Synchronous audiovisual streaming and playout are two of the major issues in the multimedia communication network. However, the past corresponding researches of media synchronization mainly focused on the mono-quality...
详细信息
Intelligent surveillance system has become an important research topic in the field of computer vision. The authors propose a monitoring method based on the cellular model to monitor human activities in the indoor env...
详细信息
Fault-based cryptanalysis has been developed to effectively break both private-key and public-key cryptosystems, making robust finite field multiplication a very important research topic in recent years. However, no r...
详细信息
We have studied various methods for improving the performance of PC clusters. Most of them have used special hardware, non standard protocols, so that need special added library and complex programming, tending to rai...
详细信息
Fault-based side-channel cryptanalysis is a useful technique against symmetrical and asymmetrical encryption/decryption algorithms. Thus, eliminating cryptographic computation errors become critical in preventing such...
详细信息
In this paper, we proposed an eye-movement tracking system. Based on Electro-Oculography (E.O.G) technology we detected the signal with different directions in eye-movements and then analyzed to understand what they r...
详细信息
ISBN:
(纸本)9781424447053
In this paper, we proposed an eye-movement tracking system. Based on Electro-Oculography (E.O.G) technology we detected the signal with different directions in eye-movements and then analyzed to understand what they represented about (e.g. horizontal direction or vertical direction). We converted the analog signal to digital signal and then used as the control signals for Human computer Interface (HCI). In order to make the system "robust", several applications with EOG-based HCI had been designed. Our preliminary results revealed more than 90% accuracy rate for examining the eye-movement that may become a new useful human-machine user interface in the near future.
In this paper we present an approach for visualizing net flow data through clustering to identify anomalies in network traffic. Various clustering techniques are applicable for Intrusion Detection for identifying anom...
详细信息
This paper proposes an adaptive cross-layer mapping algorithm to improve the transmission quality of MPEG-4 video stream over an IEEE 802.11e wireless network. Instead of classifying video data to a specific access ca...
详细信息
Breast Thermography is one of the scanning techniques used for breast cancer detection. Looking at breast thermal image it is difficult to interpret parameters of tumor such as depth, size and location which are usefu...
详细信息
The development of assessment management system has been discussed for a long time. The motivation always focuses on the evaluation of learners ' ability or on the difficulties of examination. The common examinati...
详细信息
暂无评论