2009 International Conference on Multimedia Computing and Systems

2-4 April 2009

Filter Results

Displaying Results 1 - 25 of 112
  • Welcome

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (22 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):iv - x
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • Nanotube carbon transistor (CNTFET): I-V and C-V, a qualitative comparison between fettoy simulator and compact model

    Publication Year: 2009, Page(s):236 - 239
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB) | HTML iconHTML

    The carbon nanotube transistor (CNTFET) are currently considered among the most promising component to replace the generation of MOSFET transistor, in order to surpass the short channel effects in the component. For this new generation of transistor (CNTFET) with very short channel, the majority of models describing electric conduction is based on the process of ballistic transport. In this work, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ultra wide bandwidth radio channel indoor propagation and path loss analysis based on measurements

    Publication Year: 2009, Page(s):259 - 263
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1086 KB) | HTML iconHTML

    In this paper, based on a set of UWB Channel measurements some features of channel are investigated. The measurements are provided in frequency domain over a channel bandwidth 6 GHz (from 3 to 9 GHz) in indoor, at Eurecom Institute. A vector network analyzer is used to measure the frequency channel response of the frequency bandwidth of interest. An omni-directional antennas are used for both the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Contourlet feature based kernel relevance weighted discriminant analysis for face recognition

    Publication Year: 2009, Page(s):268 - 272
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1199 KB) | HTML iconHTML

    This paper presents a novel face recognition method based on the contourlet for facial features representation and using an new kernel based algorithm, for discriminating purposes, namely kernel relevance weighted discriminant analysis (KRWDA). This nonlinear reduction dimension algorithm has several interesting characteristics. First, using kernel theory, it handles nonlinearity efficiently. Seco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear discriminant analysis for face recognition

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1761 KB) | HTML iconHTML

    Face is the most common biometric identifier used by humans. During the past thirty years, a number of face recognition techniques have been proposed, all of these methods focus on image-based face recognition that use a still image as input data. In this paper, Linear Discriminant Analysis (LDA) which is also called fisherface is an appearance-based technique used for the dimensionality reduction... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensorless control of Permanent Magnet Synchronous Motor

    Publication Year: 2009, Page(s):341 - 344
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1086 KB) | HTML iconHTML

    Vector control of permanent magnet synchronous machine PMSM is one of the new techniques have been developed in recent years. It's based on the use of measures from the mechanical sensor. In order to reduce the cost and improve the reliability of this variable speed drive, the paper presents a control method without sensor using the estimation of the electromotive force EMF to determine the speed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New scheme of integrating quantum key distribution in 802.11i

    Publication Year: 2009, Page(s):46 - 50
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1118 KB) | HTML iconHTML

    User's mobility is increasing with the height level of mobility that the mobile networks offer. The information transmitted from A to B in a network has to be secured from any eavesdropping, so the main solution used is the cryptography. Nevertheless, the classical cryptography suffers from some limits that make it vulnerable in front of some kind of attacks like "attack by dictionary" or "exhaust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composition of web service based multi-agent

    Publication Year: 2009, Page(s):51 - 55
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1045 KB) | HTML iconHTML

    The paradigm of the composition of Web services to recognize this day considerable interest in Web technology in general and specifically distributed systems and/or distributed applications. The service-oriented architecture (SOA) have profitable B2B solutions, making best use of services already available on the Net. Existing work on the composition of dynamic Web services have shown that the des... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An approach for adapting web services

    Publication Year: 2009, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1047 KB) | HTML iconHTML

    The evolution of Web services becomes necessary because it is inevitable that services will evolve overtime and clients will always ask for new features. Unfortunately the current standards do not support necessary mechanisms to ensure the behaviour evolution of the Web services. This problem becomes more complex for dynamically adaptation and for Web service upgrade by non-backwards-compatible ch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A web-based fault diagnostic maintenance system for steam turbines based on domain ontology and expert system

    Publication Year: 2009, Page(s):62 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1239 KB) | HTML iconHTML

    This paper describes the design of a fault diagnostic maintenance system for steam turbines based on a domain ontology of the turbine and coupled to an expert system. The main data and information constituting the system come from disparate data bases with different usage. In this case a database for equipment characteristics and another containing maintenance acts defining symptoms, defects and r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ENVIS: A visual environment for GIS querying

    Publication Year: 2009, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1177 KB) | HTML iconHTML

    Currently, geographic information systems (GIS) are accessible to a large public, in particular to users who cannot be considered as experts. However, the access to geographic information and its overtaking by various users are not easy. Indeed, between the rigidity of the available access languages and the ignorance of the organization of information within the GIS, the user is often facing infor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new keyword spotting approach

    Publication Year: 2009, Page(s):77 - 80
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (798 KB) | HTML iconHTML

    Keyword spotting is the task of identifying the occurrences of certain desired keywords in an arbitrary speech signal. Keyword spotting has many applications one of them is telephone routing. In particular, we consider a big company which receives thousands of telephone calls daily. We are interested with the classification of these calls to route them to the appropriate department. State-of-the-a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Short-term forecasting of Algerian load using fuzzy logic and expert system

    Publication Year: 2009, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1592 KB) | HTML iconHTML

    The industry of electrical energy in the majority of the developing countries is changing from an operational approach centralized towards a competing approach. The notion of forecasting of electrical energy by only one public services, is replaced by the concept that a competitive market is a mechanism more appropriate to ensure energy the consumers with a high reliability at less cost. Algeria c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two-mass model of the vocal cords: determination of control parameters

    Publication Year: 2009, Page(s):87 - 90
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB) | HTML iconHTML

    We present numerical simulations performed with a two-mass model of the vocal folds. We use the model to compute the fundamental frequency as a function of two control parameters: subglottal pressure and vocal cords tension. Our results contribute to a better characterization of a now classic vocal-fold model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model of man-machine dialogue realized around an application

    Publication Year: 2009, Page(s):91 - 95
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (955 KB) | HTML iconHTML

    The paper presents a modelling of the human machine dialogue in dual language (French and Arabic). According to the principle of our model the production of a speech result from an exchange between the human and the machine, that depends on the interlocutor's mental condition. It presents itself under the set of fundamental units of the memory (FUM). The hierarchical organization of these units pe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Priority transmission of SIP signaling flows over IP network

    Publication Year: 2009, Page(s):96 - 101
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (429 KB) | HTML iconHTML

    Signaling flow transmission is of the most importance in the discussion of the Quality of Service (QoS) problem of the Next Generation Network (NGN). For implementing service reachability, the signaling flow of the NGN services should be transmitted reliably and with the highest priority. Because the signaling flows and the media flows of the NGN service are mixed while being transmitted, the pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Level-converter aware supply voltage scaling for reducing dynamic power dissipation in clocked sequential designs

    Publication Year: 2009, Page(s):102 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (181 KB) | HTML iconHTML

    In this paper, we propose a mixed integer linear program (MILP) to solve the problem of optimal unification of low-supply-voltage assignment and retiming to reduce dynamic power dissipation under timing constrains for the case of clocked sequential digital designs. We address this problem at the system level where computational elements are multipliers and adders for instance. Assuming flip-flops ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition and re-synthesis of 3D human motion with personalized variations

    Publication Year: 2009, Page(s):106 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1347 KB) | HTML iconHTML

    This paper proposes a 3D view-invariant human action recognition method based on Hidden Markov Models. The natures of the actions, as well as the characteristics of the actors and different performance styles have been successfully recognized. The results have been compared to nearest neighbor and similarity search based recognition for further evaluation. Also the research addresses the problem o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient stream memory architecture for heterogeneous multicore processor

    Publication Year: 2009, Page(s):112 - 117
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1274 KB) | HTML iconHTML

    Heterogeneous multicore processor can integrate merits of different architecture, so it can achieve peak performance as high as processors with special architecture, while keeping as flexible as traditional general purpose processors at the same time. It is a challenge to design a memory sub-system for FT64-3, which is a heterogeneous multicore processor with 18 float function units. In this paper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel color feature representation and matching technique for content-based image retrieval

    Publication Year: 2009, Page(s):118 - 122
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1606 KB) | HTML iconHTML

    Color features of an image are the most widely used features in content-based image retrieval (CBIR) systems. Specifically histogram-based algorithms are considered to be effective for color image indexing. Color histogram describes the global distribution of pixels of an image which is insensitive to variations in scale and easy to calculate. However, the high dimensionality of feature vectors re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biometric Watermarking based on affine parameters estimation

    Publication Year: 2009, Page(s):123 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB) | HTML iconHTML

    In this paper, the architect of biometric watermarking is researched. A feature embedding watermarking (FEW) system is resented firstly. A robust biometric watermarking method for iris image based on affine parameters estimation (APE) is presented. The determination of the general affine transform applied to an iris image relies on the determination of the regular grid of points for estimation of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved error concealment scheme for entire frame loss of H.264/AVC

    Publication Year: 2009, Page(s):129 - 132
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    In this paper, we develop an improved error concealment scheme for entire frame loss of H.264/AVC by using variable-size block motion vector extrapolation. At first, the proposed algorithm extrapolates MVs from available neighboring frames onto the lost frame and determines the MV of each 8times8 block, for those blocks with dissimilar candidate MVs, they are divided into four sub-blocks and an re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.