Because new multicasting applications on the Internet are numerous, the demands of multicast traffic will continue growing. Currently, the CICQ with N2 VOQs for unicast flow and k MQs for multicast flow is the major architecture to support mixed traffic. In this study, we propose a switch called multicast virtual output queues and partially buffered crossbar switch (MQ-PBD) to support mix traffic. The number of CB in MQ-PBC switch is much less than traditional CICQ switch and a three phase (request-grant-accept) matching algorithm is adopted to solve the contentions. We also proposed two selecting scheme, MURR and MF, for input schedulers. The experimental results showed that the proposed MQ-PBC switch can achieve well performance and efficiently support the mix traffic.
{"title":"Design of Partially Buffered Crossbar Switches for Supporting Mixed Traffic","authors":"Wen-Fong Wang, Li-Chuan Hung, Ching-Sung Lu","doi":"10.1109/IIH-MSP.2013.28","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.28","url":null,"abstract":"Because new multicasting applications on the Internet are numerous, the demands of multicast traffic will continue growing. Currently, the CICQ with N2 VOQs for unicast flow and k MQs for multicast flow is the major architecture to support mixed traffic. In this study, we propose a switch called multicast virtual output queues and partially buffered crossbar switch (MQ-PBD) to support mix traffic. The number of CB in MQ-PBC switch is much less than traditional CICQ switch and a three phase (request-grant-accept) matching algorithm is adopted to solve the contentions. We also proposed two selecting scheme, MURR and MF, for input schedulers. The experimental results showed that the proposed MQ-PBC switch can achieve well performance and efficiently support the mix traffic.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133171689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a novel feature extraction algorithm based on nearest feature line and compressive sensing is proposed. The prototype samples are transformed to compressive sensing domain and then are performed Neighborhood discriminant nearest feature line analysis (NDNFLA) in the proposed algorithm. This method can reduce the computational complexity for feature extraction using nearest feature line. At the same time.its average recognition rate is very close to that of NDNFLA. The proposed algorithm is applied to image classification on AR face Database. The experimental results demonstrate the effectiveness of the proposed algorithm.
{"title":"Feature Extraction Based on Nearest Feature Line and Compressive Sensing","authors":"Lijun Yan, Jeng-Shyang Pan, Xiaorui Zhu","doi":"10.1109/IIH-MSP.2013.95","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.95","url":null,"abstract":"In this paper, a novel feature extraction algorithm based on nearest feature line and compressive sensing is proposed. The prototype samples are transformed to compressive sensing domain and then are performed Neighborhood discriminant nearest feature line analysis (NDNFLA) in the proposed algorithm. This method can reduce the computational complexity for feature extraction using nearest feature line. At the same time.its average recognition rate is very close to that of NDNFLA. The proposed algorithm is applied to image classification on AR face Database. The experimental results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133477335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.162
J. Zhang, Kei Wei Xie
Streaming media technology just appears to solute the question that multimedia transport on narrowband. Streaming media has the advantage of playing with transporting and small size, so it can be stored easily and has normal playing effect in diversified network transport cases. Especially when the playing time is long, the superiority is embodied satisfying. So the courseware made with the system has preferable playing effect on network through applying streaming media in this courseware making system. XML has 4 characters of Well Storage format, extensibility, well-formed structure and be fit for transport on network, so it becomes new Web language. In recent year, XML is applied in e-commerce, distance education and so on. SMIL is the criteria put forward by W3C and it is the applying of XML. SMIL has the advantages of realizing the concurrency and the precise positioning of multimedia, editing easily, supporting the hyperlink, and economizing network bandwidth.
{"title":"Development and Application of Streaming Media Courseware Based on XML","authors":"J. Zhang, Kei Wei Xie","doi":"10.1109/IIH-MSP.2013.162","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.162","url":null,"abstract":"Streaming media technology just appears to solute the question that multimedia transport on narrowband. Streaming media has the advantage of playing with transporting and small size, so it can be stored easily and has normal playing effect in diversified network transport cases. Especially when the playing time is long, the superiority is embodied satisfying. So the courseware made with the system has preferable playing effect on network through applying streaming media in this courseware making system. XML has 4 characters of Well Storage format, extensibility, well-formed structure and be fit for transport on network, so it becomes new Web language. In recent year, XML is applied in e-commerce, distance education and so on. SMIL is the criteria put forward by W3C and it is the applying of XML. SMIL has the advantages of realizing the concurrency and the precise positioning of multimedia, editing easily, supporting the hyperlink, and economizing network bandwidth.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117187153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel modeling approach and a computerized analysis were introduced to perform analysis for MMIC FET's, aiming at understanding the heat conduction process of the MMICs and providing thermal information for MMIC design. Experiments show the efficiency and effectiveness of the proposed method. The computer's result accuracy can be achieved as 85 percents.
{"title":"Thermal Analysis of Power MMICs Based on Computerization","authors":"Cun Zhang, Zhe-ming Lu, Faxin Yu","doi":"10.1109/IIH-MSP.2013.18","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.18","url":null,"abstract":"A novel modeling approach and a computerized analysis were introduced to perform analysis for MMIC FET's, aiming at understanding the heat conduction process of the MMICs and providing thermal information for MMIC design. Experiments show the efficiency and effectiveness of the proposed method. The computer's result accuracy can be achieved as 85 percents.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117288068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Human physiological and psychological changes could be acquired by biofeedback instruments and self-report questionnaire. People are likely to generate various physiological and psychological changes when situating distinct lighting. For this reason, this study aims to discuss the effects of environments with different light sources, such as reading, practical training, working, and sleeping, on human heart rate variability. It is expected to inspect the effects of commercial light sources on human body through the measurement and experiment and further find out the suitable light sources in various environments.
{"title":"The Investigation on Physiological Influences and the Working Efficiencies of Several Lighting in Market","authors":"Chien-Yue Chen, Ming-Da Ke, J. Wu, Pei-Jung Wu","doi":"10.1109/IIH-MSP.2013.33","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.33","url":null,"abstract":"Human physiological and psychological changes could be acquired by biofeedback instruments and self-report questionnaire. People are likely to generate various physiological and psychological changes when situating distinct lighting. For this reason, this study aims to discuss the effects of environments with different light sources, such as reading, practical training, working, and sleeping, on human heart rate variability. It is expected to inspect the effects of commercial light sources on human body through the measurement and experiment and further find out the suitable light sources in various environments.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital image processing technology presents new challenges for the security of the image information, which makes image authentication as a problem to be addressed. Digital watermarking plays an important role in multimedia information security. This paper proposed a dual watermarking method to do tamper location and self-recovery, which utilizes self-embedding technology to hide eigenface into the low frequence sub band LL to restore the tamper region. Experimental results show the availability of the proposed algorithm.
{"title":"Dual Watermarking for Image Tamper Detection and Self-Recovery","authors":"Q. Han, Lei Han, Erfu Wang, Jie Yang","doi":"10.1109/IIH-MSP.2013.17","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.17","url":null,"abstract":"Digital image processing technology presents new challenges for the security of the image information, which makes image authentication as a problem to be addressed. Digital watermarking plays an important role in multimedia information security. This paper proposed a dual watermarking method to do tamper location and self-recovery, which utilizes self-embedding technology to hide eigenface into the low frequence sub band LL to restore the tamper region. Experimental results show the availability of the proposed algorithm.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123536364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A novel watermarking scheme is proposed for up-sampling based multiple description coding frame in this paper. Secret information is embedded in the DWT image. Up-sampling algorithm is applied on transformed image to introduce some redundancy between different channels. Good performance of the new frame to against noise and to resist the compression attacks is shown in the experimental results.
{"title":"Novel Up-Sampling Based Watermarking Multiple Description Coding Frame","authors":"Lin-Lin Tang, Jeng-Shyang Pan","doi":"10.1109/IIH-MSP.2013.20","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.20","url":null,"abstract":"A novel watermarking scheme is proposed for up-sampling based multiple description coding frame in this paper. Secret information is embedded in the DWT image. Up-sampling algorithm is applied on transformed image to introduce some redundancy between different channels. Good performance of the new frame to against noise and to resist the compression attacks is shown in the experimental results.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123651583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.126
Chin-Feng Lee, Chinchen Chang, Cheng-You Gao
This paper is a two staged multi-layer reversible data hiding scheme based on Lagrange interpolation. Lagrange interpolation will cross applied on odd and even pixels to produce predicted images, and then histogram shifting modification will be applied to embed confidential data into the differences between predicted and original images. The experimental results show the quality of Lena image from this scheme has a PSNR value of 66.88dB and a embedding capacity of 0.1bpp, for one level. For 10 levels, the embedding capacity is 2.17 bpp and the scheme can still maintain a high PSNR value of 45dB, which means this algorithm is more efficient than the algorithms from Ni et al. and Tai et al, for both quality and embedding capacity.
{"title":"A Two-Staged Multi-level Reversible Data Hiding Exploiting Lagrange Interpolation","authors":"Chin-Feng Lee, Chinchen Chang, Cheng-You Gao","doi":"10.1109/IIH-MSP.2013.126","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.126","url":null,"abstract":"This paper is a two staged multi-layer reversible data hiding scheme based on Lagrange interpolation. Lagrange interpolation will cross applied on odd and even pixels to produce predicted images, and then histogram shifting modification will be applied to embed confidential data into the differences between predicted and original images. The experimental results show the quality of Lena image from this scheme has a PSNR value of 66.88dB and a embedding capacity of 0.1bpp, for one level. For 10 levels, the embedding capacity is 2.17 bpp and the scheme can still maintain a high PSNR value of 45dB, which means this algorithm is more efficient than the algorithms from Ni et al. and Tai et al, for both quality and embedding capacity.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121051019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.166
Jieru Liu, Caiyun Ding, Quanbing Yao
As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development, such as requirement management scheme, test management scheme, system design and evaluation scheme, system release scheme, documentation management scheme, etc. The present UPM system achieves great improvements by establishing quality improvement model based on CMMI3 in many aspects, such as clear IT roles and responsibilities, planned release, establishment of requirements management scheme and document management scheme, etc. And also the system improves stability and process quality and eventually wins high customer satisfaction. This article mainly describes the quality improvement practices of the UPM system based on CMMI3.
{"title":"The Quality Improvement on UPM System in the Nuclear Power Corporation","authors":"Jieru Liu, Caiyun Ding, Quanbing Yao","doi":"10.1109/IIH-MSP.2013.166","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.166","url":null,"abstract":"As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development, such as requirement management scheme, test management scheme, system design and evaluation scheme, system release scheme, documentation management scheme, etc. The present UPM system achieves great improvements by establishing quality improvement model based on CMMI3 in many aspects, such as clear IT roles and responsibilities, planned release, establishment of requirements management scheme and document management scheme, etc. And also the system improves stability and process quality and eventually wins high customer satisfaction. This article mainly describes the quality improvement practices of the UPM system based on CMMI3.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-16DOI: 10.1109/IIH-MSP.2013.100
Yan-yan Han, Yixiao Shang, Wen-cai He
Considering the combination of digital watermarking technique and visual cryptography, this paper proposes a new dual watermarking algorithm of color image. The first watermark is embedded into the high-frequency part of discrete wavelet transform (DWT). Using visual cryptography, we process the second watermark to generate two shares, then one of them is embedded into the low-frequency part of DWT and another is protected by the copyright. The experimental results show that this kind of new algorithm has high security. In addition, the embedding capacity of watermarks and robustness are improved effectively.
{"title":"DWT-Domain Dual Watermarking Algorithm of Color Image Based on Visual Cryptography","authors":"Yan-yan Han, Yixiao Shang, Wen-cai He","doi":"10.1109/IIH-MSP.2013.100","DOIUrl":"https://doi.org/10.1109/IIH-MSP.2013.100","url":null,"abstract":"Considering the combination of digital watermarking technique and visual cryptography, this paper proposes a new dual watermarking algorithm of color image. The first watermark is embedded into the high-frequency part of discrete wavelet transform (DWT). Using visual cryptography, we process the second watermark to generate two shares, then one of them is embedded into the low-frequency part of DWT and another is protected by the copyright. The experimental results show that this kind of new algorithm has high security. In addition, the embedding capacity of watermarks and robustness are improved effectively.","PeriodicalId":105427,"journal":{"name":"2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124116944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}