default search action
10. IIH-MSP 2014: Kitakyushu, Japan
- Junzo Watada, Akinori Ito, Jeng-Shyang Pan, Han-Chieh Chao, Chien-Ming Chen:
2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, Kitakyushu, Japan, August 27-29, 2014. IEEE 2014, ISBN 978-1-4799-5390-5
Session 1: Cross-Discipline Techniques in Signal Processing and Networking
- Yuh-Yih Lu, Jun-Yi Guo, Hsiang-Cheh Huang:
Design of Triple Symmetric Arms Dipole Antenna for 900/1800/2450 MHz Applications. 1-4 - Hsiang-Cheh Huang, Ting-Hsuan Wang, Feng-Cheng Chang:
Error-Control for Compressed Sensing of Images with Multi-channel Transmission. 5-8 - Liou Chu, Fu-Yi Hung, Yen-Cheng Lu:
Analysis and Simulation of Theme Park Queuing System. 9-12 - Hsiang-Cheh Huang, Chuan-Chang Lin, Yuh-Yih Lu, Yueh-Hong Chen:
Enhanced Difference Alteration with Weighted Averages for Reversible Data Hiding. 13-16 - Feng-Cheng Chang, Hsiang-Cheh Huang:
Discussions on Implementing Iterative Hard Thresholding Algorithm. 17-20 - Yueh-Hong Chen, Hsiang-Cheh Huang:
Reversible Image Watermarking Based on Genetic Algorithm. 21-24
Session 2: Ergonomic Information and Control Systems
- Bor-Shing Lin, I-Jung Lee, Pei-Chi Hsiao, Shu-Yu Yang, Willy Chou:
Data Glove Embedded with 6-DOF Inertial Sensors for Hand Rehabilitation. 25-28 - Yung Tsung Cheng, Jiun-Hung Lin, Cheng-Chi Tai:
A Prototype Design of a Continuous and Real-Time Wireless Urine Monitoring System. 29-32 - Chuan Lung Lin, Tso-Yao Chu, Pei-Jung Wu, Chen-An Wang, Bor-Shyh Lin:
Design of Wearable Brain Computer Interface Based on Motor Imagery. 33-36 - Chih-Jen Cheng, Chien-Zhi Ou, Zu-Po Yang, Bor-Shyh Lin:
Wireless Surface Electromyography Monitoring System for Dysphagia Evaluation. 37-40
Session 3: IPv6 Applications and Services
- Shian-Shyong Tseng, Ching-Heng Ku, Ai-Chin Lu, Jun Ming Su, Geng-Da Tsai:
Building an IPv6 Virtual Lab with the Multi-level Training Mechanism. 41-44 - N. Chuangchunsong, Sinchai Kamolphiwong, Thossaporn Kamolphiwong, Robert Elz:
An Enhancement of IPv4-in-IPv6 Mechanism. 45-48 - Gu Hsin Lai:
A Light-Weight Penetration Test Tool for IPv6 Threats. 49-52 - Tseng-Yi Chen, Fan-Hsun Tseng, Nen-Fu Huang, Wei-Kuan Shih, Han-Chieh Chao, Li-Der Chou:
The Implementation of IPv6-Enabled Locators for Location-Based Smart Marketing Service. 53-56 - Wen Yen Lin, Kuang-Po Hsueh, Wang-Hsin Hsu, Liew Gha Yie, Wei Chen Tai:
Design and Implementation of Health Monitoring System for Solar Panel in IPv6 Network. 57-60 - Shian-Shyong Tseng, Jui-Feng Weng, Li-Ling Hu, Hsu Nai Wen:
Ontology-Based Anti-threat Decision Support System for IPV4/IPV6. 61-64
Session 4: Multimedia Services and Security
- Ching-Yu Yang, Wen-Fong Wang:
Robust Color Image Watermarking Approach Based on Shape-Specific Points. 65-68 - Yung-Chen Chou, Guo-Hao Huang, Huang Ching Lee, Ke Jhen Lin:
A Reversible Data Hiding Method Using Inverse S-Scan Order and Histogram Shifting. 69-72 - Hung-Yu Lin, Jiung Long Huang:
A Web API Aggregation Service for Mobile Mashup Applications. 73-76 - Chih-Lin Hu, Cheng Lun Lin, Hung-Tsung Huang, Yi-Yu Su, Pin-Chuan Liu:
Ubiquitous Multimedia Services in Home-Based Context-Aware Environments. 77-80 - Shin-Chi Lai, Chih-Hao Liu, Ling-Yi Wang, Sheau-Fang Lei:
14-ms-Group-Delay and Low-Complexity Algorithm Design of 18-Band Quasi-ANSI S1.11 1/3 Octave Filter Bank for Digital Hearing Aids. 81-84 - An-Kai Li, Shin-Chi Lai, Wen-Kai Tsai, Sheau-Fang Lei:
Low-Complexity Algorithm of Recursive Analysis and Synthesis Quadrature Mirror Filterbanks for Digital Radio Mondiale. 85-88 - Ching-Chun Chang, Yanjun Liu, Thai-Son Nguyen:
A Novel Turtle Shell Based Scheme for Data Hiding. 89-93
Session 5: Intelligent and Multimedia Computing for Real-Life Applications
- Ya-Fen Chang, Wei-Liang Tai, Wei-Na Wu, Wei-Han Li, Yung-Chi Chen:
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. 94-97 - Jen-Ho Yang, Pei-Yu Lin:
An ID-Based User Authentication Scheme for Cloud Computing. 98-101 - Ping Nan Chiang, Kevin M. Taaffe:
Analysis of Passenger Flow in Airport Terminal. 102-105 - Wen Chuan Wu:
A QR Code-Based on-Street Parking Fee Payment Mechanism. 106-109 - Chi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin:
An Image Hiding Method by Applying Tree Structure on Linking Pixels. 110-113 - Chia-Chen Lin, Xiao-Long Liu, Jianjie Zhou, Shyan-Ming Yuan:
An Optimal Modification BTC Scheme Based on Binary Search Tree. 114-117 - Ching-Hu Lu, Yi-Ting Chiang:
An Instantiation of the Multiple-Transfer Framework to Reduce Efforts in Context Model Learning for New Users in Smart Homes. 118-121
Session 6: Security and Privacy in Computer Forensics Applications
- Yung-Chen Chou, Hsin-Chi Liao:
A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting. 122-125 - Tzu-Chuen Lu, Chun-Ya Tseng, Chang-Mu Chen, Hui-Shih Leng, Ying-Hsuan Huang:
An Efficient and Simplified Data Hiding Technique Based on 2's Complement. 126-129 - Shanshan Yang, Chuan Qin, Zhenxing Qian, Boqing Xu:
Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism. 130-133 - Chia-Chen Lin, Yuehong Huang, Wei-Liang Tai:
Novel Image Authentication Scheme for AMBTC-Compressed Images. 134-137 - Yung-Chen Chou, Huang Ching Lee, Yong Jin Yu:
A Novel Reversible Data Hiding Scheme Using Ripple Strategy and Histogram Shifting. 138-141 - Tzu-Chuen Lu, Chun-Ya Tseng, Hui-Shih Leng, Chun-Chih Huang:
Data Hiding Scheme Based on Edge Detection and Triangular Mirroring. 142-145 - Li-Ling Hung, Yu-Wei Huang, Sheng-Han Wu:
Transmissions for Delay-Guaranteed Information Using Smart Antenna Systems. 146-149
Session 7: Information Applications
- Wenfa Qi, Yuxin Liu, Wei Guo:
An Automatic Chinese Font Library Generation Method by Modifying Vector Contour Curves. 150-154 - Gwo-Jiun Horng:
The Adaptive Recommendation Segment Mechanism to Reduce Traffic Congestion in Smart City. 155-158 - Jakub Peksinski, Grzegorz Mikolajczak, Janusz Pawel Kowalski:
Elimination of Matching Digital Images to Identify Objective Measures of Quality. 159-162 - Ram Pal Singh, Neelam Dabas, Anurag Mishra, Vikash Chaudhary:
On Extreme Learning Machine for Watermarking of an Images in Discrete Wavelet Transform Domain. 163-166 - Soryoung Kim, Sang-Min Choi, Yo-Sub Han, Ka Lok Man, Kaiyu Wan:
Analyzing Item Features for Cold-Start Problems in Recommendation Systems. 167-170 - Chung Heng Chuang, Tsung-Hsing Lin, Liang-Bi Chen, Tung-Lin Lee, Chaio Hsuan Chuang, Katherine Shu-Min Li, Chih-Lin Hung, Chao-Wen Wu:
A Hybrid Multi-functions Digital Public Address System with Earthquake Early Warning. 171-174 - Viktor Monarev, Andrey Pestunov:
A Known-Key Scenario for Steganalysis and a Highly Accurate Detector within It. 175-178 - Yung-Hoh Sheu, Zuo Wen Wang, Yao Jhong Liou:
The K-Means Clustering Methods Applied in the Message Scheduling Methods of Flexray Communication Network Based on the Embedded Flexray Node. 179-182
Session 8: Multimedia Signal Processing and Network Technology I
- Zhonghua Sun, Kebin Jia:
Semantic Vocabulary Cognition Model for the Improvement of Automatic Image Annotation. 183-186 - Yuan Gao, Pengyu Liu, Kebin Jia:
Optimization for I-Frame Based on Residual Image. 187-190 - Zihan Pang, Kebin Jia, Jinchao Feng:
A Water Environment Security Monitoring Algorithm Based on Intelligent Video Surveillance. 191-194 - Qiang Wu, Jie Wei, Xuwen Li:
Research Progress of Obstacle Detection Based on Monocular Vision. 195-198 - Qiang Wu, Xiangnan Zhao, Xuwen Li:
Stereo Matching Algorithm of Color Image Based on Weber's Law and Census. 199-202 - Yuxin Song, Kebin Jia:
Modification of Disparity Vector Derivation from Neighbouring Blocks in 3D-HEVC. 203-206 - Liya Zhao, Kebin Jia:
The PCA-Demons Algorithm for Medical Image Registration. 207-210 - Yue Cheng, Bin Jiang, Kebin Jia:
A Deep Structure for Facial Expression Recognition under Partial Occlusion. 211-214
Session 9: Multimedia Signal Processing and Network Technology II
- Xianhua Song, Shen Wang, Jianzhi Sang, Xuehu Yan, Xiamu Niu:
Flexible Quantum Image Secret Sharing Based on Measurement and Strip. 215-218 - Qiong Li, Zhibin Lin, Dan Le, Hucheng Liu:
An FPGA-Based Design of Efficient QKD Sifting Module. 219-222 - Xuehu Yan, Shen Wang, Xiamu Niu:
Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing. 223-226 - Qiong Li, Siyou Ma, Haokun Mao, Lin Meng:
An FPGA-Based Communication Scheme of Classical Channel in High-Speed QKD System. 227-230 - Shu Geng, Liu Lv, Rongjun Liu:
Spam Detection Approach Based on C-Support Vector Machine and Kernel Principal-Component Analysis. 231-234 - Xiamu Niu, Yongting Wang, Di Wu:
A Method to Generate Random Number for Cryptographic Application. 235-238 - Jialiang Peng, Qiong Li, Xiamu Niu:
A Novel Finger Vein Image Quality Evaluation Method Based on Triangular Norm. 239-242 - Zhenjia Dou, Kexin Ren, Qi Han, Xiamu Niu:
A Novel Real-Time Aeromagnetic Compensation Method Based on RLSQ. 243-246 - Chen Cui, Shen Wang, Xiamu Niu:
Perceptual Image Hashing for DIBR 3D Images Based on Ring Partition and SIFT Feature Points. 247-250
Session 10: Recent Advances in Information Hiding and Enrichment Technologies for Audio and Speech Signals
- Kazuhiro Kondo, Hiroki Sakurai:
Gender-Dependent Babble Maskers Created from Multi-speaker Speech for Speech Privacy Protection. 251-254 - Akira Nishimura:
Encoding Data by Frequency Modulation of a High-Low Siren Emitted by an Emergency Vehicle. 255-259 - Nobutaka Ono:
Robust Audio Information Hiding Based on Stereo Phase Difference in Time-Frequency Domain. 260-263 - Minoru Kohata:
Secure Speech Encryption System Using Segments for Speech Synthesis. 264-267 - Harumi Murata, Akio Ogihara:
An Audio Watermarking Method Using Pitch-Transformed Sound of Original Music. 268-271 - Shengbei Wang, Masashi Unoki:
Hybrid Speech Watermarking Based on Formant Enhancement and Cochlear Delay. 272-275 - Xinlu Gui, Siren Cai, Xiaolong Li, Bin Yang:
A Novel Reversible Data Hiding Scheme Based on Reference Pixels and Adaptive Block Selection. 276-280
Session 11: Intelligent Video Processing
- Chao-Ho Chen, Tsong-Yi Chen, Yu-Chun Lin, Wu-Chih Hu:
Moving-Object Intrusion Detection Based on Retinex-Enhanced Method. 281-284 - Tsong-Yi Chen, Chao-Ho Chen, Tzu Feng Tseng, Guan-Ming Luo, Wu-Chih Hu:
HDR Enhancement Based on Bi-curve Mapping for Image Sequences. 285-288 - Bing-Hong Liu, Ngoc-Tu Nguyen, Van-Trung Pham:
An Efficient Method for Sweep Coverage with Minimum Mobile Sensor. 289-292 - Yan-Haw Chen, Ching-Fu Huang, Shao-I Chu:
A Fast Method for Decoding Reed-Solomon Codes on Processors. 293-296 - Sinnu Susan Thomas, Sumana Gupta, K. S. Venkatesh:
An Energy Minimization Approach for Automatic Video Shot and Scene Boundary Detection. 297-300 - Ching-Hao Lai, Jun-Dong Chang, Ji Wei Lu, Fay Huang:
A Dynamic Street View System Using Video Event Data Recorder. 301-304
Session 12: System-on-Chip for Signal Processing
- Yeu-Horng Shiau, Cheng-Han Li, Zhi-hao Wang, Yi Tai Guo:
Hardware and Software Co-design of the Moving Object Tracking System. 305-308 - Shin-Chi Lai, Wen Chih Li, Sin He You, Da Wei Jhuang, Shih Ting Gao:
Low-Cost and Low-Complexity Electrocardiogram Signal Recorder Design Based on Arduino Platform. 309-312 - Shin-Chi Lai, Hsu Cheng Lai, Feng Chung Hong, Huan Ru Lin, Sheau-Fang Lei:
A Novel Coherence-Function-Based Noise Suppression Algorithm by Applying Sound-Source Localization and Awareness-Computation Strategy for Dual Microphones. 313-316 - Chi-Chia Sun, Cheng Chih Wang, Ming-Hwa Sheu:
Ultra Low Power Circuit Design Based on Adiabatic Logic. 317-320 - Shih-Chang Hsia, Cheng-Nan Ho, Chien-Hung Liu:
Real-Time Text Detection Using PAC/DUE Embedded System. 321-324 - Yin-Tsung Hwang, Bing Cheng Tsai, Yu-Ting Pai, Ming-Hwa Sheu:
Feature Points Based Video Object Tracking for Dynamic Scenes and Its FPGA System Prototyping. 325-328 - Wen-Kai Tsai, Chang Jie Lai, Ming-Hwa Sheu, Tsu Hsiung Chen:
High Dynamic Range Image Based on Block-Based Edge Strength for Embedded System Design. 329-332
Session 13: Video Information Processing and Pattern Recognition
- Hainan Zhao, Xuan Wang:
Robust Object Tracking Using Adaptive Multi-Features Fusion Based on Local Kernel Learning. 333-336 - Shixi Fan, Yongshuai Hou, Lidan Chen:
Dependency Parsing with Structure Knowledge. 337-340 - Shu Wang:
Semi-supervised Marginal Fisher Analysis. 341-344 - Xiang Jun Huang, Qing Hua Zheng, Chao Zhang:
Extracting Learning Features of Knowledge Unit in Knowledge Map. 345-348 - Fei Yang, Weigang Lu, Lei Zhang, Kuanquan Wang, Yemin Li:
Visualization for Non-linear Enhanced Volume Data. 349-352 - Cheng-Chang Lien, Wen Kai Yu, Chang-Hsing Lee, Chin-Chuan Han:
Night Video Surveillance Based on the Second-Order Statistics Features. 353-356 - Fu-Hao Yeh, Greg C. Lee, Ying-Ju Chen, Chien-Hsing Liao:
Robust Handwriting Extraction and Lecture Video Summarization. 357-360 - Yu-Hsi Chen, Hsueh-Yi Sean Lin, Chih-Wen Su:
Full-Frame Video Stabilization via SIFT Feature Matching. 361-364
Session 14: Intelligent Multimedia Tools and Applications
- Jen-Perng Yu, Jyh Jong Lin, Mei-Chen Chu, Yuh Hwa Pai:
Bezier Curve-Based Tour Generator for Navigation in Google Earth-Based Virtual Campus. 365-368 - Hui-Hui Chen, Hung Sheng Lai, Bor-Jiunn Hwang, Chiao-Wen Kao, Shih-Yu Huang:
Eye Tracking for Analyzing Applied Effects on Instructional Graphics Directing Visual Attention. 369-372 - Shyi-Huey Wu, Bor-Jiunn Hwang, Ya Ping Fan, Ching-Hui Chen:
Applying Media Richness Theory to Essay Writing Instruction - A Case of an Elementary School. 373-376 - Yih-Shyh Chiou, Fuan Tsai, Sheng-Cheng Yeh:
A Dead-Reckoning Positioning Scheme Using Inertial Sensing for Location Estimation. 377-380 - Shang-Kuan Chen, Ran-Zan Wang, Wen Pinn Fang:
High-Payload Lossless Data Hiding Scheme with Block Statistics Characteristics. 381-384 - Wen Pinn Fang, Ran-Zan Wang, Tzu Hsuan Liao, Shang-Kuan Chen, Yeuan-Kuen Lee:
Data Transmission System for Mobile Device by Audio Hiding Approach. 385-387 - Wen Pinn Fang, Ming-Hao Liu, Yeuan-Kuen Lee, Rei-Heng Cheng:
Video Resizing for Mobile Device. 388-391 - Wen-Pinn Fang, Chun Li, Tsu-Hsun Fu:
Real-Time Broadcast System for Android System. 392-394 - Chii-Jen Chen, You-Wei Wang, Wen-Pinn Fang:
A Study on Captcha Recognition. 395-398
Session 15: Advanced Multimedia Processing and Retrievals
- Fang-Hsuan Cheng, Moo Di Loo:
An Image Inpainting Method for Stereoscopic Images Based on Filling Route. 399-402 - Yasuhiro Takatsuka, Hirofumi Yabu, Kayo Yoshimoto, Hideya Takahashi:
Retinal Projection Display Using Diffractive Optical Element. 403-406 - Hodaka Yamada, Hirofumi Yabu, Kayo Yoshimoto, Hideya Takahashi:
Three-Dimensional Light Field Display with Overlaid Projection. 407-410 - Atsushi Ueno, Natsuki Kajihara, Natsuko Fujii, Tomohito Takubo:
Vision-Based Path Learning for Home Robots. 411-414 - Pyke Tin, Takashi Toriu, Thi Thi Zin, Hiromitsu Hama:
A Cluster Based Ranking Framework for Multi-typed Information Networks. 415-418 - Thi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama:
A New Background Subtraction Method Using Bivariate Poisson Process. 419-422 - Liang-Hua Chen, Pei Chieh Lee, Li-Yun Wang, Hong-Yuan Mark Liao:
Integration of Multiple Shape Features for Human Detection in Videos. 423-426 - Xi Quan Yang, Dian Yang, Ming Yuan, Xing Hua Lv:
Scientific Literature Retrieval Model Based on Weighted Term Frequency. 427-430
Session 16: Intelligent Image and Signal Processing
- Shih-Yen Huang, You-Jyun Syu:
Based on the Texture Analysis to Inspect the Tread Worn Status on the Tire. 431-434 - Hui-Yu Huang, Wei-Chang Tsai:
Blurred Image Restoration Using Fast Blur-Kernel Estimation. 435-438 - Wen-Yuan Chen, Shih Sung Cheng, Ching-Te Wang, Chin-Fu Tsai, Chiou-Kou Tung:
The Cleaning Machine Path Design Using Image Recognition Techniques. 439-442 - Ruey-Maw Chen, Hua Tsun Huang:
Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. 443-446 - Chen-Chung Liu, Shao Wei Chu, Yung-Kuan Chan, Shyr-Shen Yu:
A Modified K-Means Algorithm - Two-Layer K-Means Algorithm. 447-450 - Chuin-Mu Wang, Jian De Hong, Geng-Cheng Lin, Jing Yuan Su, Zhe Fu Lin:
License Plate Location System Using Smart-Phone with G-Sensor. 451-454
Session 17: Multimedia Security and Privacy
- Toshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
A New Approach to Reversible Watermarking. 455-458 - Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:
A Zero-Watermarking-Like Steganography and Potential Applications. 459-462 - Kento Kobayashi, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:
Surveillance Camera System to Achieve Privacy Protection and Crime Prevention. 463-466 - Hyunho Kang, Keiichi Iwamura:
Image Protection System with Steganography and Authentication. 467-470 - Shimon Machida, Tomoko Kajiyama, Shigeru Shimada, Isao Echizen:
Analysis of Facebook Friends Using Disclosure Level. 471-474 - Xinlu Gui, Xiaolong Li, Bin Yang:
Steganalysis of LSB Matching Based on Local Binary Patterns. 475-480 - Xiaocheng Hu, Weiming Zhang, Nenghai Yu:
Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding. 481-484 - Chin-Chen Chang, Chin-Yu Sun:
Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique. 485-488 - Chin-Chen Chang, Hsiao-Ling Wu, Ting-Feng Chung:
Applying Histogram Modification to Embed Secret Message in AMBTC. 489-492
Session 18: Recent Advances in Robust Information Hiding against Print-Scan Process
- Takayuki Ishihara, Michiharu Niimi:
Compatible 2D-Code Having Tamper Detection System with QR-Code. 493-496 - Kitahiro Kaneda, Hiroyasu Kitazawa, Keiichi Iwamura, Isao Echizen:
A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code. 497-501 - Kitahiro Kaneda, Tomoki Inui, Keiichi Iwamura, Isao Echizen:
Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera. 502-506 - Kitahiro Kaneda, Kenta Kawabata, Keiichi Iwamura, Isao Echizen:
Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns. 507-511 - Chin-Chen Chang, Hsiao-Ling Wu:
A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction. 512-515 - Wannida Sae-Tang, Masaaki Fujiyoshi, Hitoshi Kiya:
Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding. 516-519 - Thach V. Bui, Nguyen K. Vu, Thong T. P. Nguyen, Isao Echizen, Thuc Dinh Nguyen:
Robust Message Hiding for QR Code. 520-523
Session 19: Network Testbed and Industrial Control System Security
- Haihui Gao, Zhonghua Dai, Yong Peng, Huikang Lu:
Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering. 524-527 - Yi Gong, Yong Fang, Liang Liu, Juan Li:
Multi-agent Intrusion Detection System Using Feature Selection Approach. 528-531 - Zhonghua Dai, Haihui Gao, Yong Peng, Huikang Lu:
A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network. 532-536 - Haihui Gao, Yong Peng, Zhonghua Dai, Hanjing Li:
Techniques and Research Trends of Network Testbed. 537-541 - Andrey Pestunov:
Formalization and Systematization of Differential Cryptanalysis Notions. 542-545 - Ming-Hwa Cheng, Rui Juan Deng, Wen-Shyang Hwang, Yan-Jing Wu:
An AODV-Based Backup Routing Mechanism for Time-Critical in Wireless Mesh Networks. 546-549
Session 20: Signal Processing Methods for Music Information Retrieval in the Future Internet
- Masashi Ito, Tomohiro Ashina, Yujiro Saegusa:
A Singing Voice Synthesizer Controlled by Arm Motions Using Compressed Phoneme Determination Algorithm. 550-553 - Kazumichi Yoshida, Takashi Nose, Akinori Ito:
Analysis of English Pronunciation of Singing Voices Sung by Japanese Speakers. 554-557 - Akinori Ito:
Assessing the Intended Enthusiasm of Singing Voice Using Energy Variance. 558-561 - Dooyong Sung, Kyogu Lee:
Transcribing Frequency Modulated Musical Expressions from Polyphonic Music Using HMM Constrained Shift Invariant PLCA. 562-565 - Seokjin Lee:
On-Line Nonnegative Matrix Factorization for Music Signal Separation. 566-569 - Liming Song, Ming Li, Yonghong Yan:
Melody Extraction for Vocal Polyphonic Music Based on Bayesian Framework. 570-573
Session 21: Technologies for Speech Communication in the Future Internet
- Masato Akagi, Xiao Han, Reda Elbarougy, Yasuhiro Hamada, Junfeng Li:
Emotional Speech Recognition and Synthesis in Multiple Languages toward Affective Speech-to-Speech Translation System. 574-577 - Takashi Nose, Takao Kobayashi:
Quantized F0 Context and Its Applications to Speech Synthesis, Speech Coding, and Voice Conversion. 578-581 - Inyoung Hwang, Joon-Hyuk Chang:
Voice Activity Detection Based on Statistical Model Employing Deep Neural Network. 582-585 - Doo Hwa Hong, Shin Jae Kang, Joun Yeop Lee, Nam Soo Kim:
Speaker Adaptation Using Nonlinear Regression Techniques for HMM-Based Speech Synthesis. 586-589 - Mengzhe Chen, Qingqing Zhang, Jielin Pan, Yonghong Yan:
Boosted Hybrid DNN/HMM System Based on Correlation-Generated Targets. 590-593 - Xuyang Wang, Ta Li, Pengyuan Zhang, Jielin Pan, Yonghong Yan:
Enhanced Out of Vocabulary Word Detection Using Local Acoustic Information. 594-597
Session 22: 3D Spatial Audio Technologies in the Future Internet
- Yukio Iwaya, Makoto Otani, Takao Tsuchiya, Junfeng Li:
Virtual Auditory Display by Remote Rendering via Computer Network. 598-601 - Daisuke Morikawa:
Effect of Interaural Difference for Localization of Spatially Segregated Sound. 602-605 - Shuichi Sakamoto, Yoshiki Satou, Jorge Treviño, Yôiti Suzuki:
Representation of Individual HRTFs Using Weighting Coefficients of SENZI. 606-609 - Chan Jun Chun, Seok Hee Jeong, Jong Won Shin, Hong Kook Kim, Jin Ah Kang:
Feasibility Study for Objective Measurement on Sound Localization Using Auditory Evoked Potential. 610-613 - Kyoungsoo Park, Jeong-Hun Seo, Jeunghun Kim, Cheon Sung Jun:
Auralization of Musical Instruments in Virtual Halls Considering Source Directivity. 614-617 - Xing Yang, Risheng Xia, Zhonghua Fu, Junfeng Li, Yonghong Yan, Shuichi Sakamoto, Yôiti Suzuki:
On the Performance and Robustness of Crosstalk Cancelation with Multiple Loudspeakers. 618-621 - Guoliang Lu, Yiqi Zhou, Xueyong Li:
Recognizing Actions with Multi-view 2D Observations Recovered from Depth Maps. 622-625
Session 23: New Advances on Multimedia Security and Forensics
- Lu Liu, Rongrong Ni, Yao Zhao, Siran Li:
Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and CFA Features. 626-629 - Zi Wang, Ju Liu, Wenbo Wan, Jiande Sun, Jun Bo, Yongkang Liu:
Security Monitoring by Watermarking and Hashing for Multimedia Service on Internet Platform. 630-633 - Chien-Ming Chen, Jeng-Shyang Pan, Raylin Tso, Szu-Wei Huang, Mu-En Wu:
Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID. 634-637 - Yan-Li Huang, Hao Liang Cui, Shao-Zhang Niu:
Regular Clipping Detection of Image Based on SIFT. 638-641 - Chin-Chen Chang, Wei-yi Chen, Ting-Fang Cheng:
A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. 642-645
Session 24: Wireless Network
- Tsung-Yuan Wu, Wei-Tsong Lee:
The Research and Analysis for Rear View Transmission Based on IEEE 802.11 Wireless Network. 646-649 - Yu-Chang Lin, Wei-Tsong Lee, Jing Yue Qiu:
Reducing the Power Consumption of Servers with Bandwidth Consideration. 650-653 - Chen Wei Chang, Wei-Tsong Lee, Hsin-Wen Wei:
FHR-SCTP: The Research of a Quality Aware SCTP Congestion Control Mechanism to Improve Handover Efficiency. 654-657 - Kai Po Chuang, Wei Tsong Lee, Hsin Wen Wei:
Dynamically Adjust Packet Size and Block Size to Achieve Maximum Effectiveness of Forward Error Correction. 658-661 - Yu Jen Pan:
The Study of Mobile E-Portfolio Architecture. 662-665 - Rung-Shiang Cheng, Chia Peng Lin, Jiun Yu Jhou:
A Location-Aware Home Appliance Control System. 666-669
Session 25: Wireless Network Algorithm and Theory I
- Shih-Chang Huang, Hong-Yi Chang:
A Density-Aware Location-Aided Routing Protocol for Wireless Ad-Hoc Networks. 670-673 - Hong-Yi Chang, Shih-Chang Huang, Chih-Chun Lai, Zih Huan Hong:
A Novel Recommendation Scheme for Increasing Connectivity in ZigBee Wireless Sensor Networks. 674-677 - Chun-Yi Wu, Chang Wu Yu:
Computing the Probability of Specific Random Sector Graphs with Applications in Wireless Networks with Directional Antennas. 678-681 - Hong-Yi Chang, Yu-Huei Huang, Tu-Liang Lin:
A Novel Relay Placement Algorithm Based on Puzzle Games for Indoor Wireless Sensor Networks. 682-685 - Hong-Yi Chang, Hao-Wen Lin, Zih Huan Hong, Tu-Liang Lin:
A Novel Algorithm for Searching Parking Space in Vehicle Ad Hoc Networks. 686-689 - Tu-Liang Lin, Yu Sheng Chen, Hong-Yi Chang:
Performance Evaluations of an Ant Colony Optimization Routing Algorithm for Wireless Sensor Networks. 690-693
Session 26: Cloud Computing
- Jing Yue Qiu, Hsin-Wen Wei, Wei-Tsong Lee, Yu-Chang Lin:
Adaptive Job Assign Algorithm Based on Hierarchical Server Cloud Computing. 694-697 - Heng Yao Chang, Wei-Tsong Lee, Hsin-Wen Wei:
A Novel Protocol UDCP for Improving Fairness and Maintaining the High-Speed Rate of UDP. 698-701 - Wei Jyun Wong, Wei-Tsong Lee, Hsin-Wen Wei:
Base on Game Theory Model to Improve Trust Access Control in Cloud File-Sharing System. 702-705 - Yongjun Ren, Yaping Chen, Jin Wang, Liming Fang:
Leakage Resilient Provable Data Possession in Public Cloud Storage. 706-709 - Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang:
Attributed Based Provable Data Possession in Public Cloud Storage. 710-713 - (Withdrawn) Data Access Control for Multi-authority Cloud Storage Systems. 714-717
Session 27: Wireless Network Algorithm and Theory II
- Chiu-Kuo Liang, Cheng Yen Chung, Chuan-Feng Li:
A Virtual Force Based Movement Scheme for Area Coverage in Directional Sensor Networks. 718-722 - Li-Hsing Yen, Zong-Long Chen:
Self-Stabilizing Distributed Formation of Minimal k-Dominating Sets in Mobile Ad Hoc Networks. 723-728 - Min-Shu Hung, Jen-Yi Pan, Zheng-En Huang:
Analysis of Handover Decision with Adaptive Offset in Next-Generation Hybrid Macro/Femto-cell Networks. 729-734 - Rei-Heng Cheng, Chiming Huang, Wen Pinn Fang, Shang-Kuan Chen, Ran-Zan Wang:
Energy Consumption Analysis for Sensors in Multi-sink Wireless Sensor Networks. 735-738 - Ming-Che Chen, Hui-Tang Lin:
End-to-End Delay Performance Analysis of Anypath Routing over Wireless Mesh Networks. 739-743
Session 28: Internet I
- Ming-Fong Tsai, Chih-Han Chang:
A Reducing Broadcast Message Method in Vehicular Networks. 744-747 - Hwai-Tsu Hu, Szu-Hong Chen, Ling-Yuan Hsu:
Incorporation of Perceptually Energy-Compensated QIM into DWT-DCT Based Blind Audio Watermarking. 748-752 - Xukai Wang, Yan Sun, Hong Luo:
Service Conflict Detection and Avoidance Based on Scene with Urgency Degree. 753-756 - Yanchen Ren, Hong Luo, Liang Liu:
A Dimension Model for Conflict-Free Service Management in Smart Environment Control System. 757-761 - Qiuxia Song, Jin Liu, Xiaofeng Wang, Jin Wang:
A Novel Automatic Ontology Construction Method Based on Web Data. 762-765 - Bo Shen, Ningwei Wang, Huihuai Qiu:
A New Genetic Algorithm for Overlapping Community Detection. 766-769
Session 29: Security
- Xinwei Liu, Yan Sun, Jie Liu:
Security Analysis for UHF RFID Tags. 770-774 - Yongjun Ren, Jiang Xu, Jin Wang, Liming Fang:
Oriented Group Provable Data Possession in Public Cloud. 775-778 - Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. 779-782 - Zhangjie Fu, Xinyue Cao, Jin Wang, Xingming Sun:
Secure Storage of Data in Cloud Computing. 783-786 - Zhangjie Fu, Jie Xi, Jin Wang, Xingming Sun:
Document Attribute-Based Keyword Search over Encrypted Data. 787-790 - Zhangjie Fu, Jiangang Shu, Jin Wang, Xingming Sun:
A Similarity Search Method for Encrypted Cloud Document. 791-794 - Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. 795-798
Session 30: Control I
- Chih-Wen Li, Chia Cheng Chu, Wei Lun Fong, Hwang-Cheng Wang:
Intelligent Level Crossing Safety Control System. 799-802 - Hsu-Chih Huang, Ter-Feng Wu, Chun Yu Huang:
A Metaheuristic Artificial Immune System Algorithm for Mobile Robot Navigation. 803-806 - Ba-Vui Le, Sungyoung Lee:
Adaptive Hierarchical Emotion Recognition from Speech Signal for Human-Robot Communication. 807-810 - Ying-Ren Chien, Po-Yu Chen:
Impact of Jamming Attack on Galileo Receivers. 811-814 - Yi-Ting Chou, Yi-Jen Wang, Chung-Han Hsieh, Ruei Yu Wang, Syed Khawar Shah:
Study of Stability Indices for Special Protection System in Taiwan. 815-818
Session 31: Wireless Sensor Network
- Dan Tao, Guangwei Yang, Yan Sun, Haiyang Zhang, Xiaoyu Feng:
Data Acquisition and Transmission Reliability for Wireless Image Sensor Networks. 819-822 - Zhipeng Gao, Kan Chen, Weijing Cheng, Yuwen Hao, Xiaoxue Li:
K-Extended Constrain Independent Relay Node Placement with Base Stations in Two-Tiered Wireless Sensor Network. 823-826 - Zhiqiang Shi, Jin Liu, Qiuxia Song, Jin Wang:
An Energy Efficient Data Transmission Mechanism for Middleware of Wireless Sensor Network. 827-830 - Anqi Wang, Jin Liu, Xiaofeng Wang, Jin Wang:
A Fuzzy Control Theory and Neural Network Based Sensor Network Control System. 831-834 - Jenq-Muh Hsu, Chin Yo Chen:
A Sensor Information Gateway Based on Thing Interaction in IoT-IMS Communication Platform. 835-838
Session 32: Control II
- Ter-Feng Wu, Hsu-Chih Huang, Pu-Sheng Tsai, Nien-Tsu Hu, Zhi-Qiang Yang:
Adaptive Fuzzy CMAC Design for an Omni-directional Mobile Robot. 839-843 - Maoh Chin Jiang, Bing Jyun Shih, Shyh Shing Perng, Tai Chun Liu:
A Single-Stage Power Converter for DC UPS Applications. 844-847 - Maoh Chin Jiang, Shyh Shing Perng, Bing Jyun Shih, Tai Chun Liu, Wei Cheng Ke:
A High Performance Three-Phase Active Power Filter. 848-851 - Shyh Shing Perng, Chih-Wen Li, Maoh Chin Jiang, Ter-Feng Wu, Rui-Ting Ma:
Design and Implementation of a FPGA-Based Induction Motors Drive System. 852-855 - Chia-Wen Chang, Min Da Nian, Yi-Fang Chen, Ching Ho Chi, Chin-Wang Tao:
Design of a Kinect Sensor Based Posture Recognition System. 856-859
Session 33: Network Service
- Dapeng Qi, Yun Liu, Xiaoyang Wu, Zhen-Jiang Zhang:
An Algorithm to Detect the Crack in the Tunnel Based on the Image Processing. 860-863 - De Wei Chang, Chin-Feng Lai, Shih-Yeh Chen, Yueh-Min Huang, Yu-Lin Jeng:
A Concept Maps Oriented E-Book Content Design System for Evaluating Learning Performance. 864-867 - Nai Yue Chen, Yun Liu, Zhen-Jiang Zhang:
A Forecasting System of Micro-blog Public Opinion Based on Artificial Neural Network. 868-871 - Shen Bo, Zhang Huan, Hu Baowen:
Research on Analysis Method of Network User Preference. 872-875 - Hui-Huai Qiu, Yun Liu, Zhen-Jiang Zhang, Gui Xun Luo:
An Improved Collaborative Filtering Recommendation Algorithm for Microblog Based on Community Detection. 876-879 - Qiuxia Song, Jin Liu, Ming Ni, Liang Chen, Jialiang Shen:
Sorting Topic Specific Web Pages Based on Ontology Knowledge. 880-883
Session 34: Communication
- Yen-Wen Chen, Pei Ying Hsu, Jung Heng Tsai, Po Yin Liao, Meng-Hsien Lin:
A Heuristic Design of Uplink Scheduler in LTE-A Networks. 884-888 - Whai En Chen, Bo-En Chen:
An Effective NAT Traversal Mechanism for IMS Applications in 3GPP Networks. 889-892 - Chun-Yen Hsu, Chia-Hung Wei, Feng-Ming Yang, Whai En Chen:
Facilitating Initial Cell Selection in Dense Heterogeneous Network Using Mobile Speed Classification. 893-897 - Kuo-Chang Ting, Hwang-Cheng Wang, Chih-Cheng Tseng, Fang-Chang Kuo, Hung Te Huang:
Downlink Co-tier Interference Mitigation for Femtocell Networks. 898-901 - Whai En Chen, Shih-Yuan Cheng, Yi Lun Ciou:
A Study on Effects of Different Access Modes on Database Performance for SIP Server. 902-906 - Zhaowen Lin, Can Zhang, Yan Ma, Jian Li:
A Routing Framework in Software Defined Network Environment. 907-911
Session 35: Internet II
- Tin-Yu Wu, Chun-Yu Hsieh:
Cloud Terminal Access and QoS Enhancement by Content Store and Service Load Classification in Named Data Network. 912-915 - Yun Liu, Weiguo Yuan:
User Posting Behavior Analysis and Modeling in Microblog. 916-919 - Yun Liu, Xiaoxian Li, Bing Zhao:
Research on Topic Detection Strategy Based on Extension of Comments and HowNet Lexeme. 920-923 - Zhenjiang Zhang, Xiaoni Wang, Lin Sun:
Mobile Payment Anomaly Detection Mechanism Based on Information Entropy. 924-927 - Xiaoyang Wu, Yun Liu, Dapeng Qi, Zhen-Jiang Zhang:
A New Method of Subway Tunnel Crack Image Compression Based on ROI and Motion Estimation. 928-931 - Lianfen Huang, Xuelian Yang, Zhiyuan Shi, Yuliang Tang, Xin Su, Jie Zeng:
Analysis of Coexistence between the DTMB System and TD-LTE System. 932-937 - Ying Rao, Deyun Gao, Hongbin Luo, Hongke Zhang, Shuai Gao:
PBMA: A Proxy Based Mobility Support Approach in Named Data Networking. 938-941
Session 36: Internet III
- Fan-Hsun Tseng, Tsung Ta Liang, Cho Hsuan Lee, Li-Der Chou, Han-Chieh Chao:
A Star Search Algorithm for Civil UAV Path Planning with 3G Communication. 942-945 - Shih-Wen Hsu, Song Chun Lin, Yong Ming Jheng, Wei-Kuan Shih, Han-Chieh Chao:
A Dynamic Video Streaming Quality Adaption Method for IP Multimedia Subsystem. 946-949 - Shu Wei Pai, Hsin-Hung Cho, Han-Chieh Chao, Timothy K. Shih:
A Power Saving Scheme taking into Account Coverage and Connection Problem in WSNs. 950-953 - Kai-Di Chang, Jiann-Liang Chen, Han-Chieh Chao, Ching Wei Liu:
The Potential Cloud Application Model for Internet of Things - Case Study of Shopping Malls. 954-957
Session 37: Robotics
- Ter-Feng Wu, Pu-Sheng Tsai, Nien-Tsu Hu, Jen-Yang Chen:
Use of Ultrasonic Sensors to Enable Wheeled Mobile Robots to Avoid Obstacles. 958-961 - Nien-Tsu Hu, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen:
Digital Tracker for a Class of Continuous Time-Delay Singular Systems. 962-965 - Nien-Tsu Hu, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen:
Adaptive Control Using the Fuzzy Basis Function with Robust Design. 966-969 - Pu-Sheng Tsai, Ter-Feng Wu, Nien-Tsu Hu, Jen-Yang Chen:
Modeling of Fuzzy Control Design for Nonlinear Systems Based on Takagi-Sugeno Method. 970-973 - Nien-Tsu Hu, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen:
Adaptive TSK Fuzzy Control Design Using Scaling Gain Adaptation for Nonlinear Systems. 974-977 - Pu-Sheng Tsai, Ter-Feng Wu, Nien-Tsu Hu, Jen-Yang Chen:
Obstacle Avoidance System for Wheeled Mobile Robots by CMOS Image Sensors. 978-981
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.