Abolhasan, M & Wright, A 2008, 'Survey of the potential of emerging wireless technologies to improve telecommunication services in remote Australian settlements', RANGELAND JOURNAL, vol. 30, no. 1, pp. 157-165.
View/Download from: Publisher's site
View description>>
Providing efficient yet cost effective telecommunication systems to Aboriginal people living in remote locations has proven to be a challenging task. This is primarily due to low population density and distance from major service centres. Extending high-capacity telecommunications infrastructure to these people would incur high costs of installation, maintenance and administration without significant financial returns. The cost of services such as cabled phone lines to all houses, satellite and wireless cellular networks are often unaffordable for people in remote settlements, and, as a result, the provision of telecommunication services is often subsidised by the government. New wireless standards and products are being developed which could provide broadband-type network connections to large areas at an affordable price. This paper describes these new standards and products and their potential applications in rural and remote regions. There is also a comparison of their transmission requirements, cost, performance and coverage with several currently available technologies.
Bian Wu, Chang-hong Liang, Qi Li & Pei-yuan Qin 2008, 'Novel Dual-Band Filter Incorporating Defected SIR and Microstrip SIR', IEEE Microwave and Wireless Components Letters, vol. 18, no. 6, pp. 392-394.
View/Download from: Publisher's site
He, X, Wu, Q, Jia, W & Hintz, T 2008, 'Edge Detection on Hexagonal Structure', Journal of Algorithms & Computational Technology, vol. 2, no. 1, pp. 61-78.
View/Download from: Publisher's site
View description>>
Gradient-based edge detection is a straightforward method to identify the edge points in the original grey-level image. It is intuitive that in the human vision system the edge points always appear where the grey-level value is greatly changed. Spiral Architecture is a relatively new image data structure that is inspired from anatomical considerations of the primate's vision. In Spiral Architecture, each image is represented as a collection of hexagonal pixels. Edge detection on Spiral Architecture has features of fast computation and accurate localization. In this paper, we present and compare gradient-based edge detection algorithms on Spiral Architecture. The experimental results show that the edge detection on Spiral Architecture outperforms that on traditional square image structure.
Janapsatya, J, Esselle, KP & Bird, TS 2008, 'A dual‐band and wideband planar inverted‐F antenna for WLAN applications', Microwave and Optical Technology Letters, vol. 50, no. 1, pp. 138-141.
View/Download from: Publisher's site
View description>>
AbstractA dual‐band planar inverted‐F antenna (PIFA), presented here, covers both 2.4‐ and 5‐GHz bands used in all IEEE 802.11 WLAN standards. Computed and measured return loss and radiation patterns of the antenna are presented and are in reasonable agreement. Experimental results indicate a very wide 32.5% operational bandwidth in the 5‐GHz band. © 2007 Wiley Periodicals, Inc. Microwave Opt Technol Lett 50: 138–141, 2008; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/mop.23016
Kaynak, O, Braun, R & Kennedy, I 2008, 'Guest Editorial Plagiarism', IEEE Transactions on Education, vol. 51, no. 2, pp. 149-151.
View/Download from: Publisher's site
Kegen Yu & Guo, YJ 2008, 'Improved Positioning Algorithms for Nonline-of-Sight Environments', IEEE Transactions on Vehicular Technology, vol. 57, no. 4, pp. 2342-2353.
View/Download from: Publisher's site
View description>>
Nonline-of-sight (NLOS) conditions pose a major challenge to radio positioning. In this paper, a constrained-optimization-based location algorithm is proposed to jointly estimate the unknown location and bias by using the sequential quadratic programming (SQP) algorithm. This method does not rely on any prior statistics information, and simulation results show that the proposed method considerably outperforms existing methods. To reduce the complexity of the SQP-based algorithm, we further propose a Taylor-series expansion-based linear quadratic programming (TS-LQP) algorithm. It is demonstrated that the computational complexity of the TS-LQP algorithm is only a fraction of that of the SQP algorithm, whereas the accuracy loss is limited. Also, maximum-likelihood (ML) algorithms that are suited for different NLOS error statistics are developed under several circumstances when there are different levels of a priori information. The analytical performance of the ML estimation (MLE) is investigated. Moreover, analytical expressions to approximate the variance of the MLE with and without model parameter mismatches are derived. Simulation results show that the approximate variance can be used as a better accuracy measure than the Cramer-Rao lower bound (CRLB). © 2008 IEEE.
Lai, X, Li, Q, Qin, P-Y, Wu, B & Liang, C-H 2008, 'A NOVEL WIDEBAND BANDPASS FILTER BASED ON COMPLEMENTARY SPLIT-RING RESONATOR', Progress In Electromagnetics Research C, vol. 1, pp. 177-184.
View/Download from: Publisher's site
Min Liu, Zhongcheng Li, Xiaobing Guo & Dutkiewicz, E 2008, 'Performance Analysis and Optimization of Handoff Algorithms in Heterogeneous Wireless Networks', IEEE Transactions on Mobile Computing, vol. 7, no. 7, pp. 846-857.
View/Download from: Publisher's site
View description>>
The convergence of heterogeneous wireless access technologies with diverse levels of performance has been envisioned to characterize the next-generation wireless networks. In heterogeneous wireless networks, handoff can be separated into two parts: horizontal handoff (HHO) and vertical handoff (VHO). VHO plays an important role in fulfilling seamless data transfer when mobile nodes cross wireless access networks with different link layer technologies. Current VHO algorithms mainly focus on when to trigger VHO to improve connection QoS but neglect the problem of how one can synthetically consider all currently available networks (homogeneous or heterogeneous) and choose the optimal network for HHO or VHO from all available candidates. In this paper, we present an analytical framework to evaluate VHO algorithms. This framework can be used to provide guidelines for the optimization of handoff in heterogeneous wireless networks. Subsequently, we extend the traditional hysteresis-based and dwelling-timer-based algorithms to support both VHO and HHO decisions and apply them to complex heterogeneous wireless environments. We refer to these enhanced algorithms as E-HY and E-DW, respectively. Based on the proposed analytical model, we provide a formalization definition of the handoff conditions in E-HY and E-DW and analyze their performance. Subsequently, we propose a novel general handoff decision algorithm GHO to trigger HHO and VHO in heterogeneous wireless networks at the appropriate time. Analysis shows that GHO can achieve better performance than E-HY and E-DW. Simulations validate the analytical results and verify that GHO outperforms traditional algorithms in terms of the matching ratio, TCP throughput, and UDP throughput. © 2006 IEEE.
Novak, A, Taylor, P & Veitch, D 2008, 'Corrigendum to “The distribution of the number of arrivals in a subinterval of a busy period of a single server queue”', Queueing Systems, vol. 59, pp. 87-93.
Novak, A, Taylor, P & Veitch, D 2008, 'Corrigendum to “The distribution of the number of arrivals in a subinterval of a busy period of a single server queue”', Queueing Systems, vol. 59, no. 2, pp. 87-93.
View/Download from: Publisher's site
Paisitkriangkrai, S, Chunhua Shen & Jian Zhang 2008, 'Fast Pedestrian Detection Using a Cascade of Boosted Covariance Features', IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 8, pp. 1140-1151.
View/Download from: Publisher's site
View description>>
Efficiently and accurately detecting pedestrians plays a very important role in many computer vision applications such as video surveillance and smart cars. In order to find the right feature for this task, we first present a comprehensive experimental s
Paisitkriangkrai, S, Shen, C & Zhang, J 2008, 'Performance evaluation of local features in human classification and detection', IET Computer Vision, vol. 2, no. 4, pp. 236-236.
View/Download from: Publisher's site
View description>>
Detecting pedestrians accurately is the first fundamental step for many computer vision applications such as video surveillance, smart vehicles, intersection traffic analysis and so on. The authors present an experimental study on pedestrian detection us
Qin, P-Y, Liang, C-H, Wu, B & Su, T 2008, 'Novel Dual-Mode Bandpass Filter with Transmission Zeros using Substrate Integrated Waveguide Cavity', Journal of Electromagnetic Waves and Applications, vol. 22, no. 5-6, pp. 723-730.
View/Download from: Publisher's site
Qumer, A & Henderson-Sellers, B 2008, 'A framework to support the evaluation, adoption and improvement of agile methods in practice', JOURNAL OF SYSTEMS AND SOFTWARE, vol. 81, no. 11, pp. 1899-1919.
View/Download from: Publisher's site
View description>>
Agile methods are often seen as providing ways to avoid overheads typically perceived as being imposed by traditional software development environments. However, few organizations are psychologically or technically able to take on an agile approach rapidly and effectively. Here, we describe a number of approaches to assist in such a transition. The Agile Software Solution Framework (ASSF) provides an overall context for the exploration of agile methods, knowledge and governance and contains an Agile Toolkit for quantifying part of the agile process. These link to the business aspects of software development so that the business value and agile process are well aligned. Finally, we describe how these theories are applied in practice with two industry case studies using the Agile Adoption and Improvement Model (AAIM). © 2008 Elsevier Inc. All rights reserved.
Qumer, A & Henderson-Sellers, B 2008, 'An evaluation of the degree of agility in six agile methods and its applicability for method engineering', INFORMATION AND SOFTWARE TECHNOLOGY, vol. 50, no. 4, pp. 280-295.
View/Download from: Publisher's site
View description>>
While agile methods are in use in industry, little research has been undertaken into what is meant by agility and how a supposed agile method can be evaluated with regard to its veracity to belong to this category of software development methodological approaches. Here, an analytical framework, called 4-DAT, is developed and applied to six well-known agile methods and, for comparison, two traditional methods. The results indicate the degree of agility to be found in each method, from which a judgement can be made as to whether the appellation of 'agile' to that method is appropriate. This information is shown to be useful, for example, when constructing a methodology from method fragments (method engineering) and when comparing agile and traditional methods. © 2007 Elsevier B.V. All rights reserved.
Ridoux, J & Veitch, D 2008, 'The cost of variability', 2008 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, pp. 29-32.
View/Download from: Publisher's site
SUN, Y 2008, 'Research of Extensions to RSVP for Mobile IPv6 Networks', Journal of Software, vol. 19, no. 7, pp. 1731-1742.
View/Download from: Publisher's site
View description>>
Aiming at the features of wireless mobile communication, this paper proposes a new resource reservation scheme, Fast RSVP, to guarantee the QoS of sessions for Mobile IPv6. The scheme adopts cross-layer design, it cooperates two modules at different layers: mobile IP module and RSVP module. By adding some primitives, the scheme let the two modules work together to guarantee the QoS of sessions for mobile users. Fast RSVP imports a series of new mechanisms such as advanced resource reservation on neighbor tunnels, resource reservation on optimized routes, resource reservation for handover sessions, path merge etc. Simulation results show that Fast RSVP scheme, compared with other traditional RSVP extensions for mobile environments, has the following advantages: (1) it realizes a mobile node handover with QoS guarantees; (2) it avoids resource wasting caused by triangular routes and duplicate reservations in Mobile IP handover process; (3) it distinguishes different types of reservation requests, greatly reducing the handover session forced termination rate while maintaining high performance of the network.
Wang, H, He, X, Hintz, T & Wu, Q 2008, 'Fractal Image Compression on Hexagonal Structure', Journal of Algorithms & Computational Technology, vol. 2, no. 1, pp. 79-98.
View/Download from: Publisher's site
View description>>
Fractal image compression (FIC) is a relatively recent image compression method. Its basic idea is to represent images as a fixed point of a contractive Iterated Function System (IFS). Spiral Architecture (SA) is a novel hexagonal image structure on which images are displayed as a collection of hexagonal pixels. The efficiency and accuracy of image processing on SA have been demonstrated in many recently published papers. In this paper, two presentations of SA on the traditional display device will be discussed. Then we will review the current research work on fractal image compression based on SA using both presentations. The FIC performance on SA will be compared with it on the traditional square structure in terms of compression ratio and PSNR. In the experimental results, higher PSNR values can be achieved at various compression ratios for all test images. The preliminary research on this direction has shown a promising future of applying FIC on SA to further improve the compression performance.
Weily, AR, Bird, TS & Guo, YJ 2008, 'A Reconfigurable High-Gain Partially Reflecting Surface Antenna', IEEE Transactions on Antennas and Propagation, vol. 56, no. 11, pp. 3382-3390.
View/Download from: Publisher's site
View description>>
A high-gain partially reflective surface (PRS) antenna with a reconfigurable operating frequency is presented. The operating frequency is electronically tuned by incorporating an array of phase agile reflection cells on a thin substrate above the ground plane of the resonator antenna, where the reflection phase of each cell is controlled by the bias voltage applied to a pair of varactor diodes. The new configuration enables continuous tuning of the antenna from 5.2 GHz to 5.95 GHz using commercially available varactor diodes, thus covering frequencies typically used for WLAN applications. Both the PRS and phase agile cell are analyzed, and theoretical and measured results for gain, tuning range, and radiation patterns of the reconfigurable antenna are described. The effect of the varactor diode series resistance on the performance of the antenna is also reported. © 2008 IEEE.
Wu, B, Liang, C-H, Qin, P-Y & Li, Q 2008, 'Compact Dual-Band Filter Using Defected Stepped Impedance Resonator', IEEE Microwave and Wireless Components Letters, vol. 18, no. 10, pp. 674-676.
View/Download from: Publisher's site
Wu, B, Qin, P, Li, Q & Liang, C 2008, 'Trisection cross‐coupled filter with symmetrical response using split‐ring resonator DGS', Microwave and Optical Technology Letters, vol. 50, no. 7, pp. 1774-1776.
View/Download from: Publisher's site
View description>>
AbstractIn this article, a novel trisection cross‐coupled filter with symmetrical response by using split‐ring resonator defected ground structure (SRR DGS) is presented. The SRR DGS is loaded at the bottom of a two‐pole microstrip SRR filter, then a compact trisection cross‐coupled filter with a pair of transmission zeros is obtained. A practical filter which has a center frequency of 1.4 GHz and a relative bandwidth of 14% is successfully designed and fabricated. © 2008 Wiley Periodicals, Inc. Microwave Opt Technol Lett 50: 1774–1776, 2008; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/mop.23529
Xiangjian He, Wenjing Jia & Qiang Wu 2008, 'An approach of canny edge detection with virtual hexagonal image structure', 2008 10th International Conference on Control, Automation, Robotics and Vision, vol. 3, no. 1, pp. 133-143.
View/Download from: Publisher's site
View description>>
Gradient-based edge detection is a straightforward method to identify the edge points in the original grey-level image. It is intuitive that in the human vision system the edge points always appear where the grey-level value is greatly changed. Spiral Architecture is a relatively new image data structure that is inspired from anatomical considerations of the primate's vision. In Spiral Architecture, each image is represented as a collection of hexagonal pixels. Edge detection on Spiral Architecture has features of fast computation and accurate localization. In this paper, we present and compare gradient-based edge detection algorithms on Spiral Architecture. The experimental results show that the edge detection on Spiral Architecture outperforms that on traditional square image structure.
Xu, M, Xu, C, Duan, L, Jin, JS & Luo, S 2008, 'Audio keywords generation for sports video analysis', ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 4, no. 2, pp. 1-23.
View/Download from: Publisher's site
View description>>
Sports video has attracted a global viewership. Research effort in this area has been focused on semantic event detection in sports video to facilitate accessing and browsing. Most of the event detection methods in sports video are based on visual features. However, being a significant component of sports video, audio may also play an important role in semantic event detection. In this paper, we have borrowed the concept of the “keyword” from the text mining domain to define a set of specific audio sounds. These specific audio sounds refer to a set of game-specific sounds with strong relationships to the actions of players, referees, commentators, and audience, which are the reference points for interesting sports events. Unlike low-level features, audio keywords can be considered as a mid-level representation, able to facilitate high-level analysis from the semantic concept point of view. Audio keywords are created from low-level audio features with learning by support vector machines. With the help of video shots, the created audio keywords can be used to detect semantic events in sports video by Hidden Markov Model (HMM) learning. Experiments on creating audio keywords and, subsequently, event detection based on audio keywords have been very encouraging. Based on the experimental results, we believe that the audio keyword is an effective representation that is able to achieve satisfying results for event detection in sports video. Application in three sports types demonstrates the practicality of the proposed method.
Abolhasan, M, Hagelstein, B, Wang, JC-P, Franklin, DR, Safaei, F & Wysocki, T 1970, 'Development and performance evaluation of a flexible, low cost MANET', 2008 2nd International Conference on Signal Processing and Communication Systems, 2008 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008), IEEE, Gold coast, Australia, pp. 1-6.
View/Download from: Publisher's site
View description>>
Performance evaluations of multi-hop ad hoc network routing protocols have been primarily conducted through analytic and simulation-based studies, which frequently fail to accurately predict real-world performance and behaviour. One reason for this is the challenge in developing low cost, representative test beds with the degree of flexibility and mobility required. We have developed a portable wireless ad hoc node (PWAN) device which establishes multi-hop routes using the OLSR routing protocol. The PWAN's performance has been investigated using two test bed configurations to evaluate its capacity under conditions of high node density in a short-range, multi-hop environment. Our results illustrate that such networks are capable of providing high quality connections when traffic density is low. However, the network link quality deteriorates dramatically as the traffic level increases, and the network topology becomes unstable until the traffic level is reduced.
Abolhasan, M, Hagelstein, B, Wang, JC-P, Franklin, DR, Safaei, F & Wysocki, T 1970, 'Development and Performance Evaluation of a Flexible, Low Cost MANET', ICSPCS: 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, PROCEEDINGS, 2nd International Conference on Signal Processing and Communication Systems, IEEE, Gold Coast, AUSTRALIA, pp. 107-112.
Ahmad, MR, Dutkiewicz, E & Huang, X 1970, 'MAC Protocol for Cooperative MIMO Transmissions in Asynchronous Wireless Sensor Networks', 2008 International Symposium on Communications and Information Technologies, 2008 International Symposium on Communications and Information Technologies (ISCIT), IEEE, pp. 580-585.
View/Download from: Publisher's site
View description>>
Cooperative MIMO schemes can reduce both transmission energy and latency in distributed wireless sensor networks (WSNs). In this paper we develop a new Cooperative low power listening (LPL) Medium Access Control (MAC) protocol for two cooperative MIMO schemes: Optimal Beamforming (BF) and Spatial Multiplexing (SM). We develop analytical models for the total energy consumption and packet latency for both schemes and analyse the proposed MAC protocol in term of the total energy consumption and packet latency with imperfect synchronisation due to clock jitter. The impact of the clock jitter, the check interval and the number of cooperative nodes on the total energy consumption and latency are investigated. We observe that the Cooperative LPL MAC with Optimal BF is the most promising configuration and it is optimal when then number of co-operating nodes M=2 and jitter difference is below 0.6Tb. © 2008 IEEE.
Ahmad, MR, Dutkiewicz, E & Huang, X 1970, 'MAC Protocol for Cooperative MIMO Transmissions in Asynchronous Wireless Sensor Networks', 2008 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, International Symposium on Communication and Information Technologies, IEEE, Vientiane, LAOS, pp. 579-+.
Ahmad, MR, Dutkiewicz, E & Huang, X 1970, 'Performance evaluation of MAC protocols for cooperative MIMO transmissions in sensor networks', Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, MSWiM '08: The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, ACM, Vancouver, CANADA, pp. 54-62.
View/Download from: Publisher's site
Ahmad, MR, Dutkiewicz, E & Xiaojing 1970, 'Performance analysis of MAC protocol for cooperative MIMO transmissions in WSN', 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE, Cannes, FRANCE, pp. 1929-+.
View/Download from: Publisher's site
Arya, V, Duffield, NG & Veitch, D 1970, 'Temporal Delay Tomography', 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications, 27th IEEE International Conference on Computer Communications (INFOCOM 2008), IEEE, IEEE.
View/Download from: Publisher's site
Braun, R & Chiang, F 1970, 'A Distributed Active Information Model Enabling Distributed Autonomics in Complex Electronic Enviornments', 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, IEEE, pp. 473-479.
View/Download from: Publisher's site
View description>>
Information modeling plays a central role in managing complexity of the distributed electronic systems. This paper proposes a nature-inspired distributed active information model (DAIM) to enable the local decision-making process, that will fundamentally contribute to a number of complex distributed electronic environments. The consequences from multiple distributed decision-makers give rise to the global goals exhibited by emergent properties. Details of the DAIM model are described in this paper. The validation for this model is also be given via the experimental tests in the discrete event simulator. Performance comparisons show the DAIM model outperforms the conventional information model. © 2008 IEEE.
Chaczko, Z, Klempous, R, Nikodem, J & Szymanski, J 1970, 'Applications of Cooperative WSN in Homecare Systems', 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, IEEE, Pretoria, Gauteng, South Africa, pp. 215-220.
View/Download from: Publisher's site
View description>>
Cooperation plays the crucial role in shared space of the homecare processes. It is a rather hard task to ensure effective cooperation in home care environment. This is due to variability of schedules, tasks and mobility of both patients and carers. In this paper, we discuss sensor network technology that can facilitate and improve home care cooperation scenarios. We present methodology, recommendations and applications for incorporating a WSN based solution in various areas of Homecare. We argue that even the most difficult areas of cooperation between patients and their carers such as: information retrieval, information dissemination, scheduling, coordination of short and long-term treatment can be supported by WSN based solutions. Finally, we discuss sensor network design approaches for incorporating smart communication devices and sensors to support health care workers and their patients in their daily activities. The network of smart sensors can help to maintain awareness of the activities of all stakeholders and the need to integrate communication and computer technology with the requirements of effective aged care infrastructure.
Chaczko, Z, Mahadevan, V & Nikodem, J 1970, 'A Bio-inspired Telecollaboration Service Taxonomy: Usability Related Concerns', 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, 2008 Third International Conference on Broadband Communications, Information Technology & Biomedical Applications, IEEE, Pretoria, Gauteng, South Africa, pp. 209-214.
View/Download from: Publisher's site
View description>>
As the Internet is transforming the global information economy, the Telecollaboration (TC) system services are moving at a transitional pace dictated by market forces. However, the pace is turning out to be a lot slower than expected. This has prompted us now to approximate and synthesize the design concepts of building a scalable biomimetic system manager for a telecollaboration service taxonomy. Thus, it is expected that if there is more correlation across the design concepts of the system manager, the greater will be the likelihood of demonstrating a rescue-like operation for humans in this new taxonomy. The main goal of this paper is initially to over view the bio-swarm behaviours of insect colonies to embrace a notional computing architecture that enables an individual TC service entity. It is important that these behaviours along with the proposed self-x autonomic functions offered by the system manager need to be pursued, and indeed continue, in a highly correlated way to fulfil the opportunistic functional tasks related to the discovery and delivery of Telecollaboration services. In this context next, we attempt to study the significant usability benefits of qualitative and quantitative execution pressures related to the implementation of these functions. This includes a better understanding of the constraints of implementation of these functions to deal with complex usability performance baselines. Finally, we give an updated foresight of process deployment strategies through a group of highly diverse and autonomous objects called Teleholons whilst exploiting the role of these self-x autonomic functions.
Chan, A, Chaczko, Z, Chiu, C & Zielinski, R 1970, 'File Compression Using Typogenetic Computation.', BroadCom, International Conference of Broadband Communication, Information Technology and Biomedical Applications, IEEE Computer Society, Pretoria, Gauteng, South Africa, pp. 202-208.
View/Download from: Publisher's site
View description>>
Typogenetic algorithms are a break from classical approaches to computation. Based on gene expression and intercellular processes, typo-genetic computation can offer a new approach to the algorithmic problems of system security, data compression and encryption. The method has a potential of much higher compression ratios at the limited computational costs i.e. processing time. This paper presents a formal system based on typogenetics for the purposes of compression. Lossless data compression is an important part of computer science. While the ability to reduce consumption of hard disk space or transmission bandwidth through statistical redundancy has served well in the past, the explosive growth in high quality media content (*.mp3, *.mpg) on the internet in the past few years have highlighted the limitations of traditional statistical techniques for compression.
Chen, Y, Hong, Q, Chen, X & Zhang, C 1970, 'Real-Time Speaker Verification Based on GMM-UBM for PDA', 2008 Fifth IEEE International Symposium on Embedded Computing, 2008 Fifth IEEE International Symposium on Embedded Computing (SEC), IEEE.
View/Download from: Publisher's site
Chen, Y, Wu, Q & He, X 1970, 'Human Action Recognition by Radon Transform', 2008 IEEE International Conference on Data Mining Workshops, 2008 IEEE International Conference on Data Mining Workshops (ICDMW), IEEE, Pisa, Italy, pp. 862-868.
View/Download from: Publisher's site
View description>>
A new feature description is used for human behaviour representation and recognition. The feature is based on Radon transforms of extracted silhouettes. Key postures are selected based on the Radon transform. Key postures are combined to construct an action template for each sequence. Linear Discriminant Analysis (LDA) is applied to the set of key postures to obtain low dimensional feature vectors. Different classification methods are used to classify each sequence. Experiments are carried out based on a publically available human behaviour database and the results are exciting. © 2008 IEEE.
Chen, Y, Wu, Q & He, X 1970, 'Motion Based Pedestrian Recognition', 2008 Congress on Image and Signal Processing, 2008 Congress on Image and Signal Processing, IEEE, Sanya, China, pp. 376-380.
View/Download from: Publisher's site
View description>>
This paper proposed a method for discriminating pedestrians from rigid objects in a video. The method is a motion-based recognition of moving objects. This method is motivated by the assumptions that human beings are non-rigid and their movements are periodic. Moving objects and their skeletons are extracted. The motion cue is determined by the angle formed by the centroid point and the two bottom end points at object's skeleton. The histogram of the cue over a time period is used to determine if the object is pedestrian or not. This cue does not require any pre-built models. Neither does it need Fourier Transform to obtain the cycle of the objects. The proposed method is computation inexpensive, and it can be used for real-time video surveillance. ©2008 IEEE.
Chen, Y, Wu, Q & He, X 1970, 'Using dynamic programming to match human behavior sequences', 2008 10th International Conference on Control, Automation, Robotics and Vision, 2008 10th International Conference on Control, Automation, Robotics and Vision (ICARCV), IEEE, Hanoi, Vietnam, pp. 1498-1503.
View/Download from: Publisher's site
View description>>
This paper proposed a new approach for recognition and matching the human behavior sequence. Each human behavior sequence is represented by its key postures to greatly reduce the computation time. Normalization is applied to all the behavior sequences key postures for matching. A dynamic time warping (DTW) algorithm is used to perform the alignment of two time series. Experiments are carried out on an open human behavior database and exciting results have been obtained. © 2008 IEEE.
Chen, Y, Wu, Q, He, X, Du, C & Yang, J 1970, 'Extracting key postures in a human action video sequence', 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 IEEE 10th Workshop on Multimedia Signal Processing (MMSP), IEEE, Cairns, Queensland, Australia, pp. 569-573.
View/Download from: Publisher's site
View description>>
Human key posture extraction from videos will benefit video storage, video retrieval, human action recognition, human behaviour understanding and so on. This paper presents an approach to select key postures from human action sequences using 2D information. There are two steps in the proposed method. Information measurement which is a kind of global feature of a frame is used to roughly find key posture candidates. Then, a body skeleton feature which is a kind of local feature is applied to select final key postures from the candidates obtained in the first step. The experiments show that the proposed method is efficient. © 2008 IEEE.
Chen, Y, Wu, Q, He, X, Du, C & Yang, T 1970, 'Extracting Key Postures in a Human Action Video Sequence', 2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, 10th IEEE Workshop on Multimedia Signal Processing, IEEE, Cairns, AUSTRALIA, pp. 573-+.
Chunhua Du, Qiang Wu, Jie Yang & Zheng Wu 1970, 'SVM based ASM for facial landmarks location', 2008 8th IEEE International Conference on Computer and Information Technology, 2008 8th IEEE International Conference on Computer and Information Technology (CIT), IEEE, Sydney, Australia, pp. 321-326.
View/Download from: Publisher's site
View description>>
Finding a new position for each landmark is a crucial step in active shape model (ASM). Mahalanobis distance minimization is used for this finding, provided there are enough training data such that the grey-level profiles for each landmark follow a multivariate Gaussian distribution. However, this condition could not be satisfied in most cases. In this paper, a new method support vector machine (SVM) based ASM (SVMBASM) is proposed. It approaches the finding task as a small sample size classification problem, and uses SVM classifier to deal with this problem. Moreover, considering imbalanced dataset which contains more negative instances(incorrect candidates for new position) than positive instances(correct candidates for new position), a multi-class classification framework is adopted. Performance evaluation on SJTU face database show that the proposed SVMBASM outperforms the original ASM in terms of the average error as well as the average frequency of convergence. © 2008 IEEE.
da Xu, RY 1970, 'A Computer Vision based Whiteboard Capture System', 2008 IEEE Workshop on Applications of Computer Vision, 2008 IEEE Workshop on Applications of Computer Vision (WACV), IEEE.
View/Download from: Publisher's site
View description>>
Conventional whiteboard video capture using a static camera usually results in a poor quality. In this paper, we present an autonomous whiteboard scan and capture prototype system, which consist a pair of static and Pan-Tilt-Zoom (PTZ) cameras. The PTZ camera is used to scan the newly-updated whiteboard regions without interrupting the instructor. We will illustrate several computer vision techniques used in our system: Firstly, we present our unique camera calibration method using rough hand-drawn gridlines. Secondly, we present the image processing methods used to determine where the newly updated whiteboard region to be scanned is. Our method also accounts for the whiteboard region occlusion from the instructor.
Du, C, Wu, Q, Yang, J, He, X & Chen, Y 1970, 'Subspace Analysis Methods plus Motion History Image for Human Action Recognition', 2008 Digital Image Computing: Techniques and Applications, 2008 Digital Image Computing: Techniques and Applications, IEEE, Canberra, Australia, pp. 606-611.
View/Download from: Publisher's site
View description>>
This paper proposes a new human action recognition method which deals with recognition task in a quite different way when compared with traditional methods which use sequence matching scheme. Our method compresses a sequence of an action into a Motion History Image (MHI) on which low-dimensional features are extracted using subspace analysis methods. Unlike other methods which use a sequence consisting of several frames for recognition, our method uses only a MHI per action sequence for recognition. Obviously, our method avoids the complexity as well as the large computation in sequence matching based methods. Encouraging experimental results on a widely used database demonstrate the effectiveness of the proposed method. © 2008 IEEE.
Feng, D, Sikora, T, Siu, WC, Zhang, J, Guan, L & Dugelay, JL 1970, 'Preface', 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 IEEE 10th Workshop on Multimedia Signal Processing, IEEE.
View/Download from: Publisher's site
Geng, X, Wang, L, Li, M, Wu, Q & Smith-Miles, K 1970, 'Adaptive fusion of gait and face for human identification in video', 2008 IEEE WORKSHOP ON APPLICATIONS OF COMPUTER VISION, IEEE Workshop on Applications of Computer Vision, IEEE, CO, Copper Mt, pp. 94-+.
Geng, X, Wang, L, Li, M, Wu, Q & Smith-Miles, K 1970, 'Adaptive Fusion of Gait and Face for Human Identification in Video', 2008 IEEE Workshop on Applications of Computer Vision, 2008 IEEE Workshop on Applications of Computer Vision (WACV), IEEE, Copper Mountain, CO, USA, pp. 1-6.
View/Download from: Publisher's site
View description>>
Most work on multi-biometric fusion is based on static fusion rules which cannot respond to the changes of the environment and the individual users. This paper proposes adaptive multi-biometric fusion, which dynamically adjusts the fusion rules to suit the real-time external conditions. As a typical example, the adaptive fusion of gait and face in video is studied. Two factors that may affect the relationship between gait and face in the fusion are considered, i.e., the view angle and the subject-to-camera distance. Together they determine the way gait and face are fused at an arbitrary time. Experimental results show that the adaptive fusion performs significantly better than not only single biometric traits, but also those widely adopted static fusion rules including SUM, PRODUCT, MIN, and MAX.
He, X, Jia, W & Wu, Q 1970, 'An approach of canny edge detection with virtual hexagonal image structure', 2008 10th International Conference on Control, Automation, Robotics and Vision, ICARCV 2008, International Conference on Control, Automation, Robotics and Vision, IEEE, Hanoi, Vietnam, pp. 879-882.
View/Download from: Publisher's site
View description>>
Edge detection plays an important role in the areas of image processing, multimedia and computer vision. Gradient-based edge detection is a straightforward method to identify the edge points in the original grey-level image. It is intuitive that, in the human vision system, the edge points always appear where the gradient magnitude assumes a maximum. Hexagonal structure is an image structure alternative to traditional square image structure. The geometrical arrangement of pixels on a hexagonal structure can be described as a collection of hexagonal pixels. Because all the existing hardware for capturing image and for displaying image are produced based on square structure, an approach that uses bilinear interpolation and tri-linear interpolation is applied for conversion between square and hexagonal structures. Based on this approach, an edge detection method is proposed. This method performs Gaussian filtering to suppress image noise and computes gradients on the hexagonal structure. The pixel edge strengths on the square structure are then estimated before Canny' edge detector is applied to determine the final edge map. The experimental results show that the proposed method improves the edge detection accuracy and efficiency. © 2008 IEEE.
He, X, Zheng, L, Qiang Wu, Wenjing Jia, Bijan Samali & Palaniswami, M 1970, 'Segmentation of characters on car license plates', 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 IEEE 10th Workshop on Multimedia Signal Processing (MMSP), IEEE, Cairns, Australia, pp. 399-402.
View/Download from: Publisher's site
View description>>
License plate recognition usually contains three steps, namely license plate detection/localization, character segmentation and character recognition. When reading characters on a license plate one by one after license plate detection step, it is crucial to accurately segment the characters. The segmentation step may be affected by many factors such as license plate boundaries (frames). The recognition accuracy will be significantly reduced if the characters are not properly segmented. This paper presents an efficient algorithm for character segmentation on a license plate. The algorithm follows the step that detects the license plates using an AdaBoost algorithm. It is based on an efficient and accurate skew and slant correction of license plates, and works together with boundary (frame) removal of license plates. The algorithm is efficient and can be applied in real-time applications. The experiments are performed to show the accuracy of segmentation. © 2008 IEEE.
Huang, X 1970, 'Making carrier frequency offset an advantage for orthogonal frequency division multiplexing', 2008 Third International Conference on Communications and Networking in China, 2008 Third International Conference on Communications and Networking in China (CHINACOM), IEEE, pp. 854-858.
View/Download from: Publisher's site
View description>>
Contrary to the common belief that the carrier frequency offset (CFO) in an orthogonal frequency division multiplexing (OFDM) system would adversely impact on system performance, this paper shows that the CFO actually has the effect of linear precoding among transmitted data symbols and hence can be exploited to improve the diversity performance over frequency-selective fading channels. With both analysis and Monte Carlo simulation, it is proved that an OFDM system with CFO equal to half of the subcarrier spacing can potentially achieve the performance of diversity order four by the maximum-likelihood detection and demonstrate a 5 dB improvement using the minimum mean squared error equalization.
Huang, X 1970, 'Making Carrier Frequency Offset an Advantage for Orthogonal Frequency Division Multiplexing', 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 3rd International Conference on Communications and Networking in China, IEEE, Hangzhou, PEOPLES R CHINA, pp. 812-816.
Huang, X 1970, 'Multipath Diversity of Precoded OFDM with Linear Equalization', 2008 IEEE International Conference on Communications, 2008 IEEE International Conference on Communications, IEEE, Beijing, PEOPLES R CHINA, pp. 1307-1311.
View/Download from: Publisher's site
Huang, Y, Tian, L, Yang, Y, Shi, J, Dutkiewicz, E & Yang, S 1970, 'Analysis of Multicast and Unicast Integrated Multiclass Service Provision in Cellular Networks', IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, IEEE, pp. 4761-4765.
View/Download from: Publisher's site
View description>>
The concept of Logical Service Provision Number (LSPN) is proposed to evaluate the service provision capacity in multicast and unicast integrated multiclass service cellular networks. The tradeoff between call blocking probability and LSPN is investigated and an objective function of maximizing LSPN is proposed. To solve the optimal problem, the system is modeled as a 2Κ -dimensional Markov process with following features. The multiclass service system can provide multiple service classes using either multicast traffic or unicast traffic and each service class has call level QoS requirements. A static channel allocation model is adopted as the multicast traffic integration scheme. By solving the objective function, an optimal proportion of multicast traffic to unicast traffic can be identified to maximize the service provision capacity while satisfying QoS constraints. © 2008 IEEE.
Jin, X, Zhou, J, Hu, J, Shi, J, Sun, Y & Dutkiewicz, E 1970, 'An Efficient Downlink Data Mapping Algorithm for IEEE802.16e OFDMA Systems', IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, IEEE, pp. 5233-5237.
View/Download from: Publisher's site
View description>>
In the IEEE 802.16e OFDMA systems, the data mapping algorithm maps the data to the appropriate rectangular regions in the two-dimensional matrix of time and frequency domain. Each region is described by an Information Element (IE) which is used for signaling and occupies a slot. The IEs as well as vacant slots in the allocated rectangular region result in a substantial amount of overhead. In order to minimize the overhead so as to increase system throughput, the paper proposes a "Mapping with Appropriate Truncation and Sort" (MATS) algorithm. Extensive simulations are conducted in terms of mapping efficiency, mapping cost and system throughput to evaluate the performance of MATS. The results show that compared with Raster, MATS can increase the mapping efficiency by up to 2.4% and reduce the mapping cost by up to 80% and 37% for constant bit rate traffic and variable bit rate traffic, respectively. Moreover, system throughput is increased by more than 3% in the 10MHz bandwidth network. Consequently, MATS can substantially reduce the overhead and achieve high system throughput. © 2008 IEEE.
Khan, MAY & Veitch, D 1970, 'Peeling the 802.11 onion', Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization, MobiCom08: Annual International Conference on Mobile Computing and Networking, ACM, ACM, pp. 33-40.
View/Download from: Publisher's site
Khan, MAY & Veitch, D 1970, 'Speedo: Realistic achievable bandwidth in 802.11 through passive monitoring', 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008 33rd IEEE Conference on Local Computer Networks (LCN 2008), IEEE, IEEE, pp. 892-899.
View/Download from: Publisher's site
Le, T, Dong, Y, Liu, R, Jha, S, Rosberg, Z & IEEE 1970, 'Implementation aspects of reliable transport protocols in wireless sensor networks', 2008 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEM SOFTWARE AND MIDDLEWARE AND WORKSHOPS, VOLS 1 AND 2, 3rd International Conference on Communication System Software and Middleware and Workshop, IEEE, Bangalore, INDIA, pp. 574-580.
View/Download from: Publisher's site
Lebbe, MA, Agbinya, JI, Chaczko, Z & Braun, R 1970, 'Artificial immune system inspired danger modelling in Wireless Mesh Networks', 2008 International Conference on Computer and Communication Engineering, 2008 International Conference on Computer and Communication Engineering (ICCCE), IEEE, Malaysia, pp. 984-988.
View/Download from: Publisher's site
View description>>
In recent years wireless mesh network (WMN) technologies and its applications have been actively researched and developed as the promising solution for future wireless mobile networks. On the other hand security of WMN is often a secondary reflection in development. In our previous work we proposed Artificial Immune System model to employ in secure routing in WMN. This paper improves and extends the algorithm in our previous work with more achievable danger levels and introduces responsible parameters and model danger in WMN. Moreover this paper proposes the elected network simulator for the experiments. ©2008 IEEE.
Li, Y, Li, L, Hellicar, A & Guo, YJ 1970, 'Super-resolution reconstruction of terahertz images', SPIE Proceedings, SPIE Defense and Security Symposium, SPIE.
View/Download from: Publisher's site
View description>>
A prototype of terahertz imaging system has been built in CSIRO. This imager uses a backward wave oscillator as the source and a Schottky diode as the detector. It has a bandwidth of 500-700 GHz and a source power 10 mW. The resolution at 610 GHz is about 0.85 mm. Even though this imaging system is a coherent system, only the signal power is measured at the detector and the phase information of the detected wave is lost. Some initial images of tree leaves, chocolate bars and pinholes have been acquired with this system. In this paper, we report experimental results of an attempt to improve the resolution of this imaging system beyond the limitation of diffraction (super-resolution). Due to the lack of phase information needed for applying any coherent super-resolution algorithms, the performance of the incoherent Richardson-Lucy super-resolution algorithm has been evaluated. Experimental results have demonstrated that the Richardson-Lucy algorithm can significantly improve the resolution of these images in some sample areas and produce some artifacts in other areas. These experimental results are analyzed and discussed.
Lihong Zheng, Xiangjian He, Qiang Wu, Wenjing Jia, Samali, B & Palaniswami, M 1970, 'A hierarchically combined classifier for license plate recognition', 2008 8th IEEE International Conference on Computer and Information Technology, 2008 8th IEEE International Conference on Computer and Information Technology (CIT), IEEE, Sydney, pp. 372-377.
View/Download from: Publisher's site
View description>>
High accuracy and fast recognition speed are two requirements for real-time and automatic license plate recognition system. In this paper, we propose a hierarchically combined classifier based on an Inductive Learning Based Method and an SVM-based classification. This approach employs the inductive learning based method to roughly divide all classes into smaller groups. Then the SVM method is used for character classification in individual groups. Both start from a collection of samples of characters from license plates. After a training process using some known samples in advance, the inductive learning rules are extracted for rough classification and the parameters used for SVM-based classification are obtained. Then, a classification tree is constructed for further fast training and testing processes for SVMbased classification. Experimental results for the proposed approach are given. From the experimental results, we can make the conclusion that the hierarchically combined classifier is better than either the inductive learning based classification or the SVMbased classification in terms of error rates and processing speeds. © 2008 IEEE.
Liu, RP, Rosberg, Z, Collings, IB, Wilson, C, Dong, AY & Jha, S 1970, 'Overcoming radio link asymmetry in wireless sensor networks.', PIMRC, IEEE, pp. 1-5.
View/Download from: Publisher's site
View description>>
We derive two new energy efficient reliable data transport protocols for overcoming the negative impact of asymmetric radio links in wireless sensor networks. The energy efficiency of these algorithms is explicitly derived using our theoretical model, and validated by results obtained from simulations and field trials. The analytical, simulation and field trials demonstrate that our proposed protocols perform well in networks with asymmetric links and can save energy of up to 27% compared to conventional ARQ schemes. © 2008 IEEE.
Liu, RP, Zic, J, Collings, IB, Dong, AY & Jha, S 1970, 'Efficient Reliable Data Collection in Wireless Sensor Networks', 68TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2008, 68th IEEE Vehicular Technology Conference, IEEE, Calgary, CANADA, pp. 1974-1978.
Liu, RP, Zic, J, Collings, IB, Dong, AY & Jha, S 1970, 'Efficient Reliable Data Collection in Wireless Sensor Networks.', VTC Fall, IEEE, pp. 1-5.
View/Download from: Publisher's site
View description>>
We propose an Efficient Reliable Data Collection (eRDC) algorithm. The eRDC is designed for energy-constraint wireless sensor networks (WSN) to balance reliability and energy consumption. We derive energy efficiencies of the proposed reliability schemes, and evaluate their performances. These analyses provide a guideline to determine the number of retransmissions for reliable data delivery. Dynamic programming concept is used to find the optimal solution. We present a distributed eRDC implementation to dynamically control the maximum number of retransmissions based on the guideline provided. Discrete event simulations and field trials with wireless sensor nodes confirmed our results. ©2008 IEEE.
Luo, C, Cai, X & Zhang, J 1970, 'GATE: A Novel Robust Object Tracking Method Using the Particle Filtering and Level Set Method', 2008 Digital Image Computing: Techniques and Applications, 2008 Digital Image Computing: Techniques and Applications, IEEE, Canberra, ACT, pp. 378-385.
View/Download from: Publisher's site
View description>>
This paper presents a novel algorithm for robust object tracking based on the particle filtering method employed in recursive Bayesian estimation and image segmentation and optimisation techniques employed in active contour models and level set methods.
Luo, C, Cai, X & Zhang, J 1970, 'Robust object tracking using the particle filtering and level set methods: A comparative experiment', 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 IEEE 10th Workshop on Multimedia Signal Processing (MMSP), IEEE, Cairns, QLD, pp. 359-364.
View/Download from: Publisher's site
View description>>
Robust visual tracking has become an important topic of research in computer vision. A novel method for robust object tracking, GATE [11], improves object tracking in complex environments using the particle filtering and the level set-based active contou
Mohamed Mowjoon, D, Agbinya, JI & Chaczko, ZC 1970, 'Policy-based Danger Management in Artificial Immune System Inspired Secure Routing in Wireless Mesh Networks', Proceedings International MultiConference of Engineers and Computer Scientists, International MultiConference of Engineers and Computer Scientists, International Association of Engineers, Hong Kong, pp. 268-270.
View description>>
This paper introduces Policy based Management Information Base to manage danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management functions are defined and the paper focuses only on the security function. Proposed policy based management and typical operation of the architecture are also reported.
Ong, C, Lu, S & Zhang, J 1970, 'An Approach for Enhancing the Results of Detecting Foreground Objects and Their Moving Shadows in Surveillance Video', 2008 Digital Image Computing: Techniques and Applications, 2008 Digital Image Computing: Techniques and Applications, IEEE, Canberra, ACT, pp. 242-249.
View/Download from: Publisher's site
View description>>
Automated surveillance system is becoming increasingly important especially in the fields of computer vision and video processing. This paper describes a novel approach for improving the results of detecting foreground objects and their shadows in indoor
Otoom, AF, Gunes, H & Piccardi, M 1970, 'Automatic classification of abandoned objects for surveillance of public premises', CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 4, PROCEEDINGS, International Congress on Image and Signal Processing, IEEE, Sanya, Hainan, China, pp. 542-549.
View/Download from: Publisher's site
View description>>
One of the core components of any visual surveillance system is object classification, where detected objects are classified into different categories of interest. Although in airports or train stations, abandoned objects are mainly luggage or trolleys, none of the existing works in the literature have attempted to classify or recognize trolleys. In this paper, we analyzed and classified images of trolley(s), bag(s), single person(s), and group(s) of people by using various shape features with a number of uncluttered and cluttered images and applied multi-frame integration to overcome partial occlusions and obtain better recognition results. We also tested the proposed techniques on data extracted from a well-recognized and recent data set, PETS 2007 benchmark data set [16]. Our experimental results show that the features extracted are invariant to data set and classification scheme chosen. For our four-class object recognition problem, we achieved an average recognition accuracy of 70%.
Otoom, AF, Gunes, H & Piccardi, M 1970, 'Comparative performance analysis of feature sets for abandoned object classification', 2008 IEEE International Conference on Systems, Man and Cybernetics, 2008 IEEE International Conference on Systems, Man and Cybernetics (SMC), IEEE, Singapore City, Singapore, pp. 1-6.
View/Download from: Publisher's site
View description>>
Accurate classification of abandoned objects is crucial in video surveillance systems. In this paper, we experiment with different validation techniques (hold-out and 10-fold cross validation), with the aim of determining which feature set proves more useful for accurate object classification in a video surveillance context (scale invariant image transform (SIFT) keypoints vs. geometric primitive features). Moreover, we show how the resulting features affect classification performance across different classifiers. We also further analyze the best performing classifier in order to have better understanding of its classification results. Objects are classified into four different categories: bag (s), person (s), trolley (s), and group (s) of people. Our experimental results show that the highest recognition accuracy and the lowest false alarm rate are achieved by building a classifier based on our proposed set of statistics of geometric primitives' features. This set of features maximizes inter-class separation and simplifies the classification process. Classification based on this set of features thus outperforms the second best approach based on SIFT keypoint histograms by providing on average 22% higher recognition accuracy and 7% lower false alarm rate.
Otoom, AF, Gunes, H, Piccardi, M & IEEE 1970, 'FEATURE EXTRACTION TECHNIQUES FOR ABANDONED OBJECT CLASSIFICATION IN VIDEO SURVEILLANCE', 2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, IEEE International Conference on Image Processing, IEEE, San Diego, CA, USA, pp. 1368-1371.
View/Download from: Publisher's site
View description>>
We address the problem of abandoned object classification in video surveillance. Our aim is to determine (i) which feature extraction technique proves more useful for accurate object classification in a video surveillance context (scale invariant image transform (SIFT) keypoints vs. geometric primitive features), and (ii) how the resulting features affect classification accuracy and false positive rates for different classification schemes used. Objects are classified into four different categories: bag (s), person (s), trolley (s), and group (s) of people. Our experimental results show that the highest recognition accuracy and the lowest false alarm rate are achieved by building a classifier based on our proposed set of statistics of geometric primitives' features. Moreover, classification performance based on this set of features proves to be more invariant across different learning algorithms. © 2008 IEEE.
Paisitkriangkra, S, Shen, C & Zhang, J 1970, 'Real-time Pedestrian Detection Using a Boosted Multi-layer Classifier', The Eighth International Workshop on Visual Surveillance, in conjunction with European Conference on Computer Vision (ECCV'08), 2008, IEEE International Workshop on Visual Surveillance, Institute of Electrical and Electronics Engineers, Marseille France.
View description>>
Techniques for detecting pedestrian in still images haveattached considerable research interests due to its wide applicationssuch as video surveillance and intelligent transportationsystems. In this paper, we propose a novel simplerpedestrian detector using state-of-the-art locally extractedfeatures, namely, covariance features. Covariancefeatures were originally proposed in [1, 2]. Unlike the workin [2], where the feature selection and weak classifier trainingare performed on the Riemannian manifold, we selectfeatures and train weak classifiers in the Euclidean spacefor faster computation. To this end, AdaBoost with weightedFisher linear discriminant analysis based weak classifiersare adopted. Multiple layer boosting with heterogeneousfeatures is constructed to exploit the efficiency of the Haarlikefeature and the discriminative power of the covariancefeature simultaneously. Extensive experiments show that bycombining the Haar-like and covariance features, we speedup the original covariance feature detector [2] by up to anorder of magnitude in processing time without compromisingthe detection performance. For the first time, the proposedwork enables covariance feature based pedestriandetection to work real-time.
Paisitkriangkrai, S, Chunhua Shen & Jian Zhang 1970, 'An experimental study on pedestrian classification using local features', 2008 IEEE International Symposium on Circuits and Systems (ISCAS), 2008 IEEE International Symposium on Circuits and Systems (ISCAS), IEEE, Seattle, WA, pp. 2741-2744.
View/Download from: Publisher's site
View description>>
This paper presents an experimental study on pedestrian detection using state-of-the-art local feature extraction and support vector machine (SVM) classifiers. The performance of pedestrian detection using region covariance, histogram of oriented gradien
Pang, D, Hu, J, Zhou, J, Shi, J & Dutkiewicz, E 1970, 'An Uplink Resource Allocation Scheme for SDMA-Based IEEE 802.16 MIMO-OFDMA Systems', IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference, IEEE, pp. 5223-5227.
View/Download from: Publisher's site
View description>>
In this paper, a low-complexity SDMA-based greedy resource allocation (SGRA) algorithm is proposed for the uplink of IEEE 802.16 MIMO-OFDMA systems taking into account co- channel interference. The objective of SGRA is to allocate resources in the space-time-frequency domain in order to maximize system throughput while guaranteeing QoS requirements of real time services. By performing efficient interference management, SGRA can be carried out in two phases. In the first phase, greedy resource allocation, primarily involving uplink scheduling and subchannel allocation across the MAC and PHY layers, is performed in the time-frequency domain. In the second phase, the resource allocation is extended to the space- time-frequency domain. Simulation results show that SGRA can improve system throughput while at the same time guaranteeing the delay and minimum data rate requirements of users. © 2008 IEEE.
Park, M, Jin, SJ, Hofstetter, R, Xu, M & Kang, BH 1970, 'Automatic Colonic Polyp Detection by the Mapping Using Regional Unit Sphere', 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008), 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008), IEEE, pp. 144-149.
View/Download from: Publisher's site
View description>>
Colonic polyps appear like elliptical protrusions on the inner wall of the colon. The many proposed algorithms assumed the shape of a polyp as a spherical cap, so the algorithms are not flexible when the polyps are irregular shapes. In this paper, we propose a mapping using regional unit sphere (MuRUS) method to overcome the problem caused by unexpected polyp shapes. The MuRUS has shape invariant and size invariant properties. Our method was applied to colon CT images from 37 patients each having a prone and supine scan. There are 45 colonscopically confirmed polyps. The results obtained by our algorithm were compared with those gold standards. 100% of polyps >= 10mm in diameter were detected, 90% of polyps >= 6mm in diameter were detected and 70% of polyps < 6mm in diameter were detected at 7.0 FPs per patient. © 2008 IEEE.
Piccardi, M, Gunes, H & Otoom, AF 1970, 'Maximum-likelihood dimensionality reduction in gaussian mixture models with an application to object classification', 2008 19th International Conference on Pattern Recognition, 2008 19th International Conference on Pattern Recognition (ICPR), IEEE, Tampa, FL, USA, pp. 1-4.
View/Download from: Publisher's site
View description>>
Accurate classification of objects of interest for video surveillance is difficult due to occlusions, deformations and variable views/illumination. The adopted feature sets tend to overcome these issues by including many and complementary features; however, their large dimensionality poses an intrinsic challenge to the classification task. In this paper, we present a novel technique providing maximum-likelihood dimensionality reduction in Gaussian mixture models for classification. The technique, called hereafter mixture of maximum-likelihood normalized projections (mixture of ML-NP), was used in this work to classify a 44-dimensional data set into 4 classes (bag, trolley, single person, group of people). The accuracy achieved on an independent test set is 98% vs. 80% of the runner-up (MultiBoost/AdaBoost).
Piccardi, M, Gunes, H, Otoom, AF & IEEE 1970, 'Maximum-Likelihood Dimensionality Reduction in Gaussian Mixture Models with an Application to Object Classification', 19TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOLS 1-6, pp. 2986-2989.
Qiang Wu, Chunhua Du, Jie Yang, Xiangjian He & Yan Chen 1970, 'Pedestrian detection using hybrid statistical feature', 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 IEEE 10th Workshop on Multimedia Signal Processing (MMSP), IEEE, Cairns, Queensland, Australia, pp. 101-106.
View/Download from: Publisher's site
View description>>
A novel approach for walking people detection is proposed in this paper, which is inspired by the idea of Gait Energy Image (GEI). Unlike most of common human detection methods where usually a trained detector scans a single image and then generates a detection result, the proposed method detects people on a sequence of silhouettes which contain both appearance characteristics and motion characteristics. Thus, our method is more robust. Encouraging experimental results are obtained based on CASIA Gait Database and the additional nonhuman objects data. © 2008 IEEE.
Raad, IS & Huang, X 1970, 'Analytical Study of the Rotation Spreading Matrix of Block Spread OFDM with MMSE Equalization', 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Communication Technologies: from Theory to Applications (ICTTA), IEEE, Damascus, SYRIA, pp. 2345-2349.
View/Download from: Publisher's site
Raad, IS & Huang, X 1970, 'Higher Order Parallel Concatenated Spreading Matrices OFDM', 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Communication Technologies: from Theory to Applications (ICTTA), IEEE, Damascus, SYRIA, pp. 2350-2355.
View/Download from: Publisher's site
Rahali, E, Chaczko, Z, Agbinya, JI & Chiu, C 1970, 'Business Process Re-engineering in Saudi Arabia: A Survey of Understanding and Attitudes.', BroadCom, International Conference of Broadband Communication, Information Technology and Biomedical Applications, IEEE Computer Society, Pretoria, Gauteng, South Africa, pp. 148-155.
View/Download from: Publisher's site
View description>>
This survey was conducted in the Kingdom of Saudi Arabia (KSA) to investigate the level of awareness of BPR. Respondents (customers, employees, and managers) had different educational backgrounds and were from private and public sectors. Findings of the study indicate a general awareness of BPR in KSA. sustain sales growth.
Rosberg, Z, Liu, RP, Dong, AY, Le, TD & Jha, S 1970, 'ARQ with Implicit and Explicit ACKs in Wireless Sensor Networks.', GLOBECOM, IEEE Global Telecommunications Conference (GLOBECOM 08), IEEE, New Orleans, LA, pp. 50-55.
View/Download from: Publisher's site
Saesue, W, Jian Zhang & Chun Tung Chou 1970, 'Hybrid frame-recursive block-based distortion estimation model for wireless video transmission', 2008 IEEE 10th Workshop on Multimedia Signal Processing, 2008 IEEE 10th Workshop on Multimedia Signal Processing (MMSP), IEEE, Cairns, QLD, pp. 774-779.
View/Download from: Publisher's site
View description>>
In wireless environments, video quality can be severely degraded due to channel errors. Improving error robustness towards the impact of packet loss in error-prone network is considered as a critical concern in wireless video networking research. Data pa
Sharp, I, Yu, K & Guo, YJ 1970, 'Performance Analysis of Bandlimited TOA Estimation Using Peak Tracking', 2008 IEEE 68th Vehicular Technology Conference, 2008 IEEE 68th Vehicular Technology Conference (VTC 2008-Fall), IEEE.
View/Download from: Publisher's site
View description>>
This paper presents the performance analysis of time-of-arrival (TOA) measurements by employing bandlimited radio signals. We choose one of the practical TOA estimation methods, peak tracking for study. First, two simplified models, i.e. the hyperbolic and Gaussian models are introduced to approximate the correlation diagram (correlogram) for ease of performance analysis. It is shown that the two models accurately approximate the true bandlimited correlogram especially around the peak. Concise expressions of the TOA estimation errors are derived for either Gaussian measurement noise or multipath interference when using bandlimited signals. The analytical results can be readily exploited to assist the design of TOA based positioning systems using peak tracking algorithm under bandwidth constraints. ©2008 IEEE.
Shen, C, Paisitkriangkrai, S & Zhang, J 1970, 'Face detection from few training examples', 2008 15th IEEE International Conference on Image Processing, 2008 15th IEEE International Conference on Image Processing - ICIP 2008, IEEE, San Diego, CA, pp. 2764-2767.
View/Download from: Publisher's site
Thi, TH, Lu, S & Zhang, J 1970, 'Self-Calibration of Traffic Surveillance Camera using Motion Tracking', 2008 11th International IEEE Conference on Intelligent Transportation Systems, 2008 11th International IEEE Conference on Intelligent Transportation Systems (ITSC), IEEE, Beijing, China, pp. 304-309.
View/Download from: Publisher's site
View description>>
A statistical and computer vision approach using tracked moving vehicle shapes for auto-calibrating traffic surveillance cameras is presented. Vanishing point of the traffic direction is picked up from Linear Regression of all tracked vehicle points. Pre
Thi, TH, Robert, K, Lu, S & Zhang, J 1970, 'Vehicle Classification at Nighttime Using Eigenspaces and Support Vector Machine', 2008 Congress on Image and Signal Processing, 2008 Congress on Image and Signal Processing, IEEE, Sanya, Hainan, pp. 422-426.
View/Download from: Publisher's site
View description>>
A robust framework to classify vehicles in nighttime traffic using vehicle eigenspaces and support vector machine is presented. In this paper, a systematic approach has been proposed and implemented to classify vehicles from roadside camera video sequenc
Tian, L, Yang, S, Yang, Y, Sun, Y, Shi, J & Dutkiewicz, E 1970, 'A Novel SFN Broadcast Services Selection Mechanism in Wireless Cellular Networks', 2008 IEEE Wireless Communications and Networking Conference, 2008 IEEE Wireless Communications and Networking Conference, IEEE, pp. 1974-1978.
View/Download from: Publisher's site
View description>>
Single Frequency Networks (SFN) broadcast is an efficient method to provide broadcast services in cellular networks. How to select broadcast services by the SFN operation to trade off between the occupied bandwidth and the SFN performance including spectrum efficiency and broadcast service continuity is a new problem. To the best of our knowledge no solutions have been proposed to solve this problem so far in the literature. We define the problem of SFN broadcast services selection as a KNAPSACK problem and solve it to minimize the occupied bandwidth while at the same time guaranteeing the SFN performance. Based on the solution, several SFN broadcast services selection algorithms are proposed which vary in the reselection policy. Numerical results show that our proposed algorithms are applicable to different cases with different system requirements and in particular, that the Semi-Dynamic-SFN Broadcast services Selection Algorithm is an efficient solution in general. © 2008 IEEE.
Tu, P, Huang, X & Dutkiewicz, E 1970, 'Adaptive filtering for selective subband transmission based on interference detection', Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks, MobiHoc08: The Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM, pp. 95-100.
View/Download from: Publisher's site
View description>>
In a shared radio spectrum environment, multiple systems may interfere with each other. In this paper we propose an adaptive filtering method to suppress interference and select the most suitable subbands according to predetermined interference thresholds. Two methods to determine these interference thresholds in Gaussian and multipath fading channels are introduced. The adaptive filtering method enables a system to dynamically use frequency subbands with-out employing frequency hopping techniques. The flexible received signal bandwidth with difierent number of subbands provides great potential for systems to coexist with each other, resulting in higher spectrum utilization effciency. To verify the efiectiveness of the proposed adaptive filtering method, the system bit error rates (BERs) under difierent interference conditions are simulated and compared. © 2008 ACM.
Tu, P, Huang, X & Dutkiewicz, E 1970, 'Adaptive Subband Selection in OFDM-Based Cognitive Radios for Better System Coexistence', 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008), 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), IEEE, Singapore, SINGAPORE, pp. 78-83.
View/Download from: Publisher's site
Tu, P, Huang, X & Dutkiewicz, E 1970, 'Subband Adaptive Filtering for Efficient Spectrum Utilization in Cognitive Radios', 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008), 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), IEEE, Singapore, SINGAPORE, pp. 266-269.
View/Download from: Publisher's site
Tune, P & Veitch, D 1970, 'Towards optimal sampling for flow size estimation', Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, IMC08: Internet Measurement Conference, ACM, ACM, pp. 243-256.
View/Download from: Publisher's site
Wang, JC-P, Franklin, DR, Abolhasan, M, Safaei, F & IEEE 1970, 'Characterising the Interactions Between Unicast and Broadcast in IEEE 802.11 Ad Hoc Networks', ATNAC: 2008 AUSTRALASIAN TELECOMMUNICATION NETWOKS AND APPLICATIONS CONFERENCE, ATNAC 2008, In Australasian Telecommunications Networking and Application Conference (ATNAC), Adelaide, SA, pp. 180-185.
View/Download from: Publisher's site
View description>>
This paper investigates the relative performance of unicast and broadcast traffic traversing a one-hop ad hoc network utilising the 802.11 DCF. An extended Markov model has been developed and validated through computer simulation, which successfully predicts the respective performance of unicast and broadcast in a variety of mixed traffic scenarios. Under heavy network traffic conditions, a significant divergence is seen to develop between the performance of the two traffic classes - in particular, when network becomes saturated, unicast traffic is effectively given higher precedence over broadcast. As a result, the network becomes dominated by unicast frames, leading to poor rates of broadcast frame delivery.
Wen, H, Lin, C, Ren, F, Yang, H, He, T & Dutkiewicz, E 1970, 'Joint Adaptive Redundancy and Partial Retransmission for Reliable Transmission in Wireless Sensor Networks', 2008 IEEE International Performance, Computing and Communications Conference, 2008 IEEE International Performance Computing and Communications Conference (IPCCC), IEEE, pp. 303-310.
View/Download from: Publisher's site
View description>>
As a potentially competitive technique, erasure coding has been employed in wireless sensor networks (WSNs) to enhance transmission reliability. In this paper, to design a practical and efficient redundancy mechanism in WSNs, we firstly provide a theoretical study of packet delivery probability and average energy consumption for retransmission and redundancy mechanisms. The theoretical results indicate that in WSNs, the adaptive redundancy coding mechanism is more energy efficient than retransmission while keeping the same level of reliability in most scenarios. Then based on the mapping table and two basic design principles obtained from the theoretical analysis, we propose a reliable transport protocol ARRTP which combines the adaptive redundancy mechanism and partial retransmission. The simulation and trace-driven results both verify that when the loss probability varies from low to high, our protocol provides reliability with comparably lower energy consumption. Furthermore, compared with fixed redundancy degrees, the robustness of the adaptive mechanism are also evaluated. © 2008 IEEE.
Xu, M, Jin, JS & Luo, S 1970, 'Personalized video adaptation based on video content analysis', Proceedings of the 9th International Workshop on Multimedia Data Mining: held in conjunction with the ACM SIGKDD 2008, KDD08: The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 26-35.
View/Download from: Publisher's site
View description>>
Personalized video adaptation is expected to satisfy individual users' needs on video content. Multimedia data mining plays a significant role of video annotation to meet users' preference on video content. In this paper, a comprehensive solution for personalized video adaptation is proposed based on video content mining. Video content mining targets both cognitive content and affective content. Cognitive content refers to those semantic events, which are very specific for the video domains. Sometimes, users might prefer "emotional decision" to select their interested video content. Therefore, we introduce affective content which causes audiences' strong reactions. For cognitive content mining, features are extracted from multiple modalities. Machine learning module is further performed to get some middle-level features, such as specific audio sounds, semantic video shots and so on. Those middle-level features are used to detect cognitive content by using Hidden Markov Models. For affective content mining, affective content is detected with three affective levels: "low", "medium" and "high". Considering affective levels might have no sharp boundaries, fuzzy c mean clustering is used on low-level features to simulate user's perceptions. The adaptation is later implemented based on MPEG-21 Digital Item Adaptation framework. One of the challenges is how to quantify users' preference on video content. Information Entropy (IE) and Membership Functions are calculated to decide priorities for resource allocation for cognitive content and affective content respectively. Copyright 2008 ACM.
Xu, M, Jin, JS, Luo, S & Duan, L 1970, 'Hierarchical movie affective content analysis based on arousal and valence features', Proceedings of the 16th ACM international conference on Multimedia, MM08: ACM Multimedia Conference 2008, ACM, pp. 677-680.
View/Download from: Publisher's site
View description>>
Emotional factors directly reflect audiences' attention, evaluation and memory. Affective contents analysis not only create an index for users to access their interested movie segments, but also provide feasible entry for video highlights. Most of the work focus on emotion type detection. Besides emotion type, emotion intensity is also a significant clue for users to find their interested content. For some film genres (Horror, Action, etc), the segments with high emotion intensity have the most possibilities to be video highlights. In this paper, we propose a hierarchical structure for emotion categories and analyze emotion intensity and emotion type by using arousal and valence related features hierarchically. Firstly, High, Medium and Low are detected as emotion intensity levels by using fuzzy c-mean clustering on arousal features. Fuzzy clustering provides a mathematical model to represent vagueness, which is close to human perception. After that, valence related features are used to detect emotion types (Anger, Sad, Fear, Happy and Neutral ). Considering video is continuous time series data and the occurrence of a certain emotion is a ted by recent emotional history, Hidden Markov Models (HMMs) are used to capture the context information. Experimental results shows the movie segments with high emotion intensity cover over 80% of the movie highlights in Horror and Action movies and the hierarchical method outperforms the one-step method on emotion type detection. Meanwhile, it is exible for user to pick up their favorite a ective content by choosing both emotion intensity levels and emotion types. Copyright 2008 ACM.
Xu, M, Luo, S & Jin, JS 1970, 'Affective Content Detection by Using Timing Features and Fuzzy Clustering', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer Berlin Heidelberg, pp. 685-692.
View/Download from: Publisher's site
View description>>
Emotional factors directly reflect audiences' attention, evaluation and memory. Movie affective content detection attracts more and more research efforts. Most of the existing work focus on developing efficient affective features or implementing feasible pattern recognition algorithms. However, some important issues are ignored. 1) Most of the feature used in affective content detection are traditional visual/audio features. While affective content detection needs those features which are directly related to emotions. 2) affective content is a subjective concept which heavily depends on human perception. It is hard to find a clear boundary for various emotion categories. While most of the existing methods utilize hard pattern recognition algorithm to generate clear boundary for emotion categories. In this paper, we consider the above two issues by two aspects. 1) We employ timing features which are important of films and an important part of films' power to affect viewers' feelings and emotions. Meanwhile, audio features are used together with timing features to detect affective content from multiple modalities. 2) Fuzzy clustering is used in this paper to map affective features to affective content. Fuzzy logic provides a mathematical model to represent vagueness, which is close to human perception. Experimental results shows the proposed method is effective and efficient. © 2008 Springer.
Yan Chen, Qiang Wu, Xiangjian He, Chunhua Du & Jie Yang 1970, 'Extracting key postures using radon transform', 2008 23rd International Conference Image and Vision Computing New Zealand, 2008 23rd International Conference Image and Vision Computing New Zealand (IVCNZ), IEEE, Christchurch, New Zealand, pp. 1-5.
View/Download from: Publisher's site
View description>>
Human key posture extraction will benefit for human action recognition, human action retrieval, human behaviour understanding and so on. This paper proposes an approach to select key postures from a human action video based on Radon transform. Cluster is used on the Radon transform to select the final key postures of human action video. The approach does not require motion extraction from the human action video. The experiments results show that the proposed approach is efficient. © 2008 IEEE.
Yan Chen, Qiang Wu, Xiangjian He, Wenjing Jia & Hintz, T 1970, 'A modified Mahalanobis distance for human detection in out-door environments', 2008 First IEEE International Conference on Ubi-Media Computing, 2008 First IEEE International Conference on Ubi-media Computing (U-Media 2008), IEEE, Lanzhou, China, pp. 243-248.
View/Download from: Publisher's site
View description>>
This paper proposes a novel method for human detection from static images based on pixel structure of input images. Each image is divided into four parts, and a weight is assigned to each part of the image. In training stage, all sample images including human images and non-human images are used to construct a Mahalanobis distance map through statistically analyzing the difference between the different blocks on each original image. A projection matrix will be created with Linear Discriminant Method (LDM) based on the Mahalanobis distance map. This projection matrix will be used to transform multidimensional feature vectors into one dimensional feature domain according to a pre-calculated threshold to distinguish human figures from non-human figures. In comparison with the method without introducing weights, the proposed method performs much better. Encouraging experimental results have been obtained based on MIT dataset and our own dataset. © 2008 IEEE.
Yi Da Xu, R, Junbin Gao & Antolovich, M 1970, 'Novel methods for high-resolution facial image capture using calibrated PTZ and static cameras', 2008 IEEE International Conference on Multimedia and Expo, 2008 IEEE International Conference on Multimedia and Expo (ICME), IEEE, Hannover, GERMANY, pp. 45-48.
View/Download from: Publisher's site
Yiwei Yu, Xiaojing Huang & Eryk Dutkiewicz 1970, 'Block spread OFDMA system with space-time coded MIMO over frequency selective fading channels', 2008 Third International Conference on Communications and Networking in China, 2008 Third International Conference on Communications and Networking in China, IEEE, pp. 464-468.
View/Download from: Publisher's site
View description>>
This paper proposes a block spread orthogonal frequency division multiple access (BS-OFDMA) system with a combined space-time coded multiple-input multiple-out (STC-MIMO) scheme called STC-MIMO BS-OFDMA for transmission over frequency selective fading channels. In this system, a novel block spreading approach is firstly applied to effectively achieve precoding in the OFDMA system with lower complexity for improving the multipath diversity performance. The STC-MIMO is then incorporated to take advantage of the spatial diversity. The signal model and architecture of the proposed system are presented, and simulations are carried out to confirm the expected performance improvement.
Yu, K & Guo, YJ 1970, 'Improving Anchor Position Accuracy for 3-D Localization in Wireless Sensor Networks', 2008 IEEE International Conference on Communications, 2008 IEEE International Conference on Communications, IEEE, pp. 951-955.
View/Download from: Publisher's site
View description>>
Accuracy of ordinary sensor node localization in wireless sensor networks mainly depends on the signal parameter such as time-of-arrival and signal strength estimation errors and the accuracy of the anchor node locations. In this paper a low-complexity but efficient algorithm is derived to improve anchor location accuracy in the presence of both anchor-to-anchor distance and AOA estimates and GPS measurements. Also, a Lenvenberg-Marquardt (LM) optimization based algorithm is developed for accuracy improvement when anchor-to-anchor distance estimates and GPS measurements are provided. Further, we derive the Cramer-Rao lower bound (CRLB) to benchmark the anchor position accuracy. To our knowledge, improving anchor node location accuracy and deriving the CRLB in the presence of both GPS and anchor-to-anchor measurements in 3-D scenarios are not reported in the literature. Simulation results demonstrate that the proposed approaches can improve the anchor position accuracy substantially and that the accuracy of the two developed algorithms approaches the corresponding CRLB. ©2008 IEEE.
Yu, K & Guo, YJ 1970, 'Non-line-of-sight detection based on TOA and signal strength', 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE.
View/Download from: Publisher's site
View description>>
This paper addresses the problem of identifying NLOS propagation by applying the statistical decision theory. A time-of-arrival (TOA) based method is developed under idealized conditions to provide a performance reference. In the presence of both TOA and received signal strength (RSS) measurements, a joint identification method is derived to efficiently exploit both the TOA and RSS measurements. Analytical expressions for the probability of detection (POD) and the probability of false alarm (PFA) are derived. Simulation results demonstrate that the proposed methods perform well and the joint TOA and RSS based method outperforms the TOA based methods considerably. It is also shown that the analytical results agree with the simulated ones. © 2008 IEEE.
Yu, K & Guo, YJ 1970, 'Robust Localization in Multihop Wireless Sensor Networks', VTC Spring 2008 - IEEE Vehicular Technology Conference, 2008 IEEE Vehicular Technology Conference (VTC 2008-Spring), IEEE, pp. 2819-2823.
View/Download from: Publisher's site
View description>>
In this paper a hybrid localization scheme for multihop wireless sensor networks is presented. At first a relatively dense group of nodes is selected as a base. Next, the multidimensional scaling (MDS) method is applied to localize the group of nodes. Then, the robust quads (RQ) method is employed to localize other nodes, following which we make use of the robust triangle and radio range (RTRR) approach to perform the localization task. The RQ and the RTRR methods are used alternately until no more nodes can be localized by the two approaches. Simulation results demonstrate that the proposed hybrid localization algorithm performs well in terms of both accuracy and success rate of localization. © 2008 IEEE.
Yu, K, Guo, YJ & Oppermann, I 1970, 'Modified Taylor Series Expansion Based Positioning Algorithms', VTC Spring 2008 - IEEE Vehicular Technology Conference, 2008 IEEE Vehicular Technology Conference (VTC 2008-Spring), IEEE, pp. 2656-2660.
View/Download from: Publisher's site
View description>>
In this paper, we propose a modified two stage Taylor series (TS) method for position estimation in a 3-D environment when either the time-difference-of-arrival (TDOA) or the distance measurements are available. It is aimed to improve the convergence performance of the traditional Taylor series method. Simulation results demonstrate that the modified TS method can improve the position estimation convergence considerably. © 2008 IEEE.
Yu, Y, Huang, X & Dutkiewicz, E 1970, 'Block Spread OFDM.A System with Space-Time Coded MIMO over Frequency Selective Fading Channels', 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 3rd International Conference on Communications and Networking in China, IEEE, Hangzhou, PEOPLES R CHINA, pp. 441-445.
Zhang, Z, Gunes, H, Piccardi, M & IEEE 1970, 'AN ACCURATE ALGORITHM FOR HEAD DETECTION BASED ON XYZ AND HSV HAIR AND SKIN COLOR MODELS', 2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, IEEE International Conference on Image Processing, IEEE, San Diego, CA, USA, pp. 1644-1647.
View/Download from: Publisher's site
View description>>
Head detection in images and videos plays an important role in a wide range of computer vision and multimedia applications. In this paper, we propose a new head detection algorithm that is capable of handling significantly variable conditions in terms of viewpoint (i.e. frontal, profile, back view, from -180 degrees to +180 degrees), tilt angle (i.e. from horizontal to aerial), scale and resolution. To this aim, we built a new model for the head based on appearance distributions and shape constraints. The appearance distribution models the colors of hair and skin by sets of Gaussian mixtures in the XYZ and HSV color spaces. The shape constraint fits an elliptical model to the candidate region and compares its parameters with priors based on the human anatomy. This presents a pixel-level measurement of accuracy for the proposed algorithm both prior and after applying the spatial constraints referenced by the elliptical model. The excellent accuracy at both levels confirms the accuracy of the appearance model and the appropriateness of the spatial and topological process.