Search For:

Displaying 1-21 out of 21 total
Speeding Up Similarity Queries over Large Chinese Calligraphic Character Databases Using Data Grid
Found in: Grid and Cloud Computing, International Conference on
By Yi Zhuang, Yueting Zhuang, Qing Li, Fei Wu
Issue Date:August 2007
pp. 499-506
This paper proposes a novel data-grid-based k nearest neighbor query over large Chinese calligraphic character databases, which can significantly speed up the retrieval efficiency. Three steps are made. Firstly, when a user submits a query request to a que...
 
Double Guarantee for Security Localization in Wireless Sensor Network
Found in: Wireless and Mobile Communications, International Conference on
By Jingjing Gu, Songcan Chen, Yi Zhuang
Issue Date:August 2009
pp. 99-104
Wireless Sensor Network security localization technologies are usually designed just for one type of attack or single step transmission for the message packets, which would be less robust in complex network environment. In this paper, we propose a novel WS...
 
Indexing high-dimensional data in dual distance spaces: a symmetrical encoding approach
Found in: Proceedings of the 11th international conference on Extending database technology: Advances in database technology (EDBT '08)
By Lei Chen, Qing Li, Yi Yu, Yi Zhuang, Yueting Zhuang
Issue Date:March 2008
pp. 1-3
Due to the well-known dimensionality curse problem, search in a high-dimensional space is considered as a "hard" problem. In this paper, a novel symmetrical encoding-based index structure, which is called EHD-Tree (for symmetrical Encoding-based Hybrid Dis...
     
An Advanced Rapid Alert System for Food Safety
Found in: 2012 IEEE 9th International Conference on e-Business Engineering (ICEBE)
By Whisker T.Y. Law,Dickson K.W. Chiu,Haiyang Hu,Yi Zhuang,Hua Hu
Issue Date:September 2012
pp. 361-366
Globalization of food production has increased the possibility of public health incidents, involving food contaminated with pathogens or chemicals. In recent years, food poisoning and improper handling of food has caused food safety incidents of internatio...
 
V2 RMC: Vertical Video Retrieval System in Mobile Cloud Computing Environment
Found in: Intelligent Computation Technology and Automation, International Conference on
By Haohong Li,Yi Zhuang
Issue Date:January 2012
pp. 378-381
With the rapid development of Internet and multimedia technologies, video data has become one of the most important information in the Internet. In this paper, we have implemented a vertical video retrieval system based on mobile cloud network called V2RMC...
 
A Multi-agent Infrastructure for Healthcare Process Improvement Using Ontology
Found in: E-Business Engineering, IEEE International Conference on
By Derek F.M. Sun,Dickson K.W. Chiu,Nan Jiang,Haiyang Hu,Yi Zhuang,Hua Hu
Issue Date:October 2011
pp. 392-396
With the recent rapid advancement in healthcare technologies, there have been increasing expectations in the healthcare services. However, patients are often dissatisfied with the healthcare services and complain through different channels. In this paper, ...
 
Security Alert Management System for Internet Data Center Based on ISO/IEC 27001 Ontology
Found in: E-Business Engineering, IEEE International Conference on
By Terry M.F. Tsang, Thomas M.W. Yeung, Dickson K.W. Chiu, Haiyang Hu, Yi Zhuang, Hua Hu
Issue Date:November 2010
pp. 178-183
Internet Data Centers (IDC) emerge as a major network service platform to converge Internet related services and applications to one location, managing servers, networks, together with valuable and sensitive data of many enterprises. Therefore, an appropri...
 
The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing Algorithm
Found in: Network and System Security, International Conference on
By Yi Zhuang
Issue Date:September 2010
pp. 419-424
This paper proposes a partition-based uncertain high-dimensional indexing algorithm, called PU-Tree. In the PU-Tree, all (n)data objects are first grouped into some clusters by a k-Means clustering algorithm. Then each object’s corresponding uncertain sphe...
 
A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency Study
Found in: Network and System Security, International Conference on
By Yi Zhuang
Issue Date:September 2010
pp. 508-514
The research of cognitive science indicates that manifold-learning-based facial image retrieval is based on human perception, which can accurately capture the intrinsic similarity of two facial images. The paper proposes a pivot-based Distributed Pseudo Si...
 
The Implement of an Image Stitching Algorithm Based on Feature Extraction
Found in: Education Technology and Training, International Conference on
By Yi Zhuang, Xinrong Hu, Jianchun Wang
Issue Date:December 2009
pp. 327-330
Image stitching is one of important technologies in image processing field. It implements a seamless connection with two or more images which have overlapping part to get higher resolution or wider viewing angle image. As the amount of tedious calculation,...
 
The Dynamic Cloth Simulation Performance Analysis Based on the Improved Spring-mass Model
Found in: Wireless Networks and Information Systems, International Conference on
By Jianchun Wang, Xinrong Hu, Yi Zhuang
Issue Date:December 2009
pp. 282-285
This paper mainly introduces the improved classical spring-mass model, some satisfied spring parameters can be obtained with the data-driven strategy and computer assisted tomography technology, and if some external forces are added, we can get more realis...
 
Designing a Credit Approval System Using Web Services, BPEL, and AJAX
Found in: E-Business Engineering, IEEE International Conference on
By Vincent C.T. Chan, Dickson K.W. Chiu, Michelle Watson, Patrick C.K. Hung, Haiyang Hu, Hua Hu, Yi Zhuang
Issue Date:October 2009
pp. 287-294
In the business world, financial institutions, like banks and investment firms, heavily rely on technology to manipulate daily operations and support business. Many more business processes have now become automated and require procedures to be approved. Fo...
 
Ontology Based Content Management for Digital Television Services
Found in: E-Business Engineering, IEEE International Conference on
By Benjamin Lui, Dickson K.W. Chiu, Haiyang Hu, Hua Hu, Yi Zhuang
Issue Date:October 2009
pp. 565-570
Traditional Content Management Systems (CMS) for Digital Television (TV) services usually attempt to provide friendly user interfaces with some content information for attracting new subscriptions. However, the searching and subscription functions provide ...
 
Information Security Risk Assessment Based on Artificial Immune Danger Theory
Found in: Computing in the Global Information Technology, International Multi-Conference on
By Yi Zhuang, Xiaorong Li, Bin Xu, Bo Zhou
Issue Date:August 2009
pp. 169-174
This paper puts forward an information security risk assessment model, which based on danger theory, and provides a risk calculation method based on this model. It aims at the problem of the strong subjectivity and improving the accuracy and real time perf...
 
Determining task priority in dual-shore collaborative software design via Petri Net based behavior compatibility analysis
Found in: International Conference on Computer Supported Cooperative Work in Design
By Bin Xu, Yun Ling, Xiaojun Li, Yi Zhuang, Bo Jiang
Issue Date:April 2009
pp. 179-184
A well arranged task priority in dual-shore collaborative software design phase will smooth the collaboration and reduces the potential coordination lag. However, it is really difficult to determine the priority when there are many collaboration tasks and ...
 
Multi-query Optimization for Distributed Similarity Query Processing
Found in: Distributed Computing Systems, International Conference on
By Yi Zhuang, Qing Li, Lei Chen
Issue Date:June 2008
pp. 639-646
This paper considers a multi-query optimization issue for distributed similarity query processing, which attempts to exploit the dependencies in the derivation of a query evaluation plan. To the best of our knowledge, this is the first work investigating a...
 
Modeling dependability features for Real-Time Embedded Systems
Found in: IEEE Transactions on Dependable and Secure Computing
By Siru Ni,Yi Zhuang,Zining Cao,Xiangying Kong
Issue Date:May 2014
pp. 1
Ensuring dependability is significant in the development process of Real-Time Embedded Systems (RTESs). The dependability of a system model is usually presented by temporal and data constraints, which are ambiguous and incomplete when using semi-formal met...
 
Hierarchical I/O Scheduling for Collective I/O
Found in: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Jialin Liu,Yong Chen,Yi Zhuang
Issue Date:May 2013
pp. 211-218
The non-contiguous access pattern of many scientific applications results in a large number of I/O requests, which can seriously limit the data-access performance. Collective I/O has been widely used to address this issue. However, the performance of colle...
 
Image Retrieval System for Web: Webscope-CBIR
Found in: Database and Expert Systems Applications, International Workshop on
By Wu Yi, Zhuang Yue-Ting, Pan Yun-He
Issue Date:September 2000
pp. 620
With the widespread usage of images on Web, the retrieval need for images has been increasing rapidly. But traditional text retrieval system is not fit for the application of image retrieval. We therefore designed Webscope-CBIR, an image retrieval system f...
 
TF-Tree: an interactive and efficient retrieval of Chinese calligraphic manuscript images based on triple features
Found in: Proceedings of the ACM International Conference on Image and Video Retrieval (CIVR '10)
By Yi Zhuang
Issue Date:July 2010
pp. 113-120
This paper proposes an efficient indexing scheme called <u>T</u>riple-<u>F</u>eature-<u>Tree</u>(TF-Tree) to facilitate an interactive retrieval of Chinese calligraphic manuscript images based on triple features such as ...
     
Computing visibility on terrains in external memory
Found in: Journal of Experimental Algorithmics (JEA)
By Herman Haverkort, Laura Toma, Yi Zhuang
Issue Date:February 2009
pp. 1-22
Given an arbitrary viewpoint v and a terrain, the visibility map or viewshed of v is the set of points in the terrain that are visible from v. In this article we consider the problem of computing the viewshed of a point on a very large grid terrain in exte...
     
 1