Search Results - "2005 5th International Conference on Information Communications & Signal Processing"

Refine Results
  1. 1

    Fall Incidents Detection for Intelligent Video Surveillance by Ji Tao, Mukherjee Turjo, Mun-Fei Wong, Mengdi Wang, Yap-Peng Tan

    “…We present in this paper an intelligent video surveillance system to detect human fall incidents for enhanced safety in indoor environments. The system…”
    Get full text
    Conference Proceeding
  2. 2

    Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras by Chai, D., Hock, F.

    “…In this paper, we propose a vision-based technique to locate and decode EAN-13 barcodes from images captured by digital cameras. The ultimate aim of our…”
    Get full text
    Conference Proceeding
  3. 3

    Modeling Virus Propagation in Peer-to-Peer Networks by Thommes, R.W., Coates, M.J.

    “…The popularity of peer-to-peer (P2P) networks makes them an attractive target to the creators of viruses and other malicious code. Indeed, recently a number of…”
    Get full text
    Conference Proceeding
  4. 4

    Airport Detection Base on Support Vector Machine from A Single Image by Yanyun Qu, Cuihua Li, Nanning Zheng

    “…Airport is one of the key transportation targets. Airport detection is very important in military and civil fields. A novel method to detect airports from a…”
    Get full text
    Conference Proceeding
  5. 5

    Novel Reversible `TSG' Gate and Its Application for Designing Components of Primitive Reversible/Quantum ALU by Thapliyal, H., Srinivas, M.B.

    “…In recent years, reversible logic has emerged as a promising computing paradigm having application in low power CMOS, quantum computing, nanotechnology, and…”
    Get full text
    Conference Proceeding
  6. 6

    An Objective Out-of-Focus Blur Measurement by Shiqian Wu, Weisi Lin, Lijun Jian, Wei Xiong, Lihao Chen

    “…This paper presents a new method for objective measurement of out-of-focus blur images. The essential idea is to derive the point spread function (PSF) of an…”
    Get full text
    Conference Proceeding
  7. 7

    A New Video Encryption Algorithm for H.264 by Yuan Li, Liwei Liang, Zhaopin Su, Jianguo Jiang

    “…H.264 is the new Video Encoding World Standard, how to guarantee its security is an urgent problem. In this paper a new video encryption algorithm for H.264 is…”
    Get full text
    Conference Proceeding
  8. 8

    Maximum MIMO Capacity in Line-of-Sight by Sarris, I., Nix, A.R.

    “…In this paper, we investigate the capacity limits of Multiple-input, multiple-output (MIMO) communication systems in line-of-sight (LoS) environments. Under…”
    Get full text
    Conference Proceeding
  9. 9

    Motion Detection with Adaptive Background and Dynamic Thresholds by Guo Jing, Rajan, D., Chng Eng Siong

    “…Human motion detection is a fundamental part for many computer vision tasks and various methods have been proposed. Background subtraction is a very popular…”
    Get full text
    Conference Proceeding
  10. 10

    Wireless Networks: Today and the Future by Chong, P., Ma Maode

    “…In recent years, the wireless LAN has evolved as an increasingly popular solution for providing wireless access to the Internet. The first part of the tutorial…”
    Get full text
    Conference Proceeding
  11. 11

    New Design Methods for Oversample Perfect Reconstruction Filter Banks by Zhiming Xu, Makur, A.

    “…This paper introduces design methods for over-sampled perfect reconstruction filter banks with real-valued coefficients. We deal with FIR filter banks in which…”
    Get full text
    Conference Proceeding
  12. 12

    IP-Oriented QoS in Next Generation Networks by Harris, R.

    “…This tutorial will provide an introduction to the concept of Quality of Service in IP-Oriented heterogeneous networks. The tutorial will begin by discussing…”
    Get full text
    Conference Proceeding
  13. 13

    A CMOS-based Multiple-Input Max/Mm Circuit by Keawconthai, S., Wangwiwattana, C., Chaikla, A.

    “…This paper presents a CMOS circuit technique for realization of the current-mode multiple-input max/min circuit. The maximum and minimum functions are…”
    Get full text
    Conference Proceeding
  14. 14

    High Efficiency and Contrast Enhanced Haiftoning with Hybrid Ordered Dithering and Error Diffusion Model by Jing-Ming Guo, Chih-Yu Lin

    “…A high efficiency and contrast enhanced halftoning is presented in this paper. The contrast of digital image highly depends on the nature of the ambient…”
    Get full text
    Conference Proceeding
  15. 15

    Iterative (`Turbo') Algorithms on Factor Graphs: Theory and Applications by Biglieri, E.

    “…Originally developed for decoding turbo codes, normal factor graphs are a natural setting for the description of iterative techniques for detecting coded…”
    Get full text
    Conference Proceeding
  16. 16

    Derivative State Constrained Optimal H2Integral Servo Controller with a Prescribed Degree of Stability by Komine, N., Benjanarasuth, T., Ngamwiwit, J.

    “…In this paper, the derivative state constrained optimal H 2 integral servo controller is presented based on the optimal H 2 control problem with a prescribed…”
    Get full text
    Conference Proceeding
  17. 17

    High Performance RF Integrated Circuits using the Silicon Based RE Integrated Passive Device (RFIPD) by Choong-Mo Nam, In-Ho Jung

    “…In this paper, we introduce the high performance RF circuits using the RF integrated passive device (RFIPD). RFIPD is made by a low-cost manufacturing…”
    Get full text
    Conference Proceeding
  18. 18

    Watermarking, Data Hiding and Image Forensic by Kot, A.

    “…With the advances in digital technology, manufacturing costs of digital camera, multimedia hand phone and PDA are dropping and digital broadcasting is becoming…”
    Get full text
    Conference Proceeding
  19. 19

    Using SMAC Agent Securely in Heterogonous Database Systems by Ahmed, T.M.

    “…Mobile agent technology has several used in distributed system applications. Unfortunately, this technology is not full utilized for security problems. One of…”
    Get full text
    Conference Proceeding
  20. 20

    Receivers for Coded Signals: A Unified View Based on Factor Graph by Biglieri, E.

    “…Normal factor graphs are a graphical representation of the factorization of a function of several variables into a product of functions of a lower number of…”
    Get full text
    Conference Proceeding