According to the good visualization interface and WiFi wireless function of the Android, We put forward a kind of pressure strength training system for medical students teaching, formulating the basic standards of the pressing position and the strength on the acupoint by experienced doctors, aims to training qualified students. Firstly using a low-power STM32 family of processors to complete data collection and AD conversion, and then develop Android mobile terminal software, as a visual teaching interface. We get the medical teaching purposes by interactive feedback wireless communication.
{"title":"Acupoint Teaching System Based on Android","authors":"Zhixiang Zhang, Ziming Zhang, Yuhui Gao, Xin Zhi, Jianfei Zhao","doi":"10.1109/IIH-MSP.2013.60","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.60","url":null,"abstract":"According to the good visualization interface and WiFi wireless function of the Android, We put forward a kind of pressure strength training system for medical students teaching, formulating the basic standards of the pressing position and the strength on the acupoint by experienced doctors, aims to training qualified students. Firstly using a low-power STM32 family of processors to complete data collection and AD conversion, and then develop Android mobile terminal software, as a visual teaching interface. We get the medical teaching purposes by interactive feedback wireless communication.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a novel LED driver chip for multi-channels based on current mirrors. The driver can change the LED brightness with a pulse width modulation (PWM). The chip built a four-order temperature sensor for chip protection. The chip is implemented with TSMC 0.25 UM CMOS HIGH VOLTAGE MIXED SIGNAL BASED. Using 60V power MOS for two channels LED driver, this chip can drive 120W LED string for smart street lighting. The chip core occupied about 1215um x 900um silicon area. The driving efficiency can achieve up to near 90%.
本文提出了一种基于电流反射镜的多通道LED驱动芯片。驱动程序可以通过脉冲宽度调制(PWM)改变LED亮度。该芯片构建了一个四阶温度传感器,用于芯片保护。该芯片采用台积电0.25 μ m CMOS高压混合信号实现。该芯片采用60V功率MOS双通道LED驱动器,可驱动120W LED串,用于智能路灯照明。芯片核心约占1215um × 900um的硅面积。驱动效率可达近90%。
{"title":"Multi-channel LED Driver with PWM Dimming and Temperature Self-Protection","authors":"Shih-Chang Hsia, Jyun-Jia Ciou, Sheng-Yueh Lai","doi":"10.1109/IIH-MSP.2013.34","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.34","url":null,"abstract":"In this paper, we propose a novel LED driver chip for multi-channels based on current mirrors. The driver can change the LED brightness with a pulse width modulation (PWM). The chip built a four-order temperature sensor for chip protection. The chip is implemented with TSMC 0.25 UM CMOS HIGH VOLTAGE MIXED SIGNAL BASED. Using 60V power MOS for two channels LED driver, this chip can drive 120W LED string for smart street lighting. The chip core occupied about 1215um x 900um silicon area. The driving efficiency can achieve up to near 90%.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129678090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Today world has witnessed the catastrophic consequences of natural and man-made disasters are demanding the urgent need for more research to advance fundamental knowledge and innovation for disaster prevention, mitigation and management. At the same time, the world is in the age of the Big Data revolution which holds the potential to mitigate the effects of disaster events by enabling access to critical real time information. Thus, in this paper an integrated framework for analyzing disaster events by using the Big Data analytics is proposed. The proposed framework shall address three key components to perform data organization, data integration and analysis, information presentation to users by utilizing Big Data with respect to disaster events. In doing so, the paper shall create a disaster domain-specific search engine using co-occurring theory and Markov chain concepts for preparing impacts of disaster attacks to make the society better aware of the situations. Specifically, stochastic clustering with constraints is used to automatically extract disaster events by defining the set of structural attributes. Some illustrative simulations are shown by using Big Data sources for the Great East Japan earthquake, tsunami and nuclear disaster events of 2011.
{"title":"An Integrated Framework for Disaster Event Analysis in Big Data Environments","authors":"P. Tin, Thi Thi Zin, T. Toriu, H. Hama","doi":"10.1109/IIH-MSP.2013.72","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.72","url":null,"abstract":"Today world has witnessed the catastrophic consequences of natural and man-made disasters are demanding the urgent need for more research to advance fundamental knowledge and innovation for disaster prevention, mitigation and management. At the same time, the world is in the age of the Big Data revolution which holds the potential to mitigate the effects of disaster events by enabling access to critical real time information. Thus, in this paper an integrated framework for analyzing disaster events by using the Big Data analytics is proposed. The proposed framework shall address three key components to perform data organization, data integration and analysis, information presentation to users by utilizing Big Data with respect to disaster events. In doing so, the paper shall create a disaster domain-specific search engine using co-occurring theory and Markov chain concepts for preparing impacts of disaster attacks to make the society better aware of the situations. Specifically, stochastic clustering with constraints is used to automatically extract disaster events by defining the set of structural attributes. Some illustrative simulations are shown by using Big Data sources for the Great East Japan earthquake, tsunami and nuclear disaster events of 2011.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130597516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents the design and implementation of a real-time 3D video capture and transfer system based on Microsoft Kinect. On the collecting layer, multiple views of texture images and depth images are acquired by 3 Kinect cameras, which are placed as a parallel array. Hole filling and noise filtering techniques are used to fill holes and smooth noise in depth image on the processing layer. On the coding layer, video stream is processed using stereo video coding or multi-view video plus depth coding methods to deal with the huge amounts of data, and then transported in network on the transport layer. At last, media stream is decoded at the decoder layer, and shown on the stereoscopic display. Experimental results show that the proposed system presented in this paper can be well effective to fill the holes and reduce the noise for depth image. Stereo video coding and multi-view video plus depth coding method are also included in this system. This system can be applied to 3D video conferences, 3D entertainment and 3D security monitoring, etc.
{"title":"Designing and Realization of 3D Video Capture and Transfer System Based on Kinect","authors":"Meng Yao, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.44","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.44","url":null,"abstract":"This paper presents the design and implementation of a real-time 3D video capture and transfer system based on Microsoft Kinect. On the collecting layer, multiple views of texture images and depth images are acquired by 3 Kinect cameras, which are placed as a parallel array. Hole filling and noise filtering techniques are used to fill holes and smooth noise in depth image on the processing layer. On the coding layer, video stream is processed using stereo video coding or multi-view video plus depth coding methods to deal with the huge amounts of data, and then transported in network on the transport layer. At last, media stream is decoded at the decoder layer, and shown on the stereoscopic display. Experimental results show that the proposed system presented in this paper can be well effective to fill the holes and reduce the noise for depth image. Stereo video coding and multi-view video plus depth coding method are also included in this system. This system can be applied to 3D video conferences, 3D entertainment and 3D security monitoring, etc.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131660200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.128
Jing-Ya Yan, Tzungher Chen, Chih-Hung Lin
This paper presents a new encryption scheme of high dynamic range (HDR) images. HDR images are more and more popular and network bandwidth is large enough to transmit large data, therefore, HDR images need to be properly protected, such as encryption. Here we use a new tool to achieve the purpose of encryption. The features of elementary cellular automata (ECA) that make us choose it as an encryption tool. ECA allows this encryption scheme be implemented easily and executed efficiently. The experimental results prove this encryption scheme sufficient security and doesn't need expensive computing resources.
{"title":"Encryption in High Dynamic Range Images for RGBE Format","authors":"Jing-Ya Yan, Tzungher Chen, Chih-Hung Lin","doi":"10.1109/IIH-MSP.2013.128","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.128","url":null,"abstract":"This paper presents a new encryption scheme of high dynamic range (HDR) images. HDR images are more and more popular and network bandwidth is large enough to transmit large data, therefore, HDR images need to be properly protected, such as encryption. Here we use a new tool to achieve the purpose of encryption. The features of elementary cellular automata (ECA) that make us choose it as an encryption tool. ECA allows this encryption scheme be implemented easily and executed efficiently. The experimental results prove this encryption scheme sufficient security and doesn't need expensive computing resources.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"59 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a benchmark consisting of 11 queries based on WFS standards formulated by OGC. The purpose of our study is to provide a reference standard, when the performance test is conducted on a geospatial web service platform which supports OGC WFS. This benchmark has the novel characteristic that it uses geospatial datasets and queries that are representative of WFS. We selected GeoServer as the WFS server, used Jmeter as a test tool and adopted the Texas data as test data set in order to carry out related experiments. Also included in the paper are benchmark results, which show the feasibility of our benchmark.
{"title":"Benchmark for Emergency Management Based on OGC WFS","authors":"Gang Liu, Pu Li, Y. Sha","doi":"10.1109/IIH-MSP.2013.94","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.94","url":null,"abstract":"This paper presents a benchmark consisting of 11 queries based on WFS standards formulated by OGC. The purpose of our study is to provide a reference standard, when the performance test is conducted on a geospatial web service platform which supports OGC WFS. This benchmark has the novel characteristic that it uses geospatial datasets and queries that are representative of WFS. We selected GeoServer as the WFS server, used Jmeter as a test tool and adopted the Texas data as test data set in order to carry out related experiments. Also included in the paper are benchmark results, which show the feasibility of our benchmark.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121356587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In a VoIP application, packet losses degrade speech quality. Especially, IP network under a large-scale disaster should cause severe packet losses. We have investigated the relationship between parameter loss and speech quality for G.729 codec. In this paper, we propose packet loss recovery method under severe packet loss condition, where the relationship was modeled by Support Vector Machine (SVM). Compared with the "repetition" method, the proposed method could improve speech quality. When we used both SVM and N-gram for concealing packet losses, we could obtain further improvement of speech quality.
{"title":"A Packet Loss Recovery of G.729 Speech Using Discriminative Model and N-Gram","authors":"Takeshi Nagano, A. Ito","doi":"10.1109/IIH-MSP.2013.75","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.75","url":null,"abstract":"In a VoIP application, packet losses degrade speech quality. Especially, IP network under a large-scale disaster should cause severe packet losses. We have investigated the relationship between parameter loss and speech quality for G.729 codec. In this paper, we propose packet loss recovery method under severe packet loss condition, where the relationship was modeled by Support Vector Machine (SVM). Compared with the \"repetition\" method, the proposed method could improve speech quality. When we used both SVM and N-gram for concealing packet losses, we could obtain further improvement of speech quality.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.125
Y. Hsieh, Chia-Sung Chang, Jau-Ji Shen
Digital watermarking technique is a common solution to image authentication and authorization. Numerous researches in this area use modification method to alter the pixel value or the coefficients of transform domain to succeed the watermarking purpose. In this paper, we propose a novel watermarking scheme using the concept of association rules to build a features classification tree and Chinese remainder theorem to embed the index of the tree instead of watermark's native values, and via the inverse process the watermark extraction is accomplished. Additionally, it has application ability to any watermarking techniques in the same principle of modification method. Our experimental results show not only the robustness against different image processing attacks, but also the enlargement of capacity to progressively accept the gray scale watermark.
{"title":"A New Robust Watermarking Scheme Based on Features Classification Tree","authors":"Y. Hsieh, Chia-Sung Chang, Jau-Ji Shen","doi":"10.1109/IIH-MSP.2013.125","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.125","url":null,"abstract":"Digital watermarking technique is a common solution to image authentication and authorization. Numerous researches in this area use modification method to alter the pixel value or the coefficients of transform domain to succeed the watermarking purpose. In this paper, we propose a novel watermarking scheme using the concept of association rules to build a features classification tree and Chinese remainder theorem to embed the index of the tree instead of watermark's native values, and via the inverse process the watermark extraction is accomplished. Additionally, it has application ability to any watermarking techniques in the same principle of modification method. Our experimental results show not only the robustness against different image processing attacks, but also the enlargement of capacity to progressively accept the gray scale watermark.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Head-related transfer functions (HRTFs) or its time-domain counterpart, head-related impulse responses (HRIRs) play a crucial role in 3-D audio rendering. The HRIRs with a couple of hundred-sample lengths result in the high computation cost for the real-time 3-D audio applications especially when multiple sound sources are rendered simultaneously. To overcome this problem, various modeling approaches have been reported to shorten HRIRs. In this research, an efficient finite-impulse-response (FIR) model is studied which is essentially based on the concept of the minimum-phase modeling technique. In this method, the measured HRIRs are represented by the interaural time delay (ITD) and the magnitude spectra that are approximated by two FIR filters. To investigate the accuracy dependence of this modeling approach on the order of FIR filter, two psychoacoustic listening experiments were conducted. In the examinations, two HRIR databases (MIT and CIPIC) are exploited and evaluated in terms of sound source localization and sound quality by comparing the synthesized stimuli with the measured HRIRs and those with the FIR models of different orders. Experimental results indicated that the measured hundred-sample-length HRIRs can be sufficiently modeled by the low-order (a dozen of coefficients) FIR model from the perceptual point of view, which represents an important reduction in the computational cost for implementing real-time 3-D audio applications.
{"title":"Head-Related Transfer Function Modeling Based on Finite-Impulse Response","authors":"Jian Zhang, Risheng Xia, Chundong Xu, Junfeng Li, Yonghong Yan, S. Sakamoto","doi":"10.1109/IIH-MSP.2013.87","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.87","url":null,"abstract":"Head-related transfer functions (HRTFs) or its time-domain counterpart, head-related impulse responses (HRIRs) play a crucial role in 3-D audio rendering. The HRIRs with a couple of hundred-sample lengths result in the high computation cost for the real-time 3-D audio applications especially when multiple sound sources are rendered simultaneously. To overcome this problem, various modeling approaches have been reported to shorten HRIRs. In this research, an efficient finite-impulse-response (FIR) model is studied which is essentially based on the concept of the minimum-phase modeling technique. In this method, the measured HRIRs are represented by the interaural time delay (ITD) and the magnitude spectra that are approximated by two FIR filters. To investigate the accuracy dependence of this modeling approach on the order of FIR filter, two psychoacoustic listening experiments were conducted. In the examinations, two HRIR databases (MIT and CIPIC) are exploited and evaluated in terms of sound source localization and sound quality by comparing the synthesized stimuli with the measured HRIRs and those with the FIR models of different orders. Experimental results indicated that the measured hundred-sample-length HRIRs can be sufficiently modeled by the low-order (a dozen of coefficients) FIR model from the perceptual point of view, which represents an important reduction in the computational cost for implementing real-time 3-D audio applications.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122957625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Along with the fast development of economy, the rational allocation of water resources has become one of the prerequisites which ensure the sustainable development of a country. Building a water quality surveillance and evaluation mechanism serving for managing regional water environment and addressing sudden contamination accident is of great importance. Based on the monitoring data on water quality, a multiple water quality monitoring system based on SVM is designed and accomplished. It established a corresponding water quality evaluation model by using the Gauss Radial Basis Function, and through offline studies of samples to guarantee the effectiveness and timeliness of this system. Besides the corresponding water quality classifying categories and instance interface are also figured out in the paper. This system has been successfully applied in the Central Line Project of South-to-North Water Diversion project, and according to the results the system is stable, effective and safety.
{"title":"Designing and Accomplishing a Multiple Water Quality Monitoring System Based on SVM","authors":"Zihan Pang, Ke-bin Jia","doi":"10.1109/IIH-MSP.2013.39","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.39","url":null,"abstract":"Along with the fast development of economy, the rational allocation of water resources has become one of the prerequisites which ensure the sustainable development of a country. Building a water quality surveillance and evaluation mechanism serving for managing regional water environment and addressing sudden contamination accident is of great importance. Based on the monitoring data on water quality, a multiple water quality monitoring system based on SVM is designed and accomplished. It established a corresponding water quality evaluation model by using the Gauss Radial Basis Function, and through offline studies of samples to guarantee the effectiveness and timeliness of this system. Besides the corresponding water quality classifying categories and instance interface are also figured out in the paper. This system has been successfully applied in the Central Line Project of South-to-North Water Diversion project, and according to the results the system is stable, effective and safety.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134321248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}