The common treatments of melancholia are psychotherapy and taking medicines. The psychotherapy treatment which
this study focuses on is limited by time and location. It is easier for psychiatrists to grasp information from clinical
manifestation but it is difficult for psychiatrists to collect information from patients' daily conversations or emotion. To
design a system which psychiatrists enable to capture patients' daily symptoms will show great help in the treatment.
This study proposes to use fuzzy data mining algorithm to find association rules among keywords segmented from
patients' daily voice/text messages to assist psychiatrists extract useful information before outpatient service. Patients of
melancholia can use devices such as mobile phones or computers to record their own emotion anytime and anywhere and
then uploading the recorded files to the back-end server for further analysis. The analytical results can be used for
psychiatrists to diagnose patients' degrees of melancholia. Experimental results will be given to verify the effectiveness
of the proposed methodology.
KEYWORDS: Databases, Personal digital assistants, Telecommunications, Control systems, Computer security, Wireless communications, Data storage, Associative arrays, System identification, Mobile devices
An RFID-based mobile handheld inventory management system is proposed in this paper. Differing from the manual
inventory management method, the proposed system works on the personal digital assistant (PDA) with an RFID reader.
The system identifies electronic tags on the properties and checks the property information in the back-end database
server through a ubiquitous wireless network. The system also provides a set of functions to manage the back-end
inventory database and assigns different levels of access privilege according to various user categories. In the back-end
database server, to prevent improper or illegal accesses, the server not only stores the inventory database and user
privilege information, but also keeps track of the user activities in the server including the login and logout time and
location, the records of database accessing, and every modification of the tables. Some experimental results are presented
to verify the applicability of the integrated RFID-based mobile handheld inventory management system.
In this paper, we propose an intelligent bird information retrieval system which aims to construct a mobility-learning
activity under the up-to-date wireless technology. The system consists of a Tablet PC and PDAs with wireless networking
capabilities. The PDA is equipped with a friendly retrieval interface and a good learning environment. In our system, users
only need to click the buttons or input the keywords to retrieve bird information. Besides, users can discuss or share their
information and knowledge via the wireless network. Our system saves bird information in four categories including "Introduction," "Images," "Sound," "Streaming Media," and "Ecological Memo." The integral knowledge helps users
understand more about birds. Data mining and fuzzy association rules are applied to recommend users those birds they
may be interested in. A streaming server on the Tablet PC is built to provide the streaming media for PDA users. By this
way, PDA users can enjoy the multimedia from Tablet PC in real time without downloading completely. Finally, the
system is a perfect tool for outdoor teaching and can be easily extended to provide navigation and touring services for
national parks or museums.
One of the great challenges of the existing watermarking methods is their limited resistance to the extensive geometric
attacks. Geometric attacks can be decomposed into two classes: global distortion such as rotations and translations and
local distortion such as the StirMark attack. We have found that the weakness of multiple watermark embedding methods
that were initially designed to resist geometric attacks is the inability to withstand the combination of geometric attacks.
In this paper, the watermark is used in the gray-scale authentication image. We propose a robust image watermarking
scheme that can withstand the geometric attacks by using local tri-mesh feature points. Our proposed method can resynchronize
the attacked images and is independent of the embedding and authentication process. The geometric
invariant scheme is combined with the complementary modulation embedding strategy to enhance the resistance of
geometric attacks. The experimental results verify that the proposed scheme is effective for geometric attacks.
Conference Committee Involvement (10)
Mobile Multimedia/Image Processing, Security, and Applications 2017
10 April 2017 | Anaheim, CA, United States
Mobile Multimedia/Image Processing, Security, and Applications 2016
18 April 2016 | Baltimore, MD, United States
Mobile Multimedia/Image Processing, Security, and Applications 2015
20 April 2015 | Baltimore, MD, United States
Mobile Multimedia/Image Processing, Security, and Applications 2014
5 May 2014 | Baltimore, MD, United States
Mobile Multimedia/Image Processing, Security, and Applications 2013
29 April 2013 | Baltimore, Maryland, United States
Mobile Multimedia/Image Processing, Security, and Applications 2012
23 April 2012 | Baltimore, Maryland, United States
Mobile Multimedia/Image Processing, Security, and Applications 2011
25 April 2011 | Orlando, Florida, United States
Mobile Multimedia/Image Processing, Security, and Applications 2010
5 April 2010 | Orlando, Florida, United States
Mobile Multimedia/Image Processing, Security, and Applications 2009
14 April 2009 | Orlando, Florida, United States
Mobile Multimedia/Image Processing, Security, and Applications 2008
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.