traditional JPEG. JPEG2000, which is wavelet-based, has the features of multi-level image resolution and image quality; and Android has powered more and more embedded terminal devices in recent years. The combination of them will make an excellent influence. Some key technologies about JPEG2000 and Android are introduced and discussed during the transplanting in the paper. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Eye movements reveal process of feature integration

    Page(s): 62 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (389 KB) |  | HTML iconHTML  

    With rapid development of neuropsychology science, studies on eye movements made more fateful achievements since eye movements are regarded as an important tool for studying visual information processing. Further, studies have showed that models of eye movement reflect human's psychological changes. The current study aims to build classifiers using eye movements while subjects freely viewed segmented stimulus (2 or 30 bars, coherent or incoherent). Saccade rate, saccadic duration, and saccade amplitude were picked as parameters and Fisher linear discriminant analysis (LDA) and Support Vector Machine (SVM) were applied on eye movements to build classifiers. For both types of classifiers, the classifier used saccade amplitude produced highest accuracy which was even better than that used the combination all parameters. Comparing between two types of classifiers, the SVM showed advantages over the Fisher LDA. Furthermore, classification accuracy of discriminating incoherent-2bars condition from other conditions was highest, consistent with the results of statistical analysis. These results suggest that saccade amplitude might play an important role during the process of feature integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel algorithm for improving image content authentication and localization accuracy

    Page(s): 66 - 69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (940 KB) |  | HTML iconHTML  

    A novel semi-fragile algorithm using the wavelet-based contourlet transform (WBCT) is proposed in the paper. In the WBCT domain, the original image is first decomposed into a low-pass subband and several directional subbands. The watermark is embedded into the directional subbands. The embedding technique is based on the modulated parent-children energy relationship which has semi-fragile characteristics. Both the false alarm and missed detection rate (MDR) are used to evaluate the performance of our scheme. Simulation results showed that our proposed method can localize the malicious tampered region with high accuracy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image fusion based on principal component analysis in dual-tree complex wavelet transform domain

    Page(s): 70 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1076 KB) |  | HTML iconHTML  

    This paper propose an new image fusion method based on principal component analysis and dual-tree complex wavelet transform(DWCWT), which uses DTCWT to decompose the source images in a multi-scale and multi-direction way and then fuse the related information together according some fusion rules. This approach combines principal component analysis based image fusion rule and dual-tree complex wavelet transform, we named the new method combining the dual-tree complex wavelet transform and PCA as DTCWT-PCA image fusion algorithm. The experimental results demonstrate that our method is effective and competitive. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A NystrÖm-based subtractive clustering method

    Page(s): 74 - 77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (550 KB) |  | HTML iconHTML  

    Subtractive clustering based methods have been well known for data clustering problems. However, Due to the computational demands of these approaches, clustering for large scale datasets such as spatiotemporal data and images have been slow to appear. A novel subtractive clustering method based on NystrÖm approximation is proposed. The contribution of proposed is a method that substantially reduces the computational requirements of subtractive clustering based algorithms, making it feasible to use subtractive clustering to large scale subtractive clustering problems. The proposed method is based on the famous NystrÖm method. All potentials of samples could be approximated quickly using only a litter number of samples. The experiment results on color images show efficiency in comparing with conventional subtractive clustering method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global convergence of a modified conjugate gradient method

    Page(s): 78 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (789 KB) |  | HTML iconHTML  

    In this paper, we are concerned with the conjugate gradient methods for solving unconstrained optimization problems. A modified conjugate gradient method is proposed in this paper for unconstrained optimization problems. The direction of the proposed method provides a descent direction for the objective function. Under mild conditions, we prove that the method with strong Wolfe line search is globally convergent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face recognition based on texture features using hybrid projection function

    Page(s): 82 - 85
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (502 KB) |  | HTML iconHTML  

    This paper proposed a new face recognition method based on texture features of gray-level co-occurrence matrix (GLCM). The feature vector is constructed based on GLCM texture features using hybrid projection function in nonsubsampled contourlet transform domain. The experimental results on CMU PIE database demonstrate the efficacy of the new method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active disturbance rejection control algorithm for the unwinding tension system in gravure printing machine

    Page(s): 86 - 91
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1280 KB) |  | HTML iconHTML  

    In high-speed and high-precision printing process, the stability of tension control is essential for printing control system because the fluctuation and variation of tension have an important influence on the precision of the print register. This paper presents a unique decoupling controller based on active disturbance rejection control (ADRC) method in order to strengthen the stability of the tension in unwinding system of gravure printing machines. In this paper, we first construct a nonlinear decoupling model in order to get the order and the static decoupling part of the unwinding system. Secondly, based on the order and the static decoupling part, an ADRC decoupling controller is designed for the unwinding tension system of gravure printing machines. Finally, the results of simulation with ADRC and PID controllers show that the proposed tension controller achieves a good decoupling control for unwinding system and has better robustness against internal and external disturbance than traditional PID controller in tension control of the unwinding system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A doctor recommendation algorithm based on doctor performances and patient preferences

    Page(s): 92 - 95
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (337 KB) |  | HTML iconHTML  

    A doctor recommendation algorithm is proposed based on the doctor performances model and the patient preferences model, which aims at relieving the problem of doctor information overload and “reservation imbalance” of Shanghai Medical League Appointment Platform and helping patients to schedule a medical appointment successfully. The algorithm is designed via adding the characteristic of patient preferences to the framework of the doctor performances model, which is built with the Analytic Hierarchy Process method. At present, the recommendation algorithm has already been successfully applied to the Shanghai Medical League Appointment Platform. The algorithm is evaluated by patients' operation records and reservation records, and results show that the recommendations are reasonable, and can match the patients' reservation demands effectively. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study on MacWilliams identity for m-spotty weight enumerator

    Page(s): 96 - 99
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (424 KB) |  | HTML iconHTML  

    Recently, the m-spotty byte error control codes are applied to computer memory systems. In this paper, we introduce the m-spotty weights and m-spotty weight enumerator of linear codes over the ring Fp + vFp(v2 = v). Moreover, we prove a MacWilliams type identity for m-spotty weight enumerator over the ring Fp + vFp(v2 = v). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mapping the land slope and the land slope grade of the Sichuan Province based on the DEM

    Page(s): 100 - 104
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (427 KB) |  | HTML iconHTML  

    The first land survey of China has been implemented based on the traditional survey methods, and the inaccuracy of area for different land use type is not suitable for the need of land use management until now. In order to supply the spatial pattern and accurate area of the difference land use type, the government carried out the Second land investigation on 2009, and the land slope mapping and the land slope grade map is the basic and key work for the Second land investigation. The present paper develops a calculating model of land slope and computer software to analyze the topography and geomorphology of the Sichuan Province using the topography data. The land slope map and land slope grade map is constructed according to DEM data, and the result have been validated by experiment zone. The result of the land slope map and land grade map for the Sichuan Province shows that the result is credible to the Second National Land Investigation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.