Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163124
Qiangfu Zhao, C. Hsieh
Nowadays, “cards” are becoming part of our lives. The cards enable us to obtain different kinds of services conveniently, but may also bring us economic loss if they are used illegally by some malicious third party. A common practice to solve the problem is to ask the user to provide some personal information possessed by the true card holder only. However, the personal information can be leaked if it is not managed properly. To protect the card users more effectively, this study proposes a generalized image morphing technique and a new method for card user authentication. The fundamental idea is to hide the face image of the card holder into some cover data through morphing, distribute the key information for restoring the face image into several different places, and restore the face image through de-morphing when the card is used. Brief analysis show that the proposed method is simple but secure, and can be very useful in different card-based services.
{"title":"Card user authentication based on generalized image morphing","authors":"Qiangfu Zhao, C. Hsieh","doi":"10.1109/ICAWST.2011.6163124","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163124","url":null,"abstract":"Nowadays, “cards” are becoming part of our lives. The cards enable us to obtain different kinds of services conveniently, but may also bring us economic loss if they are used illegally by some malicious third party. A common practice to solve the problem is to ask the user to provide some personal information possessed by the true card holder only. However, the personal information can be leaked if it is not managed properly. To protect the card users more effectively, this study proposes a generalized image morphing technique and a new method for card user authentication. The fundamental idea is to hide the face image of the card holder into some cover data through morphing, distribute the key information for restoring the face image into several different places, and restore the face image through de-morphing when the card is used. Brief analysis show that the proposed method is simple but secure, and can be very useful in different card-based services.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163159
Tatsuya Sato, K. Naruse
The dynamic plane covering by swarm robots is a problem to make a trajectory of move multiple robots in a given field so that the trajectory covers the field, which often appears in agricultural works such as water spraying. We solve the problem by applying the swarm robot concepts in the way that a single robot called a leader moves around in the field and all the other robots called followers try to catch up the leader. The advantage of this solution is that we only need to specify a trajectory of the leader and we expect the scalability of the number of the robots. On the other hand, we have to carefully design the trajectory of the leader and the connectivity network between the followers so that all the robots are always connected and under control. This paper presents the relation between the connectivity network, the control stability, and the covered field both analytically and numerically.
{"title":"Relation to connectivity and covered areain dynamic plan covering by swarm robots","authors":"Tatsuya Sato, K. Naruse","doi":"10.1109/ICAWST.2011.6163159","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163159","url":null,"abstract":"The dynamic plane covering by swarm robots is a problem to make a trajectory of move multiple robots in a given field so that the trajectory covers the field, which often appears in agricultural works such as water spraying. We solve the problem by applying the swarm robot concepts in the way that a single robot called a leader moves around in the field and all the other robots called followers try to catch up the leader. The advantage of this solution is that we only need to specify a trajectory of the leader and we expect the scalability of the number of the robots. On the other hand, we have to carefully design the trajectory of the leader and the connectivity network between the followers so that all the robots are always connected and under control. This paper presents the relation between the connectivity network, the control stability, and the covered field both analytically and numerically.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125472794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163113
Xiaoli Mi, Shijie Jia
In this paper, a novel compressed-domain watermarking approach based on motion velocity is proposed. Here the motion velocity is defined as the ration of motion vector and time interval of adjacent frames. An asymmetry watermark detecting algorithm is proposed, where input watermark is a two-value sequence and output watermark is a three-value sequence. The experiment result shows that this watermarking approach has great robustness, especially to video format transformation and bit rate change. This approach can apply to the copyright protection of digital video products in network environment.
{"title":"An asymmetric watermarking algorithm based on motion velocity","authors":"Xiaoli Mi, Shijie Jia","doi":"10.1109/ICAWST.2011.6163113","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163113","url":null,"abstract":"In this paper, a novel compressed-domain watermarking approach based on motion velocity is proposed. Here the motion velocity is defined as the ration of motion vector and time interval of adjacent frames. An asymmetry watermark detecting algorithm is proposed, where input watermark is a two-value sequence and output watermark is a three-value sequence. The experiment result shows that this watermarking approach has great robustness, especially to video format transformation and bit rate change. This approach can apply to the copyright protection of digital video products in network environment.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163098
Wei Cheng, Xuemin Li, Pengcheng Du
For the characters of the City of Kunming' trunk road, this paper proposed a model of one-way green wave coordination control based on fuzzy neural network, from the optimization of the cycle, offset and split of intersections. At last the simulation shows the proposed method can reduce the queue length and vehicle delay very well.
{"title":"Kunming city mainline one-way green wave coordinated control technology","authors":"Wei Cheng, Xuemin Li, Pengcheng Du","doi":"10.1109/ICAWST.2011.6163098","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163098","url":null,"abstract":"For the characters of the City of Kunming' trunk road, this paper proposed a model of one-way green wave coordination control based on fuzzy neural network, from the optimization of the cycle, offset and split of intersections. At last the simulation shows the proposed method can reduce the queue length and vehicle delay very well.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124265515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163154
Kiyota Hashimoto, K. Takeuchi
Various kinds of learner support systems have been proposed and employed, and their evaluation, whether it is at a developmental stage or at the employing stage, depends on learners, which is inevitable but which failure must be avoided as much as possible. For that purpose, it is desirable to employ a computer simulation, but the body of relevant knowledge, the model representing learning stages, and learner data are necessary. In this prototypical study, we propose a novel method to employ a multi-layered multi-agent simulation.
{"title":"Multi-layered learner knowledge model for evaluative multi-agent simulation","authors":"Kiyota Hashimoto, K. Takeuchi","doi":"10.1109/ICAWST.2011.6163154","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163154","url":null,"abstract":"Various kinds of learner support systems have been proposed and employed, and their evaluation, whether it is at a developmental stage or at the employing stage, depends on learners, which is inevitable but which failure must be avoided as much as possible. For that purpose, it is desirable to employ a computer simulation, but the body of relevant knowledge, the model representing learning stages, and learner data are necessary. In this prototypical study, we propose a novel method to employ a multi-layered multi-agent simulation.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163191
Xin Zhu, Wenxi Chen, T. Nemoto, K. Kitamura
We proposed an adaptive pulse template method for accurate detection of heart beat from pressure signals measured during sleep. 13 subjects' pressure and photoplethysmography signals were measured during sleep for evaluation. Compared with our previous heart beat detection method based on differential filtering, the adaptive pulse template method has a higher positive predictivity 94.46% and a satisfying sensitivity 94.08% for the detection of heart beat in the pulse waveform extracted from pressure signals. The accurate detection of heart beat can improve the estimation accuracy of pulse rate variability analysis.
{"title":"Adaptive pulse template method for accurate detection of heart beat from pressure signals measured during sleep","authors":"Xin Zhu, Wenxi Chen, T. Nemoto, K. Kitamura","doi":"10.1109/ICAWST.2011.6163191","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163191","url":null,"abstract":"We proposed an adaptive pulse template method for accurate detection of heart beat from pressure signals measured during sleep. 13 subjects' pressure and photoplethysmography signals were measured during sleep for evaluation. Compared with our previous heart beat detection method based on differential filtering, the adaptive pulse template method has a higher positive predictivity 94.46% and a satisfying sensitivity 94.08% for the detection of heart beat in the pulse waveform extracted from pressure signals. The accurate detection of heart beat can improve the estimation accuracy of pulse rate variability analysis.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128471092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163170
Jie Wang, Xiaoyun Zhang, Qinghua Gao, Hongyu Wang, Minglu Jin
This paper proposes an approach for tracking targets in wireless sensor networks without the need of equipping the target with a wireless device. Based on the shadowing effect caused by the target, we adopt the variation of the received signal strength measurements between the node pairs to build the observation likelihood function of the target, and utilize the particle filter framework to realize the target localization and tracking. Meanwhile, to make the localization method applicable for the computational and power resource limited wireless sensor networks, we propose a scheme to wake up a subset of nodes participating in the measuring and select a subset of outstanding wireless link measurements participating in the location estimation. Experimental results demonstrate the effectiveness of our approach.
{"title":"Device free localization with wireless sensor networks based on particle filter","authors":"Jie Wang, Xiaoyun Zhang, Qinghua Gao, Hongyu Wang, Minglu Jin","doi":"10.1109/ICAWST.2011.6163170","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163170","url":null,"abstract":"This paper proposes an approach for tracking targets in wireless sensor networks without the need of equipping the target with a wireless device. Based on the shadowing effect caused by the target, we adopt the variation of the received signal strength measurements between the node pairs to build the observation likelihood function of the target, and utilize the particle filter framework to realize the target localization and tracking. Meanwhile, to make the localization method applicable for the computational and power resource limited wireless sensor networks, we propose a scheme to wake up a subset of nodes participating in the measuring and select a subset of outstanding wireless link measurements participating in the location estimation. Experimental results demonstrate the effectiveness of our approach.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121422512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163126
Shuangwu Li, Jinqing Qi
In this paper, a new digital image stabilization (DIS) algorithm base on gray scale projection algorithm (PA) and representative point matching (RPM) is proposed to stabilize videos. First, the gray-projection algorithm is used to estimate the global motion vectors (GMV). Second, we choose a block from the center of image, and estimate the local motion vectors (LMV) by use of RPM algorithm. Finally, we combine the two groups of vectors and calculate the final global motion vectors. The experimental results show that the proposed algorithm is better than traditional gray scale projection algorithm in accuracy, especially for the video sequences which contained interior moved objects. The algorithm can achieve good stabilizing accuracy with processing speed of 24 fps for 240×320 video sequences, it can meet the real-time processing requirement.
{"title":"Image stabilization by combining gray-scale projection and representative point matching algorithms","authors":"Shuangwu Li, Jinqing Qi","doi":"10.1109/ICAWST.2011.6163126","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163126","url":null,"abstract":"In this paper, a new digital image stabilization (DIS) algorithm base on gray scale projection algorithm (PA) and representative point matching (RPM) is proposed to stabilize videos. First, the gray-projection algorithm is used to estimate the global motion vectors (GMV). Second, we choose a block from the center of image, and estimate the local motion vectors (LMV) by use of RPM algorithm. Finally, we combine the two groups of vectors and calculate the final global motion vectors. The experimental results show that the proposed algorithm is better than traditional gray scale projection algorithm in accuracy, especially for the video sequences which contained interior moved objects. The algorithm can achieve good stabilizing accuracy with processing speed of 24 fps for 240×320 video sequences, it can meet the real-time processing requirement.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131192891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163129
Qian Wang, Ju Liu, Jun Du, Ning Lv, Zhaochen Liu, Yujun Li
The permutation ambiguity is a critical issue for the convolutive blind speech separation in the frequency domain. To solve this problem, a novel three-stage approach is proposed in this paper. The method of choosing benchmark frequency bins is employed to ensure the performance of the second stage. Meanwhile, the correlation of the adjacent frequency bins is combined with the DOA method to bring out the best in each other. Experimental results in simulated and real environment verify the effectiveness and robustness of our method.
{"title":"A three-stage permutation approach for frequency-domain blind source separation","authors":"Qian Wang, Ju Liu, Jun Du, Ning Lv, Zhaochen Liu, Yujun Li","doi":"10.1109/ICAWST.2011.6163129","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163129","url":null,"abstract":"The permutation ambiguity is a critical issue for the convolutive blind speech separation in the frequency domain. To solve this problem, a novel three-stage approach is proposed in this paper. The method of choosing benchmark frequency bins is employed to ensure the performance of the second stage. Meanwhile, the correlation of the adjacent frequency bins is combined with the DOA method to bring out the best in each other. Experimental results in simulated and real environment verify the effectiveness and robustness of our method.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"584 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-01DOI: 10.1109/ICAWST.2011.6163165
Jun Zeng, S. Hirokawa
The existing search engines return the whole web pages as the search results, which make user spend extra time to read the useless information before finding the information they really want. We propose a novel search engine model called “Component Search Engine”, which can return the contents satisfying user's query rather than the whole pages. For achieving the purpose, we adopt a Tree-View interface to display the results. Through usability study, we determinate that Component Search Engine using Tree-View interface can improve user's searching experience and efficiency.
{"title":"Component search engine using tree-view interface for tourist blogs","authors":"Jun Zeng, S. Hirokawa","doi":"10.1109/ICAWST.2011.6163165","DOIUrl":"https://doi.org/10.1109/ICAWST.2011.6163165","url":null,"abstract":"The existing search engines return the whole web pages as the search results, which make user spend extra time to read the useless information before finding the information they really want. We propose a novel search engine model called “Component Search Engine”, which can return the contents satisfying user's query rather than the whole pages. For achieving the purpose, we adopt a Tree-View interface to display the results. Through usability study, we determinate that Component Search Engine using Tree-View interface can improve user's searching experience and efficiency.","PeriodicalId":126169,"journal":{"name":"2011 3rd International Conference on Awareness Science and Technology (iCAST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}