Signal Processing and Multimedia: International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Kore
by Kim, Tai-hoon; Pal, Sankar K.; Grosky, William I.; Pissinou, Niki; Shih, Timothy K.Rent Textbook
New Textbook
We're Sorry
Sold Out
Used Textbook
We're Sorry
Sold Out
eTextbook
We're Sorry
Not Available
How Marketplace Works:
- This item is offered by an independent seller and not shipped from our warehouse
- Item details like edition and cover design may differ from our description; see seller's comments before ordering.
- Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
- Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
- Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.
Summary
Table of Contents
| Eye Tracking Technique for Product Information Provision | p. 1 |
| A Study on Marker Overlapping Control for M2M-Based Augmented Reality Multiple Object Loading Using Bresenham Algorithm | p. 8 |
| Single Image Super-Resolution via Edge Reconstruction and Image Fusion | p. 16 |
| Scanning and Measuring Device for Diagnostic of Barrel Bore | p. 24 |
| Recognition of Hits in a Target | p. 30 |
| Disparity Estimation Method Based on Reliability Space Using Color Edge | p. 35 |
| Web-Based IP Reuse CAD System, Flowrian | p. 43 |
| Medical Image Segmentation Using Modified Level-Set Model with Multi-Scale Gradient* Vector Flow | p. 49 |
| Generalized Hypersphere d-Metric in Rough Measures and Image Analysis | p. 58 |
| Semantic Supervised Clustering Approach to Classify Land Cover in Remotely Sensed Images | p. 68 |
| Fuzzifted Probabilistic Rough Measures in Image Segmentation | p. 78 |
| JHUF-5 Steganalyzer: Huffman Based Steganalytic Features for Reliable Detection of YASS in JPEG Images | p. 87 |
| Region Covariance Matrices for Object Tracking in Quasi-Monte Carlo Filter | p. 98 |
| Target Detection Using PCA and Stochastic Features | p. 107 |
| Cloud Image Resolution Enhancement Method Using Loss Information Estimation | p. 115 |
| Multiple Ship Detection and Tracking Using Background Registration and Morphological Operations | p. 121 |
| A Fast Motion Estimation Algorithm Using Unequal Search and Criterion for Video Coding | p. 127 |
| A Survey on Automatic Speaker Recognition Systems | p. 134 |
| FITVQSPC: Fast and Improved Transformed Vector Quantization Using Static Pattern Clustering | p. 146 |
| New Data Hiding Scheme Using Method of Embedding Two Bits Data into Two DCT Coefficients | p. 156 |
| Design and Implementation of a Video-Zoom Driven Digital Audio-Zoom System for Portable Digital Imaging Devices | p. 165 |
| An Item-Based Collaborative Filtering Algorithm Utilizing the Average Rating for Items | p. 175 |
| Validation of Classifiers for Facial Photograph Sorting Performance | p. 184 |
| Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks | p. 196 |
| Fusion Render Cloud System for 3D Contents Using a Super Computer | p. 204 |
| On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images | p. 212 |
| The iPad and EFL Digital Literacy | p. 224 |
| Dematerialization and Deformalization of the EFL/ESL Textbook - Literature Review and Relevant Issues | p. 235 |
| Real-Time Adaptive Shot Change Detection Model | p. 245 |
| Search for Effective Distance Learning in Developing Countries Using Multimedia Technology | p. 253 |
| Scheduling and Planning Software for Corrugation Process | p. 260 |
| Hierarchical Data Structures for Accessing Spatial Data | p. 267 |
| OSI Layer Wise Security Analysis of Wireless Sensor Network | p. 275 |
| Business Planning in the Light of Neuro-fuzzy and Predictive Forecasting | p. 283 |
| Identification of Plant Using Leaf Image Analysis | p. 291 |
| Using Incentives to Reduce Active Network Privacy Threats and Vulnerbilities | p. 304 |
| Security Encryption Scheme for Communication of Web Based Control Systems | p. 317 |
| Author Index | p. 327 |
| Table of Contents provided by Ingram. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.