In this paper, we proposed an object tracking method for video stream based on conventional particle filter. Feature vectors are extracted from coefficient matrices of Discrete Cosine Transform (DCT). The feature, as experiment showed, is very robust to occlusion and rotation and it is not sensitive to scale changes. The proposed method is efficient enough to be used in a real-time application. The experiment is carried out on some common used datasets in literature. The result is satisfied and showed the estimated trace follows the target object very closely.
{"title":"Tracking Object Using Particle Filter and DCT Features","authors":"Cong Lin, Chi-Man Pun","doi":"10.2991/CSE.2013.39","DOIUrl":"https://doi.org/10.2991/CSE.2013.39","url":null,"abstract":"In this paper, we proposed an object tracking method for video stream based on conventional particle filter. Feature vectors are extracted from coefficient matrices of Discrete Cosine Transform (DCT). The feature, as experiment showed, is very robust to occlusion and rotation and it is not sensitive to scale changes. The proposed method is efficient enough to be used in a real-time application. The experiment is carried out on some common used datasets in literature. The result is satisfied and showed the estimated trace follows the target object very closely.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"1 1","pages":"169-171"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In reviewing of the generalization of wireless technology in the variously relative information and communication technology (ICT) industries, this research systematically explore the potential determinants of the fourth generation (4G) technology to cross-analyze the drivers of the smart-commerce (S-commerce) era forthcoming through the comprehensive measurements of the hierarchical analytical network process (ANP) resulted from the multiple criteria decision making (MCDM) methodology by gathering of the Taiwanese ICT market surveyed data. The most contribution is that "the 4G technology probably trigger the Smartcommerce (S-commerce) era coming. (4GPYTSEC)" that means the S-commerce is still the developed mainstream in the variously relative ICT industries according to the some restricted factors, such as technological development limitation, government political prohibition, users' operational restrains.
{"title":"Does 4G Technology Trigger the S-commerce Era Coming Evidence from Taiwanese ICT Market","authors":"Ming-Yuan Hsieh, Chih-Cheng Huang, Kuang-Yu Huang, Hsiu-Wei Hsu","doi":"10.2991/CSE.2013.71","DOIUrl":"https://doi.org/10.2991/CSE.2013.71","url":null,"abstract":"In reviewing of the generalization of wireless technology in the variously relative information and communication technology (ICT) industries, this research systematically explore the potential determinants of the fourth generation (4G) technology to cross-analyze the drivers of the smart-commerce (S-commerce) era forthcoming through the comprehensive measurements of the hierarchical analytical network process (ANP) resulted from the multiple criteria decision making (MCDM) methodology by gathering of the Taiwanese ICT market surveyed data. The most contribution is that \"the 4G technology probably trigger the Smartcommerce (S-commerce) era coming. (4GPYTSEC)\" that means the S-commerce is still the developed mainstream in the variously relative ICT industries according to the some restricted factors, such as technological development limitation, government political prohibition, users' operational restrains.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"23 1","pages":"321-324"},"PeriodicalIF":0.0,"publicationDate":"2013-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-23DOI: 10.1007/978-3-642-24043-0_69
J. Jaiswal, P. M. Khilar
{"title":"Energy Efficient and Fault Tolerant GPSR in Ad Hoc Wireless Network","authors":"J. Jaiswal, P. M. Khilar","doi":"10.1007/978-3-642-24043-0_69","DOIUrl":"https://doi.org/10.1007/978-3-642-24043-0_69","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"26 1","pages":"683-692"},"PeriodicalIF":0.0,"publicationDate":"2011-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-09-23DOI: 10.1007/978-3-642-24043-0_44
S. Potti, S. Pothiraj
{"title":"GPGPU Implementation of Parallel Memetic Algorithm for VLSI Floorplanning Problem","authors":"S. Potti, S. Pothiraj","doi":"10.1007/978-3-642-24043-0_44","DOIUrl":"https://doi.org/10.1007/978-3-642-24043-0_44","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"10 1","pages":"432-441"},"PeriodicalIF":0.0,"publicationDate":"2011-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91397088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Chinese-American Sign Language Translation","authors":"Xiaomei Zhang, Shiquan Dai, Hui Wang","doi":"10.1109/CSE.2011.99","DOIUrl":"https://doi.org/10.1109/CSE.2011.99","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"108 1","pages":"555-558"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78739464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Study for Dynamic Model of Gait","authors":"Xuejun Li, Meng Zhang, Lingxia Zhang","doi":"10.1109/CSE.2011.98","DOIUrl":"https://doi.org/10.1109/CSE.2011.98","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"41 1","pages":"551-554"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87380860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Articulatory Speech Synthesis: A Survey","authors":"Qinsheng Du, Jian Zhao, Lirong Wang, L. Shi","doi":"10.1109/CSE.2011.95","DOIUrl":"https://doi.org/10.1109/CSE.2011.95","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"10 1","pages":"539-542"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85262869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Shi, Zhiyong An, Jian Zhao, Lirong Wang, Qinsheng Du
{"title":"The 3D Face Feature Extraction and Driving Method on Pronunciation Rehabilitation for Impaired Hearing","authors":"L. Shi, Zhiyong An, Jian Zhao, Lirong Wang, Qinsheng Du","doi":"10.1109/CSE.2011.97","DOIUrl":"https://doi.org/10.1109/CSE.2011.97","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"1 1","pages":"547-550"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75947173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keynote Speech: Jie Wu - Volume 2","authors":"Jie Wu","doi":"10.1109/CSE.2009.582","DOIUrl":"https://doi.org/10.1109/CSE.2009.582","url":null,"abstract":"","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"84 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91395216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Remote attestation presented in TCG specification is one of the significant ways to establish trust between the two endpoints. There are two categories of remote attestation: anonymous identity attestation of TPM and the security properties attestation of trust computing platform, and the verifier can verify both at the far endpoint. In order to simplify the attestations, we propose the hybrid attestation called APA(anonymous property attestation) from the elliptic curve cryptography and bilinear map. The scheme is provable security under the LRSW assumption, the hardness of discrete logarithms. The lengths of the attestation signature in our scheme are much shorter than directly associated two attestations, and also takes the less computation cost.
{"title":"An Anonymous Property-Based Attestation Protocol from Bilinear Maps","authors":"Qin Yu, Feng Dengguo, Xu Zhen","doi":"10.1109/CSE.2009.84","DOIUrl":"https://doi.org/10.1109/CSE.2009.84","url":null,"abstract":"Remote attestation presented in TCG specification is one of the significant ways to establish trust between the two endpoints. There are two categories of remote attestation: anonymous identity attestation of TPM and the security properties attestation of trust computing platform, and the verifier can verify both at the far endpoint. In order to simplify the attestations, we propose the hybrid attestation called APA(anonymous property attestation) from the elliptic curve cryptography and bilinear map. The scheme is provable security under the LRSW assumption, the hardness of discrete logarithms. The lengths of the attestation signature in our scheme are much shorter than directly associated two attestations, and also takes the less computation cost.","PeriodicalId":6838,"journal":{"name":"2021 IEEE 24th International Conference on Computational Science and Engineering (CSE)","volume":"59 1","pages":"732-738"},"PeriodicalIF":0.0,"publicationDate":"2009-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73541700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}