By Topic

2013 Second International Conference on Robot, Vision and Signal Processing

Date 10-12 Dec. 2013

Filter Results

Displaying Results 1 - 25 of 78
  • [Front cover]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1521 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (365 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (86 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2013, Page(s):xii - xv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Sponsors and Co-organizers

    Publication Year: 2013, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (523 KB)
    Freely Available from IEEE
  • Comparison on Different Random Basis Generator of a Single-Pixel Camera

    Publication Year: 2013, Page(s):1 - 4
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Compressive sensing is a signal processing technique that takes advantage of signal sparseness in some domain. To use compressive sensing, a domain in which the signal is represented as a few significant coefficients should be defined. If the proper domain is identified as a set of basis vectors, the coefficients are the projections of the signal on the basis vectors. This is typically a transform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lossless Data Hiding with Genetic-Based Hybrid Prediction

    Publication Year: 2013, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB) | HTML iconHTML

    Lossless data hiding is a newly developed topic in information security researches. With the term of 'lossless', secret information is embedded into original image with methods developed by researchers at the encoder, and marked image is produced. Correspondingly, at the decoder, users are capable of perfectly separating the embedded secret and original image from the marked image, based on the re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Implementation of OBD-II Vehicle Diagnosis System Integrated with Cloud Computation Technology

    Publication Year: 2013, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    This paper implemented a cloud computation based second generation on-board diagnostic (OBD-II) system. The proposed system is integrated with OBD-II, 3.5G wireless network, and cloud computing technologies. It can perform real-time vehicle status surveillance. The monitored features cover engine rpm, vehicle speed, coolant temperature, fault codes, and other vehicle dynamics information. The vehi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prolonging of the Network Lifetime of WSN Using Fuzzy Clustering Topology

    Publication Year: 2013, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Adequate clustering provides an effective way for prolonging the lifetime of a wireless sensor network (WSN). Most proposed clustering algorithms do not consider the location of the base station. This will lead to the hot spots problem in multi-hop WSNs. In this paper, a fuzzy clustering topology is employed to prolong the lifetime of WSNs. Considering the residual energy, the distances to the bas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Collaborative Representation Based Two-Phase Face Recognition Algorithm

    Publication Year: 2013, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    In this paper, a collaborative representation based two-phase face recognition method is proposed. In the first phase, the test sample is represented by a linear combination of all the training samples, and then the sum of contributions of each class is calculated. As a consequently, we use the sum of contributions to determine k classes of training sample that have the maximum sum of contribution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Thresholding-Based Switching Filter for Salt & Pepper Noise Removal

    Publication Year: 2013, Page(s):21 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1297 KB) | HTML iconHTML

    Switching filter is a popular kind of image salt & pepper noise removal techniques in recent years. Unfortunately, noise detection schemes in existing switching filters are usually unsuitable for dealing with those images containing a certain number of noise-free pixels with gray levels 0s or 255s. To alleviate this issue, a new noise detection scheme is proposed, which can be regarded as a ge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Robbery and Violent Scenarios

    Publication Year: 2013, Page(s):25 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (569 KB) | HTML iconHTML

    In this paper, we devise a method to detect robbery and violent scenarios for the goal of improving the security of self-service banks. The method first extracts the motion region from the video and denotes this region with a rectangle. Then, the method calculates the optical flow and energy of the rectangular region. The method takes the length and width of the rectangle, the energy, and the orie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Feature Extraction Algorithm Based on Joint Learning

    Publication Year: 2013, Page(s):31 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB) | HTML iconHTML

    In this paper, a novel feature extraction algorithm, called Joint Discriminant Sparse Neighborhood Preserving Embedding (JDSNPE), based on Discriminant Sparse Neighborhood Preserving Embedding (DSNPE) and joint learning is proposed. JDSNPE aims to get the row sparsity of the transformation matrix while preserving discriminant sparse neighborhood. Experimental results on Yale database demonstrate t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Improved Two-Phase Sparse Representation Method for Traffic Sign Recognition

    Publication Year: 2013, Page(s):35 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    The two-phase test sample sparse representation (TPTSR) is a method that performs very well on face recognition. But with the increasing of training samples, it may cause memory overflow when we do matrix operations. To solve this problem, we propose an improved TPTSR method which is based on local dictionary. In the first stage of TPTSR, we split the redundant dictionary that is combined by all t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic Vehicle Full-View Driver Assistance System in Vehicular Networks

    Publication Year: 2013, Page(s):39 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    The Cooperative Collision Avoidance Warning System (CCAWS) for vehicle safety in vehicular networks has become very important in recent years. However, the advanced positioning methods will affect the accuracy of the CCAWS warning information. Hence, we propose a self-correction of the vehicle-based positioning method in vehicular networks. Moreover, we design a dynamic vehicle full-view driver as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Visual Inspection System for Prescription Drugs in Press through Package

    Publication Year: 2013, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    To inspect prescription drugs with press-through package (PTP), we propose an automated inspection system which based on computer vision. In the proposed system, we capture PTP drugs and apply hierarchical identification consist of several weak classifiers. In this paper, we report several results of inspection experiments which distinguish about a thousand kinds of PTPs. As a result, we have achi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Webcam-Based Accurate Eye-Central Localization

    Publication Year: 2013, Page(s):47 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (679 KB) | HTML iconHTML

    This paper contains experimental procedure of webcam-based eye-tracker specially for low power devices. This paper consists of five processes. First one is background suppression for reducing average processing requirement. Second one is Haar-cascade feature-based face detection algorithm. Third one is geometrically eye-position determination. The fourth part is to detect and track eye-ball center... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compact Multi-dimensional LBP Features for Improved Texture Retrieval

    Publication Year: 2013, Page(s):51 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Content-based image retrieval has become an important research area and consequently well performing retrieval algorithms are highly sought after. Texture features are often crucial for retrieval applications to achieve high precision, while local binary pattern (LBP) based texture descriptors have been shown to work well in this context. LBP features decsribe the texture neighbourhood of a pixel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Face Recognition Performance Using Similarity Feature-Based Selection and Classification Algorithm

    Publication Year: 2013, Page(s):56 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    In this paper, we propose the effective similarity feature-based selection and classification algorithm to select similarity features on the training images and to classify face images in face recognition system. The experiments are conducted on The ORL Database of Faces, which consists of 400 images of 40 individuals. Two face recognition systems, one based on the histogram-based feature, and the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quaternion Neuro-fuzzy Learning Algorithm for Fuzzy Rule Generation

    Publication Year: 2013, Page(s):61 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    In order to generate or tune fuzzy rules, Neuro-Fuzzy learning algorithms with Gaussian type membership functions based on gradient-descent method are well known. In this paper, we propose a new learning approach, the Quaternion Neuro-Fuzzy learning algorithm. This method is an extension of the conventional method to four-dimensional space by using a quaternion neural network that maps quaternion ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human-Robot Interaction System with Quantum-Inspired Bidirectional Associative Memory

    Publication Year: 2013, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (743 KB) | HTML iconHTML

    This paper discussed the Interaction System with Robot Partner using Quantum-Inspired Bi-directional Associative Memory (QBAM). We have been developed QBAM which has the superior Memory Capacity and Recall Reliability compare with conventional models. Due to these advantages, the proposed system can be stored much information and its relationships. Using QBAM, we construct the interaction system t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative Formation of Multi-robot Based on Spring Model

    Publication Year: 2013, Page(s):72 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2800 KB) | HTML iconHTML

    This paper proposes a method of constituting the formation of a multi-robot system for exploration and monitoring. First, we apply a method of multi-objective behavior coordination for integrating behavior outputs from the fuzzy control for collision avoidance and target tracing. Second, we apply a spring model to calculate the temporary target position of each robot for the formation behavior. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.