Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073361
Yiou Sun, Jingwen Xie, Junhai Guo, Haifang Wang, Yang Zhao
This paper presents a new target tracking method. The presented method which named marginalized cubature Kalman filter is based on standard cubature Kalman filter and marginalized moment estimator. The marginalized moment estimator uses sigma-points sampling and Guass-Hermite integration to estimate the mean and covariance. The proposed algorithm which is called MCKF in short, uses marginalized moment estimator to calculate the state's mean and covariance in the CKF framework and gets a better accuracy and keep the covariance matrix being positive definite. Simulation indicates the presented algorithm's feasibility and improved performance.
{"title":"A novel CKF method for target tracking","authors":"Yiou Sun, Jingwen Xie, Junhai Guo, Haifang Wang, Yang Zhao","doi":"10.1109/ICCWAMTIP.2014.7073361","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073361","url":null,"abstract":"This paper presents a new target tracking method. The presented method which named marginalized cubature Kalman filter is based on standard cubature Kalman filter and marginalized moment estimator. The marginalized moment estimator uses sigma-points sampling and Guass-Hermite integration to estimate the mean and covariance. The proposed algorithm which is called MCKF in short, uses marginalized moment estimator to calculate the state's mean and covariance in the CKF framework and gets a better accuracy and keep the covariance matrix being positive definite. Simulation indicates the presented algorithm's feasibility and improved performance.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"1149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124713496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073383
Xiaolong Tang, Zhongyu Tao, Panshi Tang, Jian-Pin Li
Pulse-Coupled Neural Network is known as third generation artificial neural network. It is created by visual cortex neurons, a synchronous pulse release phenomenon of mammals. Compare to traditional artificial neural network, PCNN has the characteristics of dynamic neural network, integrated space-time, automatic propagation and synchronous pulse release. PCNN has tendency for image retention information and edge detection.
{"title":"Edge detection method based on PCNN","authors":"Xiaolong Tang, Zhongyu Tao, Panshi Tang, Jian-Pin Li","doi":"10.1109/ICCWAMTIP.2014.7073383","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073383","url":null,"abstract":"Pulse-Coupled Neural Network is known as third generation artificial neural network. It is created by visual cortex neurons, a synchronous pulse release phenomenon of mammals. Compare to traditional artificial neural network, PCNN has the characteristics of dynamic neural network, integrated space-time, automatic propagation and synchronous pulse release. PCNN has tendency for image retention information and edge detection.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131487609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073435
Nadir Mustafa, Jian-ping Li, K. Kumar, Saeed Ahmed Khan, Mohammed Khalil, Giess Mohaned
Medical Imaging is currently a hot area of biomedical engineers, researchers and medical doctors as it is extensively used in diagnosing of human health and by health care institutes. The imaging equipment is the device, which is used for better image processing and highlighting the important features. These images are affected with random noise during acquisition, analyzing and transmission process. This results in blurry image visible in low contrast. The Image De-noising System (IDs) is used as a tool for removing image noise and preserving important data. Image de-noising is one of the most interesting research areas among researchers of technology-giants and academic institutions. For Criminal Identification Systems (CIS) & Magnetic Resonance Imaging (MRI), IDs is more beneficial in the field of medical imaging. This paper proposes algorithm for de-noising medical images using different types of wavelet transform, such as Haar, Daubechies, Symlets and Biorthogonal. In this paper noise image quality has been evaluated using filter assessment parameters like Variance, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). It has been observed form the numerical results that, the performance of proposed algorithm reduced the mean square error and achieved best value of peak signal to noise ratio (PSNR). In this paper, the wavelet based de-noising algorithm has been investigated on medical images along with threshold.
{"title":"Medical image De-noising schemes using wavelet transform with fixed form thresholding","authors":"Nadir Mustafa, Jian-ping Li, K. Kumar, Saeed Ahmed Khan, Mohammed Khalil, Giess Mohaned","doi":"10.1109/ICCWAMTIP.2014.7073435","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073435","url":null,"abstract":"Medical Imaging is currently a hot area of biomedical engineers, researchers and medical doctors as it is extensively used in diagnosing of human health and by health care institutes. The imaging equipment is the device, which is used for better image processing and highlighting the important features. These images are affected with random noise during acquisition, analyzing and transmission process. This results in blurry image visible in low contrast. The Image De-noising System (IDs) is used as a tool for removing image noise and preserving important data. Image de-noising is one of the most interesting research areas among researchers of technology-giants and academic institutions. For Criminal Identification Systems (CIS) & Magnetic Resonance Imaging (MRI), IDs is more beneficial in the field of medical imaging. This paper proposes algorithm for de-noising medical images using different types of wavelet transform, such as Haar, Daubechies, Symlets and Biorthogonal. In this paper noise image quality has been evaluated using filter assessment parameters like Variance, Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). It has been observed form the numerical results that, the performance of proposed algorithm reduced the mean square error and achieved best value of peak signal to noise ratio (PSNR). In this paper, the wavelet based de-noising algorithm has been investigated on medical images along with threshold.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073373
Jianzhang Chen, Jianping Li, Jie Lin, Yuanyuan Huang
In this paper, we utilize negacyclic codes to construct a family of optimal subsystem codes with parameters [[q2+1,(q-1)2, 4, q-1]]q> where q = 1(mod4), q = pτ, τ ≥ 1 and p is an odd prime. These constructed quantum subsystem codes are different from those codes available in the literature.
{"title":"Quantum subsystem codes drived from negacyclic codes","authors":"Jianzhang Chen, Jianping Li, Jie Lin, Yuanyuan Huang","doi":"10.1109/ICCWAMTIP.2014.7073373","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073373","url":null,"abstract":"In this paper, we utilize negacyclic codes to construct a family of optimal subsystem codes with parameters [[q<sup>2</sup>+1,(q-1)<sup>2</sup>, 4, q-1]]<sub>q</sub>> where q = 1(mod4), q = p<sup>τ</sup>, τ ≥ 1 and p is an odd prime. These constructed quantum subsystem codes are different from those codes available in the literature.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073451
Ping Kuang, Wei-Na Cao, Zhi-gang Liu
The design uses AT89C51 series of high-speed microcontroller as the main control module, using a simple peripheral circuit to drive the 32 * 16 dot matrix LED display. It consists of microcontroller, gating circuit, row and column driver circuit, display circuit. The design uses parallel transmission and dynamic scanning technology. Using the principle of LED display, this article elaborates LED dynamic display, as well as hardware design, software design.
{"title":"Design of dynamic screen system based on MCU","authors":"Ping Kuang, Wei-Na Cao, Zhi-gang Liu","doi":"10.1109/ICCWAMTIP.2014.7073451","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073451","url":null,"abstract":"The design uses AT89C51 series of high-speed microcontroller as the main control module, using a simple peripheral circuit to drive the 32 * 16 dot matrix LED display. It consists of microcontroller, gating circuit, row and column driver circuit, display circuit. The design uses parallel transmission and dynamic scanning technology. Using the principle of LED display, this article elaborates LED dynamic display, as well as hardware design, software design.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114921035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073398
Lei Chen, Ji-Feng Huang
After analyzing the motion area of flame blocks and fluctuations of flame pixels in complex scenes video, this paper detects motion area by using blocks in spatial consecutive video frames. For the color information of the flame block, motion area is analyzed by the second order color moments in HSV color space, and then it extracts the suspected flame color motion area. For each pixel of the block area, this paper chooses spatial continuous images to do wavelet analysis and extracts pixels which meet the flame fluctuation rules as the flame pixels. Use local weighted operator to filter out non-flame discrete pixels, make the adjacent flame pixels area form connected areas and give an alarm. Experimental results show that this method can detect the video flame area taken by ordinary video cameras quickly and give an alarm, meanwhile, it also has a better robustness.
{"title":"Flame detected in video based on color moments","authors":"Lei Chen, Ji-Feng Huang","doi":"10.1109/ICCWAMTIP.2014.7073398","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073398","url":null,"abstract":"After analyzing the motion area of flame blocks and fluctuations of flame pixels in complex scenes video, this paper detects motion area by using blocks in spatial consecutive video frames. For the color information of the flame block, motion area is analyzed by the second order color moments in HSV color space, and then it extracts the suspected flame color motion area. For each pixel of the block area, this paper chooses spatial continuous images to do wavelet analysis and extracts pixels which meet the flame fluctuation rules as the flame pixels. Use local weighted operator to filter out non-flame discrete pixels, make the adjacent flame pixels area form connected areas and give an alarm. Experimental results show that this method can detect the video flame area taken by ordinary video cameras quickly and give an alarm, meanwhile, it also has a better robustness.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123221005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073401
Yuxiao Guo, Leiting Chen, Tao Wu, Xin Li, Yue Cao
Ambient occlusion is an illumination simulation approach used in ray tracing for decades. However, huge consume of multiple sample times, for a high re-solution, in ambient occlusion restricts its development. We propose an algorithm decreasing the sample times with adjacent pixels shared information in sampling process. By introducing this nova approach, we get a big improvement when comparing to previous methods.
{"title":"A shared pixel ambient occlusion method in ray tracing","authors":"Yuxiao Guo, Leiting Chen, Tao Wu, Xin Li, Yue Cao","doi":"10.1109/ICCWAMTIP.2014.7073401","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073401","url":null,"abstract":"Ambient occlusion is an illumination simulation approach used in ray tracing for decades. However, huge consume of multiple sample times, for a high re-solution, in ambient occlusion restricts its development. We propose an algorithm decreasing the sample times with adjacent pixels shared information in sampling process. By introducing this nova approach, we get a big improvement when comparing to previous methods.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115166576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073422
Liu Minmin
The time synchronization among simulation federates could be realized through logical time by traditional time management of distributed simulation. There are two types popular time management of distributed simulation based on logical time, conservative time advance mechanism and optimistic time advance mechanism. Conservative time advance mechanism restricted the causal relationship between simulation federates and might lead to poor simulation efficiency and deadlock while the difficulty in rollback might exist in optimistic time advance mechanism. Based on the vector time, an optimistic time managing mechanism was put forward, the updating algorithm of vector time was introduced and the rollback control based on vector time was researched. The application in intelligent detection simulation system of carrier rockets demonstrated that in the environment of small number federates, the algorithm could control rollback storm effectively and would show high efficiency and reliability.
{"title":"Research on time management method based on vector time","authors":"Liu Minmin","doi":"10.1109/ICCWAMTIP.2014.7073422","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073422","url":null,"abstract":"The time synchronization among simulation federates could be realized through logical time by traditional time management of distributed simulation. There are two types popular time management of distributed simulation based on logical time, conservative time advance mechanism and optimistic time advance mechanism. Conservative time advance mechanism restricted the causal relationship between simulation federates and might lead to poor simulation efficiency and deadlock while the difficulty in rollback might exist in optimistic time advance mechanism. Based on the vector time, an optimistic time managing mechanism was put forward, the updating algorithm of vector time was introduced and the rollback control based on vector time was researched. The application in intelligent detection simulation system of carrier rockets demonstrated that in the environment of small number federates, the algorithm could control rollback storm effectively and would show high efficiency and reliability.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"531 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124513275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073445
Huan Zeng, Yan Ren, Qing-xian Wang, Neng-Qiang He, Xu-Yang Ding
The popularity and widely use of cellphone have greatly stimulated the spread of the apps. Meanwhile, security issues are increasing quickly, particularly for Android based devices. In this paper, through analyzing the android permissions system and android API system, we want to find out the relationship between permissions and APIs. Furthermore, we propose an approach to detect message intercepting malware. The contribution of this paper is threefold: first, we perform static analysis on the app to extract permissions and system APIs. In order to avoid permissions and APIs over declaration, we build java function call graph and find the system APIs been used; secondly, we proposed a light weight method to dynamic find out and update the relationship between permissions and APIs; third, we proposed a dynamic controlled method to detect android malwares. This proposed method is verified by extensive experiments.
{"title":"Detecting malware and evaluating risk of app using Android permission-API system","authors":"Huan Zeng, Yan Ren, Qing-xian Wang, Neng-Qiang He, Xu-Yang Ding","doi":"10.1109/ICCWAMTIP.2014.7073445","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073445","url":null,"abstract":"The popularity and widely use of cellphone have greatly stimulated the spread of the apps. Meanwhile, security issues are increasing quickly, particularly for Android based devices. In this paper, through analyzing the android permissions system and android API system, we want to find out the relationship between permissions and APIs. Furthermore, we propose an approach to detect message intercepting malware. The contribution of this paper is threefold: first, we perform static analysis on the app to extract permissions and system APIs. In order to avoid permissions and APIs over declaration, we build java function call graph and find the system APIs been used; secondly, we proposed a light weight method to dynamic find out and update the relationship between permissions and APIs; third, we proposed a dynamic controlled method to detect android malwares. This proposed method is verified by extensive experiments.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130345423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-01DOI: 10.1109/ICCWAMTIP.2014.7073350
Yuan Li, Jim X. Chen
Grammar induction has received a lot of attention from researchers in the past decades because of its practical and theoretical impact on data compression, pattern discovery and computation theory. There are a bunch of grammar induction algorithms for a given sequence are introduced. Most existing work on learning grammar for a given sequence is based on deterministic approach. Such deterministic approaches used by grammar induction algorithms can be categorized as greedy heuristics. In addition, there are many grammars, which can be learned from a given sequence. The smallest grammar problem is defined by some researchers to evaluate different grammars learned from a given sequence by different algorithms. Such problem is proved as NP-hard. In this work, we introduce a nondeterministic approach to address grammar induction for a given sequence based on genetic algorithm. We demonstrate that our grammar induction algorithm can effectively identify smaller grammar than a well-known grammar induction algorithm. Experimental results, which are presented, illustrate that our approach and algorithm are feasible to resolve difficult problems such as identifying patterns of DNA sequence.
{"title":"A nondeterministic approach to infer context free grammar from sequence","authors":"Yuan Li, Jim X. Chen","doi":"10.1109/ICCWAMTIP.2014.7073350","DOIUrl":"https://doi.org/10.1109/ICCWAMTIP.2014.7073350","url":null,"abstract":"Grammar induction has received a lot of attention from researchers in the past decades because of its practical and theoretical impact on data compression, pattern discovery and computation theory. There are a bunch of grammar induction algorithms for a given sequence are introduced. Most existing work on learning grammar for a given sequence is based on deterministic approach. Such deterministic approaches used by grammar induction algorithms can be categorized as greedy heuristics. In addition, there are many grammars, which can be learned from a given sequence. The smallest grammar problem is defined by some researchers to evaluate different grammars learned from a given sequence by different algorithms. Such problem is proved as NP-hard. In this work, we introduce a nondeterministic approach to address grammar induction for a given sequence based on genetic algorithm. We demonstrate that our grammar induction algorithm can effectively identify smaller grammar than a well-known grammar induction algorithm. Experimental results, which are presented, illustrate that our approach and algorithm are feasible to resolve difficult problems such as identifying patterns of DNA sequence.","PeriodicalId":211273,"journal":{"name":"2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116404796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}