


default search action
10. IIH-MSP 2014: Kitakyushu, Japan
- Junzo Watada, Akinori Ito, Jeng-Shyang Pan, Han-Chieh Chao, Chien-Ming Chen:

2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014, Kitakyushu, Japan, August 27-29, 2014. IEEE 2014, ISBN 978-1-4799-5390-5
Session 1: Cross-Discipline Techniques in Signal Processing and Networking
- Yuh-Yih Lu, Jun-Yi Guo, Hsiang-Cheh Huang

:
Design of Triple Symmetric Arms Dipole Antenna for 900/1800/2450 MHz Applications. 1-4 - Hsiang-Cheh Huang

, Ting-Hsuan Wang, Feng-Cheng Chang
:
Error-Control for Compressed Sensing of Images with Multi-channel Transmission. 5-8 - Liou Chu, Fu-Yi Hung, Yen-Cheng Lu:

Analysis and Simulation of Theme Park Queuing System. 9-12 - Hsiang-Cheh Huang

, Chuan-Chang Lin, Yuh-Yih Lu, Yueh-Hong Chen:
Enhanced Difference Alteration with Weighted Averages for Reversible Data Hiding. 13-16 - Feng-Cheng Chang

, Hsiang-Cheh Huang
:
Discussions on Implementing Iterative Hard Thresholding Algorithm. 17-20 - Yueh-Hong Chen, Hsiang-Cheh Huang

:
Reversible Image Watermarking Based on Genetic Algorithm. 21-24
Session 2: Ergonomic Information and Control Systems
- Bor-Shing Lin, I-Jung Lee, Pei-Chi Hsiao, Shu-Yu Yang, Willy Chou:

Data Glove Embedded with 6-DOF Inertial Sensors for Hand Rehabilitation. 25-28 - Yung Tsung Cheng, Jiun-Hung Lin, Cheng-Chi Tai:

A Prototype Design of a Continuous and Real-Time Wireless Urine Monitoring System. 29-32 - Chuan Lung Lin, Tso-Yao Chu, Pei-Jung Wu, Chen-An Wang, Bor-Shyh Lin

:
Design of Wearable Brain Computer Interface Based on Motor Imagery. 33-36 - Chih-Jen Cheng, Chien-Zhi Ou, Zu-Po Yang, Bor-Shyh Lin

:
Wireless Surface Electromyography Monitoring System for Dysphagia Evaluation. 37-40
Session 3: IPv6 Applications and Services
- Shian-Shyong Tseng, Ching-Heng Ku, Ai-Chin Lu, Jun Ming Su, Geng-Da Tsai:

Building an IPv6 Virtual Lab with the Multi-level Training Mechanism. 41-44 - N. Chuangchunsong, Sinchai Kamolphiwong

, Thossaporn Kamolphiwong, Robert Elz:
An Enhancement of IPv4-in-IPv6 Mechanism. 45-48 - Gu Hsin Lai:

A Light-Weight Penetration Test Tool for IPv6 Threats. 49-52 - Tseng-Yi Chen

, Fan-Hsun Tseng
, Nen-Fu Huang, Wei-Kuan Shih, Han-Chieh Chao
, Li-Der Chou:
The Implementation of IPv6-Enabled Locators for Location-Based Smart Marketing Service. 53-56 - Wen Yen Lin, Kuang-Po Hsueh, Wang-Hsin Hsu, Liew Gha Yie, Wei Chen Tai:

Design and Implementation of Health Monitoring System for Solar Panel in IPv6 Network. 57-60 - Shian-Shyong Tseng, Jui-Feng Weng, Li-Ling Hu, Hsu Nai Wen:

Ontology-Based Anti-threat Decision Support System for IPV4/IPV6. 61-64
Session 4: Multimedia Services and Security
- Ching-Yu Yang, Wen-Fong Wang:

Robust Color Image Watermarking Approach Based on Shape-Specific Points. 65-68 - Yung-Chen Chou, Guo-Hao Huang, Huang Ching Lee, Ke Jhen Lin:

A Reversible Data Hiding Method Using Inverse S-Scan Order and Histogram Shifting. 69-72 - Hung-Yu Lin, Jiung Long Huang:

A Web API Aggregation Service for Mobile Mashup Applications. 73-76 - Chih-Lin Hu

, Cheng Lun Lin, Hung-Tsung Huang, Yi-Yu Su, Pin-Chuan Liu:
Ubiquitous Multimedia Services in Home-Based Context-Aware Environments. 77-80 - Shin-Chi Lai, Chih-Hao Liu, Ling-Yi Wang, Sheau-Fang Lei:

14-ms-Group-Delay and Low-Complexity Algorithm Design of 18-Band Quasi-ANSI S1.11 1/3 Octave Filter Bank for Digital Hearing Aids. 81-84 - An-Kai Li, Shin-Chi Lai, Wen-Kai Tsai, Sheau-Fang Lei:

Low-Complexity Algorithm of Recursive Analysis and Synthesis Quadrature Mirror Filterbanks for Digital Radio Mondiale. 85-88 - Ching-Chun Chang, Yanjun Liu, Thai-Son Nguyen

:
A Novel Turtle Shell Based Scheme for Data Hiding. 89-93
Session 5: Intelligent and Multimedia Computing for Real-Life Applications
- Ya-Fen Chang, Wei-Liang Tai

, Wei-Na Wu, Wei-Han Li, Yung-Chi Chen:
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. 94-97 - Jen-Ho Yang, Pei-Yu Lin

:
An ID-Based User Authentication Scheme for Cloud Computing. 98-101 - Ping Nan Chiang, Kevin M. Taaffe:

Analysis of Passenger Flow in Airport Terminal. 102-105 - Wen Chuan Wu:

A QR Code-Based on-Street Parking Fee Payment Mechanism. 106-109 - Chi-Shiang Chan, Yi-Hui Chen, Pei-Yu Lin

:
An Image Hiding Method by Applying Tree Structure on Linking Pixels. 110-113 - Chia-Chen Lin

, Xiao-Long Liu, Jianjie Zhou, Shyan-Ming Yuan
:
An Optimal Modification BTC Scheme Based on Binary Search Tree. 114-117 - Ching-Hu Lu, Yi-Ting Chiang:

An Instantiation of the Multiple-Transfer Framework to Reduce Efforts in Context Model Learning for New Users in Smart Homes. 118-121
Session 6: Security and Privacy in Computer Forensics Applications
- Yung-Chen Chou, Hsin-Chi Liao:

A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting. 122-125 - Tzu-Chuen Lu, Chun-Ya Tseng, Chang-Mu Chen, Hui-Shih Leng, Ying-Hsuan Huang:

An Efficient and Simplified Data Hiding Technique Based on 2's Complement. 126-129 - Shanshan Yang, Chuan Qin

, Zhenxing Qian
, Boqing Xu:
Tampering Detection and Content Recovery for Digital Images Using Halftone Mechanism. 130-133 - Chia-Chen Lin

, Yuehong Huang, Wei-Liang Tai
:
Novel Image Authentication Scheme for AMBTC-Compressed Images. 134-137 - Yung-Chen Chou, Huang Ching Lee, Yong Jin Yu:

A Novel Reversible Data Hiding Scheme Using Ripple Strategy and Histogram Shifting. 138-141 - Tzu-Chuen Lu, Chun-Ya Tseng, Hui-Shih Leng, Chun-Chih Huang:

Data Hiding Scheme Based on Edge Detection and Triangular Mirroring. 142-145 - Li-Ling Hung, Yu-Wei Huang, Sheng-Han Wu:

Transmissions for Delay-Guaranteed Information Using Smart Antenna Systems. 146-149
Session 7: Information Applications
- Wenfa Qi, Yuxin Liu, Wei Guo:

An Automatic Chinese Font Library Generation Method by Modifying Vector Contour Curves. 150-154 - Gwo-Jiun Horng:

The Adaptive Recommendation Segment Mechanism to Reduce Traffic Congestion in Smart City. 155-158 - Jakub Peksinski, Grzegorz Mikolajczak, Janusz Pawel Kowalski:

Elimination of Matching Digital Images to Identify Objective Measures of Quality. 159-162 - Ram Pal Singh

, Neelam Dabas, Anurag Mishra, Vikash Chaudhary:
On Extreme Learning Machine for Watermarking of an Images in Discrete Wavelet Transform Domain. 163-166 - Soryoung Kim, Sang-Min Choi, Yo-Sub Han, Ka Lok Man, Kaiyu Wan:

Analyzing Item Features for Cold-Start Problems in Recommendation Systems. 167-170 - Chung Heng Chuang, Tsung-Hsing Lin, Liang-Bi Chen

, Tung-Lin Lee, Chaio Hsuan Chuang, Katherine Shu-Min Li, Chih-Lin Hung, Chao-Wen Wu:
A Hybrid Multi-functions Digital Public Address System with Earthquake Early Warning. 171-174 - Viktor Monarev, Andrey Pestunov

:
A Known-Key Scenario for Steganalysis and a Highly Accurate Detector within It. 175-178 - Yung-Hoh Sheu, Zuo Wen Wang, Yao Jhong Liou:

The K-Means Clustering Methods Applied in the Message Scheduling Methods of Flexray Communication Network Based on the Embedded Flexray Node. 179-182
Session 8: Multimedia Signal Processing and Network Technology I
- Zhonghua Sun, Kebin Jia:

Semantic Vocabulary Cognition Model for the Improvement of Automatic Image Annotation. 183-186 - Yuan Gao, Pengyu Liu, Kebin Jia:

Optimization for I-Frame Based on Residual Image. 187-190 - Zihan Pang, Kebin Jia, Jinchao Feng:

A Water Environment Security Monitoring Algorithm Based on Intelligent Video Surveillance. 191-194 - Qiang Wu, Jie Wei, Xuwen Li:

Research Progress of Obstacle Detection Based on Monocular Vision. 195-198 - Qiang Wu, Xiangnan Zhao, Xuwen Li:

Stereo Matching Algorithm of Color Image Based on Weber's Law and Census. 199-202 - Yuxin Song, Kebin Jia:

Modification of Disparity Vector Derivation from Neighbouring Blocks in 3D-HEVC. 203-206 - Liya Zhao, Kebin Jia:

The PCA-Demons Algorithm for Medical Image Registration. 207-210 - Yue Cheng, Bin Jiang, Kebin Jia:

A Deep Structure for Facial Expression Recognition under Partial Occlusion. 211-214
Session 9: Multimedia Signal Processing and Network Technology II
- Xianhua Song, Shen Wang, Jianzhi Sang, Xuehu Yan, Xiamu Niu:

Flexible Quantum Image Secret Sharing Based on Measurement and Strip. 215-218 - Qiong Li, Zhibin Lin, Dan Le, Hucheng Liu:

An FPGA-Based Design of Efficient QKD Sifting Module. 219-222 - Xuehu Yan, Shen Wang, Xiamu Niu:

Equivalence Proof of Two (2, n) Progressive Visual Secret Sharing. 223-226 - Qiong Li, Siyou Ma, Haokun Mao

, Lin Meng:
An FPGA-Based Communication Scheme of Classical Channel in High-Speed QKD System. 227-230 - Shu Geng, Liu Lv, Rongjun Liu:

Spam Detection Approach Based on C-Support Vector Machine and Kernel Principal-Component Analysis. 231-234 - Xiamu Niu, Yongting Wang, Di Wu:

A Method to Generate Random Number for Cryptographic Application. 235-238 - Jialiang Peng, Qiong Li, Xiamu Niu:

A Novel Finger Vein Image Quality Evaluation Method Based on Triangular Norm. 239-242 - Zhenjia Dou, Kexin Ren, Qi Han, Xiamu Niu:

A Novel Real-Time Aeromagnetic Compensation Method Based on RLSQ. 243-246 - Chen Cui, Shen Wang, Xiamu Niu:

Perceptual Image Hashing for DIBR 3D Images Based on Ring Partition and SIFT Feature Points. 247-250
Session 10: Recent Advances in Information Hiding and Enrichment Technologies for Audio and Speech Signals
- Kazuhiro Kondo

, Hiroki Sakurai:
Gender-Dependent Babble Maskers Created from Multi-speaker Speech for Speech Privacy Protection. 251-254 - Akira Nishimura:

Encoding Data by Frequency Modulation of a High-Low Siren Emitted by an Emergency Vehicle. 255-259 - Nobutaka Ono

:
Robust Audio Information Hiding Based on Stereo Phase Difference in Time-Frequency Domain. 260-263 - Minoru Kohata:

Secure Speech Encryption System Using Segments for Speech Synthesis. 264-267 - Harumi Murata, Akio Ogihara:

An Audio Watermarking Method Using Pitch-Transformed Sound of Original Music. 268-271 - Shengbei Wang, Masashi Unoki

:
Hybrid Speech Watermarking Based on Formant Enhancement and Cochlear Delay. 272-275 - Xinlu Gui, Siren Cai, Xiaolong Li, Bin Yang:

A Novel Reversible Data Hiding Scheme Based on Reference Pixels and Adaptive Block Selection. 276-280
Session 11: Intelligent Video Processing
- Chao-Ho Chen, Tsong-Yi Chen, Yu-Chun Lin, Wu-Chih Hu:

Moving-Object Intrusion Detection Based on Retinex-Enhanced Method. 281-284 - Tsong-Yi Chen, Chao-Ho Chen, Tzu Feng Tseng, Guan-Ming Luo, Wu-Chih Hu:

HDR Enhancement Based on Bi-curve Mapping for Image Sequences. 285-288 - Bing-Hong Liu, Ngoc-Tu Nguyen

, Van-Trung Pham:
An Efficient Method for Sweep Coverage with Minimum Mobile Sensor. 289-292 - Yan-Haw Chen, Ching-Fu Huang, Shao-I Chu:

A Fast Method for Decoding Reed-Solomon Codes on Processors. 293-296 - Sinnu Susan Thomas, Sumana Gupta, K. S. Venkatesh:

An Energy Minimization Approach for Automatic Video Shot and Scene Boundary Detection. 297-300 - Ching-Hao Lai, Jun-Dong Chang, Ji Wei Lu, Fay Huang:

A Dynamic Street View System Using Video Event Data Recorder. 301-304
Session 12: System-on-Chip for Signal Processing
- Yeu-Horng Shiau, Cheng-Han Li, Zhi-hao Wang, Yi Tai Guo:

Hardware and Software Co-design of the Moving Object Tracking System. 305-308 - Shin-Chi Lai, Wen Chih Li, Sin He You, Da Wei Jhuang, Shih Ting Gao:

Low-Cost and Low-Complexity Electrocardiogram Signal Recorder Design Based on Arduino Platform. 309-312 - Shin-Chi Lai, Hsu Cheng Lai, Feng Chung Hong, Huan Ru Lin, Sheau-Fang Lei:

A Novel Coherence-Function-Based Noise Suppression Algorithm by Applying Sound-Source Localization and Awareness-Computation Strategy for Dual Microphones. 313-316 - Chi-Chia Sun

, Cheng Chih Wang, Ming-Hwa Sheu:
Ultra Low Power Circuit Design Based on Adiabatic Logic. 317-320 - Shih-Chang Hsia, Cheng-Nan Ho, Chien-Hung Liu:

Real-Time Text Detection Using PAC/DUE Embedded System. 321-324 - Yin-Tsung Hwang, Bing Cheng Tsai, Yu-Ting Pai, Ming-Hwa Sheu:

Feature Points Based Video Object Tracking for Dynamic Scenes and Its FPGA System Prototyping. 325-328 - Wen-Kai Tsai, Chang Jie Lai, Ming-Hwa Sheu, Tsu Hsiung Chen:

High Dynamic Range Image Based on Block-Based Edge Strength for Embedded System Design. 329-332
Session 13: Video Information Processing and Pattern Recognition
- Hainan Zhao, Xuan Wang:

Robust Object Tracking Using Adaptive Multi-Features Fusion Based on Local Kernel Learning. 333-336 - Shixi Fan, Yongshuai Hou, Lidan Chen:

Dependency Parsing with Structure Knowledge. 337-340 - Shu Wang:

Semi-supervised Marginal Fisher Analysis. 341-344 - Xiang Jun Huang, Qing Hua Zheng, Chao Zhang:

Extracting Learning Features of Knowledge Unit in Knowledge Map. 345-348 - Fei Yang

, Weigang Lu, Lei Zhang, Kuanquan Wang, Yemin Li:
Visualization for Non-linear Enhanced Volume Data. 349-352 - Cheng-Chang Lien, Wen Kai Yu, Chang-Hsing Lee, Chin-Chuan Han:

Night Video Surveillance Based on the Second-Order Statistics Features. 353-356 - Fu-Hao Yeh, Greg C. Lee, Ying-Ju Chen, Chien-Hsing Liao:

Robust Handwriting Extraction and Lecture Video Summarization. 357-360 - Yu-Hsi Chen, Hsueh-Yi Sean Lin, Chih-Wen Su:

Full-Frame Video Stabilization via SIFT Feature Matching. 361-364
Session 14: Intelligent Multimedia Tools and Applications
- Jen-Perng Yu, Jyh Jong Lin, Mei-Chen Chu, Yuh Hwa Pai:

Bezier Curve-Based Tour Generator for Navigation in Google Earth-Based Virtual Campus. 365-368 - Hui-Hui Chen, Hung Sheng Lai, Bor-Jiunn Hwang, Chiao-Wen Kao, Shih-Yu Huang:

Eye Tracking for Analyzing Applied Effects on Instructional Graphics Directing Visual Attention. 369-372 - Shyi-Huey Wu, Bor-Jiunn Hwang, Ya Ping Fan, Ching-Hui Chen:

Applying Media Richness Theory to Essay Writing Instruction - A Case of an Elementary School. 373-376 - Yih-Shyh Chiou

, Fuan Tsai, Sheng-Cheng Yeh:
A Dead-Reckoning Positioning Scheme Using Inertial Sensing for Location Estimation. 377-380 - Shang-Kuan Chen, Ran-Zan Wang

, Wen Pinn Fang:
High-Payload Lossless Data Hiding Scheme with Block Statistics Characteristics. 381-384 - Wen Pinn Fang, Ran-Zan Wang

, Tzu Hsuan Liao, Shang-Kuan Chen, Yeuan-Kuen Lee:
Data Transmission System for Mobile Device by Audio Hiding Approach. 385-387 - Wen Pinn Fang, Ming-Hao Liu, Yeuan-Kuen Lee, Rei-Heng Cheng:

Video Resizing for Mobile Device. 388-391 - Wen-Pinn Fang, Chun Li, Tsu-Hsun Fu:

Real-Time Broadcast System for Android System. 392-394 - Chii-Jen Chen

, You-Wei Wang, Wen-Pinn Fang:
A Study on Captcha Recognition. 395-398
Session 15: Advanced Multimedia Processing and Retrievals
- Fang-Hsuan Cheng, Moo Di Loo:

An Image Inpainting Method for Stereoscopic Images Based on Filling Route. 399-402 - Yasuhiro Takatsuka, Hirofumi Yabu, Kayo Yoshimoto, Hideya Takahashi:

Retinal Projection Display Using Diffractive Optical Element. 403-406 - Hodaka Yamada, Hirofumi Yabu, Kayo Yoshimoto, Hideya Takahashi:

Three-Dimensional Light Field Display with Overlaid Projection. 407-410 - Atsushi Ueno, Natsuki Kajihara, Natsuko Fujii, Tomohito Takubo:

Vision-Based Path Learning for Home Robots. 411-414 - Pyke Tin, Takashi Toriu, Thi Thi Zin, Hiromitsu Hama:

A Cluster Based Ranking Framework for Multi-typed Information Networks. 415-418 - Thi Thi Zin, Pyke Tin, Takashi Toriu, Hiromitsu Hama:

A New Background Subtraction Method Using Bivariate Poisson Process. 419-422 - Liang-Hua Chen, Pei Chieh Lee, Li-Yun Wang, Hong-Yuan Mark Liao:

Integration of Multiple Shape Features for Human Detection in Videos. 423-426 - Xi Quan Yang, Dian Yang, Ming Yuan, Xing Hua Lv:

Scientific Literature Retrieval Model Based on Weighted Term Frequency. 427-430
Session 16: Intelligent Image and Signal Processing
- Shih-Yen Huang, You-Jyun Syu:

Based on the Texture Analysis to Inspect the Tread Worn Status on the Tire. 431-434 - Hui-Yu Huang, Wei-Chang Tsai:

Blurred Image Restoration Using Fast Blur-Kernel Estimation. 435-438 - Wen-Yuan Chen, Shih Sung Cheng, Ching-Te Wang, Chin-Fu Tsai, Chiou-Kou Tung:

The Cleaning Machine Path Design Using Image Recognition Techniques. 439-442 - Ruey-Maw Chen, Hua Tsun Huang:

Particle Swarm Optimization Enhancement by Applying Global Ratio Based Communication Topology. 443-446 - Chen-Chung Liu, Shao Wei Chu, Yung-Kuan Chan

, Shyr-Shen Yu:
A Modified K-Means Algorithm - Two-Layer K-Means Algorithm. 447-450 - Chuin-Mu Wang, Jian De Hong, Geng-Cheng Lin, Jing Yuan Su, Zhe Fu Lin:

License Plate Location System Using Smart-Phone with G-Sensor. 451-454
Session 17: Multimedia Security and Privacy
- Toshiki Ito, Ryo Sugimura, Hyunho Kang, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:

A New Approach to Reversible Watermarking. 455-458 - Hirokazu Ishizuka, Isao Echizen, Keiichi Iwamura, Kouichi Sakurai:

A Zero-Watermarking-Like Steganography and Potential Applications. 459-462 - Kento Kobayashi, Keiichi Iwamura, Kitahiro Kaneda, Isao Echizen:

Surveillance Camera System to Achieve Privacy Protection and Crime Prevention. 463-466 - Hyunho Kang, Keiichi Iwamura:

Image Protection System with Steganography and Authentication. 467-470 - Shimon Machida, Tomoko Kajiyama, Shigeru Shimada, Isao Echizen:

Analysis of Facebook Friends Using Disclosure Level. 471-474 - Xinlu Gui, Xiaolong Li, Bin Yang:

Steganalysis of LSB Matching Based on Local Binary Patterns. 475-480 - Xiaocheng Hu, Weiming Zhang, Nenghai Yu:

Optimizing Pixel Predictors Based on Self-Similarities for Reversible Data Hiding. 481-484 - Chin-Chen Chang, Chin-Yu Sun:

Polynomial-Based Secret Sharing Scheme Based on the Absolute Moment Block Truncation Coding Technique. 485-488 - Chin-Chen Chang, Hsiao-Ling Wu, Ting-Feng Chung:

Applying Histogram Modification to Embed Secret Message in AMBTC. 489-492
Session 18: Recent Advances in Robust Information Hiding against Print-Scan Process
- Takayuki Ishihara, Michiharu Niimi:

Compatible 2D-Code Having Tamper Detection System with QR-Code. 493-496 - Kitahiro Kaneda, Hiroyasu Kitazawa, Keiichi Iwamura, Isao Echizen:

A Study of Equipment Dependence of a Single-Dot Pattern Method for an Information-Hiding by Applying an Error-Correcting Code. 497-501 - Kitahiro Kaneda, Tomoki Inui, Keiichi Iwamura, Isao Echizen:

Novel Proposal and Evaluation of Information Extraction Method from Artificial Fiber Pattern Using a Camera. 502-506 - Kitahiro Kaneda, Kenta Kawabata, Keiichi Iwamura, Isao Echizen:

Mathematical Simulation Model and Its Evaluation for Artificial Fiber Patterns. 507-511 - Chin-Chen Chang, Hsiao-Ling Wu:

A Large Payload Information Hiding Scheme Using Two-Level Exploiting Modification Direction. 512-515 - Wannida Sae-Tang, Masaaki Fujiyoshi

, Hitoshi Kiya:
Effects of Random Sign Encryption in JPEG 2000-Based Data Hiding. 516-519 - Thach V. Bui, Nguyen K. Vu, Thong T. P. Nguyen, Isao Echizen, Thuc Dinh Nguyen:

Robust Message Hiding for QR Code. 520-523
Session 19: Network Testbed and Industrial Control System Security
- Haihui Gao, Zhonghua Dai, Yong Peng, Huikang Lu:

Cyber Security Risk Assessment of Communication Network of Substation Based on Improved Grey Clustering. 524-527 - Yi Gong, Yong Fang

, Liang Liu, Juan Li:
Multi-agent Intrusion Detection System Using Feature Selection Approach. 528-531 - Zhonghua Dai, Haihui Gao, Yong Peng, Huikang Lu:

A New Information Security Risk Assessment Method in Power Production System Based on Rough Sets and Bayesian Network. 532-536 - Haihui Gao, Yong Peng, Zhonghua Dai, Hanjing Li:

Techniques and Research Trends of Network Testbed. 537-541 - Andrey Pestunov

:
Formalization and Systematization of Differential Cryptanalysis Notions. 542-545 - Ming-Hwa Cheng, Rui Juan Deng, Wen-Shyang Hwang, Yan-Jing Wu:

An AODV-Based Backup Routing Mechanism for Time-Critical in Wireless Mesh Networks. 546-549
Session 20: Signal Processing Methods for Music Information Retrieval in the Future Internet
- Masashi Ito, Tomohiro Ashina, Yujiro Saegusa:

A Singing Voice Synthesizer Controlled by Arm Motions Using Compressed Phoneme Determination Algorithm. 550-553 - Kazumichi Yoshida, Takashi Nose

, Akinori Ito
:
Analysis of English Pronunciation of Singing Voices Sung by Japanese Speakers. 554-557 - Akinori Ito

:
Assessing the Intended Enthusiasm of Singing Voice Using Energy Variance. 558-561 - Dooyong Sung, Kyogu Lee:

Transcribing Frequency Modulated Musical Expressions from Polyphonic Music Using HMM Constrained Shift Invariant PLCA. 562-565 - Seokjin Lee:

On-Line Nonnegative Matrix Factorization for Music Signal Separation. 566-569 - Liming Song, Ming Li, Yonghong Yan:

Melody Extraction for Vocal Polyphonic Music Based on Bayesian Framework. 570-573
Session 21: Technologies for Speech Communication in the Future Internet
- Masato Akagi, Xiao Han, Reda Elbarougy

, Yasuhiro Hamada, Junfeng Li:
Emotional Speech Recognition and Synthesis in Multiple Languages toward Affective Speech-to-Speech Translation System. 574-577 - Takashi Nose

, Takao Kobayashi:
Quantized F0 Context and Its Applications to Speech Synthesis, Speech Coding, and Voice Conversion. 578-581 - Inyoung Hwang, Joon-Hyuk Chang:

Voice Activity Detection Based on Statistical Model Employing Deep Neural Network. 582-585 - Doo Hwa Hong, Shin Jae Kang, Joun Yeop Lee, Nam Soo Kim:

Speaker Adaptation Using Nonlinear Regression Techniques for HMM-Based Speech Synthesis. 586-589 - Mengzhe Chen, Qingqing Zhang, Jielin Pan, Yonghong Yan:

Boosted Hybrid DNN/HMM System Based on Correlation-Generated Targets. 590-593 - Xuyang Wang, Ta Li, Pengyuan Zhang, Jielin Pan, Yonghong Yan:

Enhanced Out of Vocabulary Word Detection Using Local Acoustic Information. 594-597
Session 22: 3D Spatial Audio Technologies in the Future Internet
- Yukio Iwaya, Makoto Otani, Takao Tsuchiya, Junfeng Li:

Virtual Auditory Display by Remote Rendering via Computer Network. 598-601 - Daisuke Morikawa:

Effect of Interaural Difference for Localization of Spatially Segregated Sound. 602-605 - Shuichi Sakamoto, Yoshiki Satou, Jorge Treviño, Yôiti Suzuki:

Representation of Individual HRTFs Using Weighting Coefficients of SENZI. 606-609 - Chan Jun Chun, Seok Hee Jeong, Jong Won Shin, Hong Kook Kim, Jin Ah Kang:

Feasibility Study for Objective Measurement on Sound Localization Using Auditory Evoked Potential. 610-613 - Kyoungsoo Park, Jeong-Hun Seo, Jeunghun Kim, Cheon Sung Jun:

Auralization of Musical Instruments in Virtual Halls Considering Source Directivity. 614-617 - Xing Yang, Risheng Xia, Zhonghua Fu, Junfeng Li, Yonghong Yan, Shuichi Sakamoto, Yôiti Suzuki:

On the Performance and Robustness of Crosstalk Cancelation with Multiple Loudspeakers. 618-621 - Guoliang Lu, Yiqi Zhou, Xueyong Li:

Recognizing Actions with Multi-view 2D Observations Recovered from Depth Maps. 622-625
Session 23: New Advances on Multimedia Security and Forensics
- Lu Liu, Rongrong Ni, Yao Zhao, Siran Li:

Improved SIFT-Based Copy-Move Detection Using BFSN Clustering and CFA Features. 626-629 - Zi Wang

, Ju Liu, Wenbo Wan, Jiande Sun, Jun Bo, Yongkang Liu:
Security Monitoring by Watermarking and Hashing for Multimedia Service on Internet Platform. 630-633 - Chien-Ming Chen

, Jeng-Shyang Pan
, Raylin Tso
, Szu-Wei Huang, Mu-En Wu:
Pitfalls in an Ultra-Lightweight Authentication Protocol for Low-Cost RFID. 634-637 - Yan-Li Huang, Hao Liang Cui, Shao-Zhang Niu:

Regular Clipping Detection of Image Based on SIFT. 638-641 - Chin-Chen Chang, Wei-yi Chen, Ting-Fang Cheng:

A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard. 642-645
Session 24: Wireless Network
- Tsung-Yuan Wu, Wei-Tsong Lee:

The Research and Analysis for Rear View Transmission Based on IEEE 802.11 Wireless Network. 646-649 - Yu-Chang Lin, Wei-Tsong Lee, Jing Yue Qiu:

Reducing the Power Consumption of Servers with Bandwidth Consideration. 650-653 - Chen Wei Chang, Wei-Tsong Lee, Hsin-Wen Wei:

FHR-SCTP: The Research of a Quality Aware SCTP Congestion Control Mechanism to Improve Handover Efficiency. 654-657 - Kai Po Chuang, Wei Tsong Lee, Hsin Wen Wei:

Dynamically Adjust Packet Size and Block Size to Achieve Maximum Effectiveness of Forward Error Correction. 658-661 - Yu Jen Pan:

The Study of Mobile E-Portfolio Architecture. 662-665 - Rung-Shiang Cheng, Chia Peng Lin, Jiun Yu Jhou:

A Location-Aware Home Appliance Control System. 666-669
Session 25: Wireless Network Algorithm and Theory I
- Shih-Chang Huang, Hong-Yi Chang:

A Density-Aware Location-Aided Routing Protocol for Wireless Ad-Hoc Networks. 670-673 - Hong-Yi Chang, Shih-Chang Huang, Chih-Chun Lai, Zih Huan Hong:

A Novel Recommendation Scheme for Increasing Connectivity in ZigBee Wireless Sensor Networks. 674-677 - Chun-Yi Wu, Chang Wu Yu

:
Computing the Probability of Specific Random Sector Graphs with Applications in Wireless Networks with Directional Antennas. 678-681 - Hong-Yi Chang, Yu-Huei Huang, Tu-Liang Lin:

A Novel Relay Placement Algorithm Based on Puzzle Games for Indoor Wireless Sensor Networks. 682-685 - Hong-Yi Chang, Hao-Wen Lin, Zih Huan Hong, Tu-Liang Lin:

A Novel Algorithm for Searching Parking Space in Vehicle Ad Hoc Networks. 686-689 - Tu-Liang Lin, Yu Sheng Chen, Hong-Yi Chang:

Performance Evaluations of an Ant Colony Optimization Routing Algorithm for Wireless Sensor Networks. 690-693
Session 26: Cloud Computing
- Jing Yue Qiu, Hsin-Wen Wei, Wei-Tsong Lee, Yu-Chang Lin:

Adaptive Job Assign Algorithm Based on Hierarchical Server Cloud Computing. 694-697 - Heng Yao Chang, Wei-Tsong Lee, Hsin-Wen Wei:

A Novel Protocol UDCP for Improving Fairness and Maintaining the High-Speed Rate of UDP. 698-701 - Wei Jyun Wong, Wei-Tsong Lee, Hsin-Wen Wei:

Base on Game Theory Model to Improve Trust Access Control in Cloud File-Sharing System. 702-705 - Yongjun Ren, Yaping Chen, Jin Wang, Liming Fang:

Leakage Resilient Provable Data Possession in Public Cloud Storage. 706-709 - Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang:

Attributed Based Provable Data Possession in Public Cloud Storage. 710-713 - (Withdrawn) Data Access Control for Multi-authority Cloud Storage Systems. 714-717

Session 27: Wireless Network Algorithm and Theory II
- Chiu-Kuo Liang, Cheng Yen Chung, Chuan-Feng Li:

A Virtual Force Based Movement Scheme for Area Coverage in Directional Sensor Networks. 718-722 - Li-Hsing Yen, Zong-Long Chen:

Self-Stabilizing Distributed Formation of Minimal k-Dominating Sets in Mobile Ad Hoc Networks. 723-728 - Min-Shu Hung, Jen-Yi Pan

, Zheng-En Huang:
Analysis of Handover Decision with Adaptive Offset in Next-Generation Hybrid Macro/Femto-cell Networks. 729-734 - Rei-Heng Cheng, Chiming Huang, Wen Pinn Fang, Shang-Kuan Chen, Ran-Zan Wang

:
Energy Consumption Analysis for Sensors in Multi-sink Wireless Sensor Networks. 735-738 - Ming-Che Chen, Hui-Tang Lin:

End-to-End Delay Performance Analysis of Anypath Routing over Wireless Mesh Networks. 739-743
Session 28: Internet I
- Ming-Fong Tsai, Chih-Han Chang:

A Reducing Broadcast Message Method in Vehicular Networks. 744-747 - Hwai-Tsu Hu, Szu-Hong Chen, Ling-Yuan Hsu:

Incorporation of Perceptually Energy-Compensated QIM into DWT-DCT Based Blind Audio Watermarking. 748-752 - Xukai Wang, Yan Sun, Hong Luo:

Service Conflict Detection and Avoidance Based on Scene with Urgency Degree. 753-756 - Yanchen Ren, Hong Luo, Liang Liu:

A Dimension Model for Conflict-Free Service Management in Smart Environment Control System. 757-761 - Qiuxia Song, Jin Liu

, Xiaofeng Wang, Jin Wang:
A Novel Automatic Ontology Construction Method Based on Web Data. 762-765 - Bo Shen, Ningwei Wang, Huihuai Qiu:

A New Genetic Algorithm for Overlapping Community Detection. 766-769
Session 29: Security
- Xinwei Liu, Yan Sun, Jie Liu:

Security Analysis for UHF RFID Tags. 770-774 - Yongjun Ren, Jiang Xu, Jin Wang, Liming Fang:

Oriented Group Provable Data Possession in Public Cloud. 775-778 - Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:

Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. 779-782 - Zhangjie Fu, Xinyue Cao, Jin Wang, Xingming Sun:

Secure Storage of Data in Cloud Computing. 783-786 - Zhangjie Fu, Jie Xi, Jin Wang, Xingming Sun:

Document Attribute-Based Keyword Search over Encrypted Data. 787-790 - Zhangjie Fu, Jiangang Shu

, Jin Wang, Xingming Sun:
A Similarity Search Method for Encrypted Cloud Document. 791-794 - Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:

Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. 795-798
Session 30: Control I
- Chih-Wen Li, Chia Cheng Chu, Wei Lun Fong, Hwang-Cheng Wang:

Intelligent Level Crossing Safety Control System. 799-802 - Hsu-Chih Huang, Ter-Feng Wu, Chun Yu Huang:

A Metaheuristic Artificial Immune System Algorithm for Mobile Robot Navigation. 803-806 - Ba-Vui Le, Sungyoung Lee:

Adaptive Hierarchical Emotion Recognition from Speech Signal for Human-Robot Communication. 807-810 - Ying-Ren Chien

, Po-Yu Chen:
Impact of Jamming Attack on Galileo Receivers. 811-814 - Yi-Ting Chou, Yi-Jen Wang, Chung-Han Hsieh, Ruei Yu Wang, Syed Khawar Shah:

Study of Stability Indices for Special Protection System in Taiwan. 815-818
Session 31: Wireless Sensor Network
- Dan Tao, Guangwei Yang, Yan Sun, Haiyang Zhang, Xiaoyu Feng:

Data Acquisition and Transmission Reliability for Wireless Image Sensor Networks. 819-822 - Zhipeng Gao, Kan Chen, Weijing Cheng, Yuwen Hao, Xiaoxue Li:

K-Extended Constrain Independent Relay Node Placement with Base Stations in Two-Tiered Wireless Sensor Network. 823-826 - Zhiqiang Shi, Jin Liu

, Qiuxia Song, Jin Wang:
An Energy Efficient Data Transmission Mechanism for Middleware of Wireless Sensor Network. 827-830 - Anqi Wang, Jin Liu

, Xiaofeng Wang, Jin Wang:
A Fuzzy Control Theory and Neural Network Based Sensor Network Control System. 831-834 - Jenq-Muh Hsu, Chin Yo Chen:

A Sensor Information Gateway Based on Thing Interaction in IoT-IMS Communication Platform. 835-838
Session 32: Control II
- Ter-Feng Wu, Hsu-Chih Huang, Pu-Sheng Tsai, Nien-Tsu Hu

, Zhi-Qiang Yang:
Adaptive Fuzzy CMAC Design for an Omni-directional Mobile Robot. 839-843 - Maoh Chin Jiang, Bing Jyun Shih, Shyh Shing Perng, Tai Chun Liu:

A Single-Stage Power Converter for DC UPS Applications. 844-847 - Maoh Chin Jiang, Shyh Shing Perng, Bing Jyun Shih, Tai Chun Liu, Wei Cheng Ke:

A High Performance Three-Phase Active Power Filter. 848-851 - Shyh Shing Perng, Chih-Wen Li, Maoh Chin Jiang, Ter-Feng Wu, Rui-Ting Ma:

Design and Implementation of a FPGA-Based Induction Motors Drive System. 852-855 - Chia-Wen Chang, Min Da Nian, Yi-Fang Chen, Ching-Ho Chi

, Chin-Wang Tao:
Design of a Kinect Sensor Based Posture Recognition System. 856-859
Session 33: Network Service
- Dapeng Qi, Yun Liu, Xiaoyang Wu, Zhen-Jiang Zhang:

An Algorithm to Detect the Crack in the Tunnel Based on the Image Processing. 860-863 - De Wei Chang, Chin-Feng Lai

, Shih-Yeh Chen, Yueh-Min Huang, Yu-Lin Jeng:
A Concept Maps Oriented E-Book Content Design System for Evaluating Learning Performance. 864-867 - Nai Yue Chen, Yun Liu, Zhen-Jiang Zhang:

A Forecasting System of Micro-blog Public Opinion Based on Artificial Neural Network. 868-871 - Shen Bo, Zhang Huan, Hu Baowen:

Research on Analysis Method of Network User Preference. 872-875 - Hui-Huai Qiu, Yun Liu, Zhen-Jiang Zhang, Gui Xun Luo:

An Improved Collaborative Filtering Recommendation Algorithm for Microblog Based on Community Detection. 876-879 - Qiuxia Song, Jin Liu

, Ming Ni, Liang Chen, Jialiang Shen:
Sorting Topic Specific Web Pages Based on Ontology Knowledge. 880-883
Session 34: Communication
- Yen-Wen Chen, Pei Ying Hsu, Jung Heng Tsai, Po Yin Liao, Meng-Hsien Lin:

A Heuristic Design of Uplink Scheduler in LTE-A Networks. 884-888 - Whai En Chen, Bo-En Chen:

An Effective NAT Traversal Mechanism for IMS Applications in 3GPP Networks. 889-892 - Chun-Yen Hsu, Chia-Hung Wei, Feng-Ming Yang, Whai En Chen:

Facilitating Initial Cell Selection in Dense Heterogeneous Network Using Mobile Speed Classification. 893-897 - Kuo-Chang Ting, Hwang-Cheng Wang, Chih-Cheng Tseng, Fang-Chang Kuo, Hung Te Huang:

Downlink Co-tier Interference Mitigation for Femtocell Networks. 898-901 - Whai En Chen, Shih-Yuan Cheng, Yi Lun Ciou:

A Study on Effects of Different Access Modes on Database Performance for SIP Server. 902-906 - Zhaowen Lin, Can Zhang, Yan Ma, Jian Li:

A Routing Framework in Software Defined Network Environment. 907-911
Session 35: Internet II
- Tin-Yu Wu, Chun-Yu Hsieh:

Cloud Terminal Access and QoS Enhancement by Content Store and Service Load Classification in Named Data Network. 912-915 - Yun Liu, Weiguo Yuan:

User Posting Behavior Analysis and Modeling in Microblog. 916-919 - Yun Liu, Xiaoxian Li, Bing Zhao:

Research on Topic Detection Strategy Based on Extension of Comments and HowNet Lexeme. 920-923 - Zhenjiang Zhang, Xiaoni Wang, Lin Sun:

Mobile Payment Anomaly Detection Mechanism Based on Information Entropy. 924-927 - Xiaoyang Wu, Yun Liu, Dapeng Qi, Zhen-Jiang Zhang:

A New Method of Subway Tunnel Crack Image Compression Based on ROI and Motion Estimation. 928-931 - Lianfen Huang, Xuelian Yang, Zhiyuan Shi, Yuliang Tang, Xin Su, Jie Zeng:

Analysis of Coexistence between the DTMB System and TD-LTE System. 932-937 - Ying Rao, Deyun Gao, Hongbin Luo, Hongke Zhang, Shuai Gao:

PBMA: A Proxy Based Mobility Support Approach in Named Data Networking. 938-941
Session 36: Internet III
- Fan-Hsun Tseng

, Tsung Ta Liang, Cho Hsuan Lee, Li-Der Chou, Han-Chieh Chao
:
A Star Search Algorithm for Civil UAV Path Planning with 3G Communication. 942-945 - Shih-Wen Hsu, Song Chun Lin, Yong Ming Jheng, Wei-Kuan Shih, Han-Chieh Chao

:
A Dynamic Video Streaming Quality Adaption Method for IP Multimedia Subsystem. 946-949 - Shu Wei Pai, Hsin-Hung Cho, Han-Chieh Chao

, Timothy K. Shih:
A Power Saving Scheme taking into Account Coverage and Connection Problem in WSNs. 950-953 - Kai-Di Chang, Jiann-Liang Chen, Han-Chieh Chao

, Ching Wei Liu:
The Potential Cloud Application Model for Internet of Things - Case Study of Shopping Malls. 954-957
Session 37: Robotics
- Ter-Feng Wu, Pu-Sheng Tsai, Nien-Tsu Hu

, Jen-Yang Chen:
Use of Ultrasonic Sensors to Enable Wheeled Mobile Robots to Avoid Obstacles. 958-961 - Nien-Tsu Hu

, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen:
Digital Tracker for a Class of Continuous Time-Delay Singular Systems. 962-965 - Nien-Tsu Hu

, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen:
Adaptive Control Using the Fuzzy Basis Function with Robust Design. 966-969 - Pu-Sheng Tsai, Ter-Feng Wu, Nien-Tsu Hu

, Jen-Yang Chen:
Modeling of Fuzzy Control Design for Nonlinear Systems Based on Takagi-Sugeno Method. 970-973 - Nien-Tsu Hu

, Ter-Feng Wu, Pu-Sheng Tsai, Jen-Yang Chen:
Adaptive TSK Fuzzy Control Design Using Scaling Gain Adaptation for Nonlinear Systems. 974-977 - Pu-Sheng Tsai, Ter-Feng Wu, Nien-Tsu Hu

, Jen-Yang Chen:
Obstacle Avoidance System for Wheeled Mobile Robots by CMOS Image Sensors. 978-981

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














