Search For:

Displaying 1-50 out of 213 total
Automatic Deep Web Query Results Extraction Based on Tag Trees
Found in: Computational Intelligence and Design, International Symposium on
By Ying Xie, Wanli Zuo, Fengling He, Ying Wang
Issue Date:December 2009
pp. 308-311
Automatic Deep Web query results extraction is a key step of Deep Web query results processing. Extracting the query results correctly is the precondition and guarantee of realizing semantic annotation and data integration. In this paper, a simple method f...
 
Global Connectivity for Mobile IPv6-Based Ad Hoc Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Chiung-Ying Wang, Cheng-Ying Li, Ren-Hung Hwang, Yuh-Shyan Chen
Issue Date:March 2005
pp. 807-812
The IPv6-enabled network architecture has recently attracted much attention. In this paper, we address the issue of connecting MANETs to global IPv6 networks while supporting IPv6 mobility. Specifically, we propose a self-organizing, self-addressing, self-...
 
Using Proximity and Homophily to Connect Conference Attendees in a Mobile Social Network
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Alvin Chin,Bin Xu,Fangxi Yin,Xia Wang,Wei Wang,Xiaoguang Fan,Dezhi Hong,Ying Wang
Issue Date:June 2012
pp. 79-87
In an academic conference, it is difficult to find people that share similar research interests with you, and it is also a chore to add them into your personal online social network for later communication. Aiming at helping the conference attendees better...
 
Lighting systems control for demand response
Found in: Innovative Smart Grid Technologies, IEEE PES
By Sri Andari Husen,Ashish Pandharipande,Ludo Tolhuizen, Ying Wang, Meng Zhao
Issue Date:January 2012
pp. 1-6
Lighting is a major part of energy consumption in buildings. Lighting systems will thus be one of the important component systems of a smart grid for dynamic load management services like demand response. We consider the problem of control of multiple ligh...
 
New Method of Extracting Human SEP
Found in: Information Science and Engineering, International Conference on
By Ying Wang, Yan Ni, Bao-zhi Liu, Huai-Yu Fan, Zheng-Xiang Xie
Issue Date:December 2009
pp. 612-615
Object To use an auto-reference, auto-correlative and adaptive interference cancellation theories and techniques (AAA-ICT) to extract the human somatosensory evoked potential(SEP). Methods: The electrical stimulation signals were used to stimulate the body...
 
The Training Design and Implementation of Stimulating Students' Learning Motivation of University Novice Teachers Based on Web
Found in: 2013 12th International Symposium on Distributed Computing and Applications to Business, Engineering & Science (DCABES)
By Lina Sun,Linlin Wang,Ying Wang,Yuanlin Chen
Issue Date:September 2013
pp. 191-194
Most university teachers pay attention to stimulating the students' learning motivation. Moreover, stimulating the students' learning motivation is a capability of IBSTPI (the Internet Board of Standards for Training, Performance and Instruction). In this ...
 
Object Tracking with Sparse Representation and Annealed Particle Filter
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Ying Wang,Xiangyang Wang,Wanggen Wan
Issue Date:July 2013
pp. 374-379
In this paper, we propose a new visual tracking algorithm, SRAPF, for object tracking, which is based on sparse representation and annealed particle filter. To find the tracking target at a new frame, each target candidate is sparsely represented by target...
 
Study on Decision Model of Right-Turning Vehicle Accept the Gap of Straight-Going Bicycles Based on Photogrammetry
Found in: 2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)
By Ying Wang,Xing-qiang Zhang,Qing-hua Hu,Shen Wang
Issue Date:June 2013
pp. 1265-1267
Firstly, in this paper, the gap is quantized by the distance and the parameters of mixed traffic flow, e.g. acceleration, velocity, density and space headway, are collected by the photogrammetry. Seconondly based on the dominant factor analysis of right-tu...
 
Advanced Nitrogen Removal Via Intracellular Polymers in a Post-denitrification Sequencing Batch Reactor (SBR)
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Zhu Ru-Long,Wang Shu-Ying,Wang Kai,Gong Ling-Xiao,Miao Lei
Issue Date:January 2013
pp. 231-234
In order to investigate the nitrogen removal performance of sequencing batch reactor (SBR) process treating the wastewater with high COD/NH+4-N ratio, a post-denitrification SBR was proposed to treat the immature landfill leach ate. No extra carbon source ...
 
A Method of Predicting News Update Time Combining Exponential Smoothing and Naive Bayes
Found in: 2012 Fourth International Symposium on Information Science and Engineering (ISISE)
By Mengmeng Wang,Xianglin Zuo,Ying Wang,Wanli Zuo
Issue Date:December 2012
pp. 227-231
The time of web page update appears to be erratic, how the user can fast access to valuable information has become one of the hot spots. From the view of application, we can use mathematical models to forecast the update time of news reports, although it c...
 
Connecting People at a Conference: A Study of Influence between Offline and Online Using a Mobile Social Application
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Xiang Zuo,Alvin Chin,Xiaoguang Fan,Bin Xu,Dezhi Hong,Ying Wang,Xia Wang
Issue Date:November 2012
pp. 277-284
Location-based mobile applications such as Foursquare and Jiepang help bridge the gap between offline and online. People that we encounter and connect with around physical resources such as conferences, provide opportunities for extending our social networ...
 
The Design and Building of Metadata Model in XBRL Taxonomy Engineering
Found in: Computational Intelligence and Design, International Symposium on
By Ding Wang,Min Huang,Ying Wang,Peng Chen
Issue Date:October 2011
pp. 11-14
XBRL is the latest technology used in processing accounting information. The core part of XBRL is the creation and application of taxonomy. XBRL taxonomy engineering is a special case of software engineering. From the software engineering perspective, the ...
 
A Segmentation Method of Smoke in Forest-Fire Image Based on FBM and Region Growing
Found in: Chaos-Fractals Theories and Applications, International Workshop on
By Xialli Wang,Aiping Jiang,Yingli Wang
Issue Date:October 2011
pp. 390-393
A segmentation method of smoke in forest-fire image based on FBM and Region Growing is outlined in this paper. When segmenting forest fire images, some edges can't be segmented accurately. This method which will be introduced then can solve the foregoing p...
 
Analysis of the IFRS Taxonomy Extension Mode
Found in: Business Computing and Global Informatization, International Conference on
By Ding Wang, Min Huang, Ying Wang
Issue Date:July 2011
pp. 461-464
XBRL is the latest technology used in processing accounting information. The core part of XBRL is the development and application of taxonomy. In the trend of international convergence of accounting standards, more and more organizations and institutions d...
 
Charging-Transient Based SLG Fault Location in Neutral-Unearthed Distribution System
Found in: Asia-Pacific Power and Energy Engineering Conference
By Wenhai Zhang, Xianyong Xiao, Ying Wang, Tianwen Zheng, Hong Zhao, Henggui Wang
Issue Date:March 2011
pp. 1-4
NA
 
Cloud Model Based Evaluation of Equipment Sensitivity to Voltage Sag
Found in: Asia-Pacific Power and Energy Engineering Conference
By Hong Zhao, Ying Wang, Xian-yong Xiao, Heng-gui Wang
Issue Date:March 2011
pp. 1-4
NA
 
A High Accuracy Harmonic Analysis Method Based on All-Phase and Interpolated FFT in Power System
Found in: Asia-Pacific Power and Energy Engineering Conference
By Xiaodan Yan, Shibing Tan, Jun Wang, Ying Wang
Issue Date:March 2011
pp. 1-4
NA
 
Development of the S-band high power klystron with bandwidth of 12%
Found in: IEEE International Vacuum Electronics Conference
By Yong Wang, Jian Zhang, Ying Wang, Zhi-qiang Zhang
Issue Date:February 2011
pp. 33-34
The development of broadband high power klystron has being done in the Institute of Electronics, Chinese Academy of Sciences (IECAS), and the breakthrough of the bandwidth of klystron has been obtained continuously. In S-band, after the achievement of 10% ...
 
Harmonic Analysis of Power Quality Monitoring Device Based on IEC61850
Found in: Electrical and Control Engineering, International Conference on
By Ying Wang, Jun Wang
Issue Date:June 2010
pp. 1117-1120
Based on IEC61850, a framework of power quality monitoring device is constructed in this paper. In the meantime, an improved algorithm is proposed based on fast Fourier transform and wavelet transform for the harmonics analysis in the power quality monitor...
 
Character Mapping Cipher Index Scheme for Character Data in Outsourced Databases
Found in: Computational Intelligence and Security, International Conference on
By Ning Wang, Wei Zhao, Ying Wang, Qi He, Guohua Liu
Issue Date:December 2009
pp. 488-492
Cipher index is a well established technology for improving query efficiency. But existing cipher index schemes are aimed at numeric data. Thus, a Character Mapping Cipher Index Scheme applied to ODBs is presented to solve accurate query on cryptogram, whi...
 
Artificial Neural Network Prediction for Seismic Response of Bridge Structure
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Wang Ying, Wang Chong, Li Hui, Zhao Renda
Issue Date:November 2009
pp. 503-506
Based on identification and prediction ability of neural networks for nonlinear systems, an improved BP network was adopted to predict the seismic responses of the bridge structures. First, a multi-player BP networks based on Levenberg-Marquardt algorithm ...
 
A Network Emergent Computing Model Based on Cellular Automaton
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Hong Tang, Ying Wang, Haitao Wang, Yu Wu
Issue Date:October 2009
pp. 240-245
Emergent computation is a relatively new approach for understanding the behaviors of complex systems. Central to this approach is the idea that system-level behavior emerges from interaction among individual elements. This paper proposes a network emergent...
 
The Design and Implementation of Hardware Task Configuration Management Unit on Dynamically Reconfigurable SoC
Found in: Embedded Software and Systems, Second International Conference on
By Xiao-Wei Wang, Wei-Nan Chen, Ying Wang, Hong-Jun You, Cheng-Lian Peng
Issue Date:May 2009
pp. 179-184
The advantages and the flexibility introduced into the hardware implementation by partial dynamic reconfiguration have rapidly changed the design flow of embedded systems. Configuration management is an important issue in operating system for dynamically r...
 
A Co-design Flow for Reconfigurable Embedded Computing System with RTOS Support
Found in: Embedded Software and Systems, Second International Conference on
By Xiao-Wei Wang, Wei-Nan Chen, Ying Wang, Cheng-Lian Peng
Issue Date:May 2009
pp. 467-474
Reconfigurable system provides both flexibility of software and performance of hardware. It is a significant trend in embedded application domain. Some new reconfigurable technologies and technology-dependent tools have been developed, but the whole design...
 
The Hardware Thread Interface Design and Adaptation on Dynamically Reconfigurable SoC
Found in: Embedded Software and Systems, Second International Conference on
By Ying Wang, Wei-Nan Chen, Xiao-Wei Wang, Hong-Jun You, Cheng-Lian Peng
Issue Date:May 2009
pp. 173-178
Nowadays, one of the challenges for creating a mixed hardware/software application on dynamically reconfigurable SoC is how to provide a unified programming model for hybrid hardware/software tasks and a portable interface adaptation for dynamically reconf...
 
Research on Architecture of Information Security in Enterprise Portal
Found in: Software Engineering, World Congress on
By Wei Wang, Ying Wang
Issue Date:May 2009
pp. 420-424
Analyzing the strategies and methods of information security in current Enterprise Portal, pointing out their shortages, and then design several function modules such as Role-Based-Fully Access Control, Right-Inherited-Hierarchically and Right Management, ...
 
Optimization for Multi-Resource Allocation and Leveling Based on a Self-Adaptive Ant Colony Algorithm
Found in: Computational Intelligence and Security, International Conference on
By Zhengjia Wu, Liping Zhang, Ying Wang, Kui Wang
Issue Date:December 2008
pp. 47-51
In this paper, Optimization of multi-resource allocation and leveling is studied. A mathematical model of multi-resource allocation and leveling problem for bi-objective and multi-restricted condition is set up. A Self-Adaptive ant colony algorithm for the...
 
Formalization of Fashion Sensory Data Based on Fuzzy Set Theory
Found in: International Conference on Natural Computation
By Li-chuan Wang, Yan Chen, Ying Wang
Issue Date:October 2008
pp. 80-84
Sensory Engineering (SE) was applied in fashion industry for market exploring, consumer behavior evaluation and personalized product designing. The consumer perceptions on products were investigated and analyzed. The fashion sensory data were established f...
 
A New Placement Approach to Minimizing FPGA Reconfiguration Data
Found in: Embedded Software and Systems, Second International Conference on
By Weinan Chen, Ying Wang, Xiaowei Wang, Chenglian Peng
Issue Date:July 2008
pp. 169-174
Dynamic reconfiguration for fine-grained architectures is still associated with significant reconfiguration costs. In this paper, a new placement algorithm is proposed to reduce the size of FPGA reconfiguration bitstream. The algorithm is modified on the e...
 
The Design of Optimal Period Interleaver
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying Wang, Xinjun Du, Hui Li, Yumin Wang
Issue Date:March 2008
pp. 413-415
The optimal period interleaver can break the divisibility of the input sequence with N0 as the period of the feedback polynomial. But how to find the optimal period interleaver is still in consideration. Based on the divisibility of polynomial, we give a m...
 
Research on Ontology Matching Approach in Semantic Web
Found in: International Conference on Internet Computing in Science and Engineering
By Rubo Zhang, Ying Wang, Jing Wang
Issue Date:January 2008
pp. 254-257
The major purpose of applying ontology is to share and reuse knowledge. However, a large amount of heterogeneous ontologies are constructed in Semantic Web, because there is not a common criterion for building ontology. Under the background, an ontology ma...
 
Research on Semantic Web-Oriented Ontology Model
Found in: International Conference on Internet Computing in Science and Engineering
By Jing Wang, Jianpei Zhang, Ying Wang
Issue Date:January 2008
pp. 258-261
The World Wide Web is an open and distributed repository with lots of information, in which the ontologies can help users to get their required information. This paper improves representation method of the existing ontology by introducing matter-element an...
 
Research on an Ant Colony ISODATA Algorithm for Clustering Analysis in Real Time Computer Simulation
Found in: Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on
By Ying Wang, Ren-Wang Li, Bin Li, Peng-Ju Zhang, Yao-Hui Li
Issue Date:December 2007
pp. 223-229
This paper intends to propose an advanced clustering method, ant colony ISODATA algorithm (ACIA) in real time computer simulation. Ant colony algorithm is used as the method of cursory clustering based on ants piling up their corpses and classifying their ...
 
RST in Decision Tree Pruning
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jin-Mao Wei, Shu-Qin Wang, Jun-Ping You, Guo-Ying Wang
Issue Date:August 2007
pp. 213-217
Pruning decision trees is an effective way to overwhelm over-fitting in practice. Various pruning methods have been proposed in many literatures. Though these methods prune decision trees in the light of the principle of 'Minimum De- scription Length', the...
 
Rectification and Calibration for Biomedical Image Processing
Found in: Innovative Computing ,Information and Control, International Conference on
By Li Jupeng, Chen Houjin, Wang Ying, Wang Wei
Issue Date:September 2006
pp. 564-567
Biomedical image analysis is the Cross- Disciplinary science of information and biology, which is significant in theory and clinic diagnosis [1]. Taking the microcirculation image as object, this paper studies some key problems in the biomedical image proc...
 
The Research on data semantic description framework using RDF/XML
Found in: Semantics, Knowledge and Grid, International Conference on
By Ding Ying, Wang Chunlan, Wang Maoguang
Issue Date:November 2005
pp. 138
This paper gives a framework of data semantic description using RDF/XML. The paper first clarifies the functions and characters of XML and RDF, especially the XML Schema and RDF Schema which are important to the framework to put forward. Subsequently ,it p...
   
QueryFind: Search Ranking Based on Users? Feedback and Expert?s Agreement
Found in: e-Technology, e-Commerce, and e-Services, IEEE International Conference on
By Po-Hsiang Wang, Jung-Ying Wang, Hahn-Ming Lee
Issue Date:March 2004
pp. 299-304
A novel ranking method named as QueryFind, based on learning from historical query logs, is proposed to predict users? information needs and reduce the seeking time from the search result list. Our method uses not only the users? feedback but also the reco...
 
A Layered Reference Model of the Brain
Found in: Cognitive Informatics, IEEE International Conference on
By Yingxu Wang, Shushma Patel, Dilip Patel, Ying Wang
Issue Date:August 2003
pp. 7
Based on the advances of research in cognitive informatics and related fields, this paper attempts to develop a layered reference model of the brain that explains the functional mechanisms and cognitive processes of the natural intelligence. A variety of l...
 
A Method for Security Enhancements in AODV Protocol
Found in: Advanced Information Networking and Applications, International Conference on
By Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Issue Date:March 2003
pp. 237
An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multi-hop paths, without the help of any infrastructure. Although many ad hoc network routing protocols have been proposed (DSR, AODV, ZRP, etc), ...
 
A Group Key Establishment Scheme for Ad Hoc Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
Issue Date:March 2003
pp. 518
Since the publication of 2-party Diffie-Hellman (DH) key exchange in 1976, various solutions have been proposed to extend Diffie-Hellman key exchange to multiparty key distribution. For the special operational requirement of ad hoc networks, none of these ...
 
Cognitive Models of the Brain
Found in: Cognitive Informatics, IEEE International Conference on
By Yingxu Wang, Ying Wang
Issue Date:August 2002
pp. 259
<p>The human brain is the most complicated organ in the universe and a new frontier yet to be explored in an interdisciplinary approach. Investigation into the brain is a unique problem that requires recursive mental power to explore the brain by the...
 
Efficient Image Dehazing with Boundary Constraint and Contextual Regularization
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Gaofeng Meng,Ying Wang,Jiangyong Duan,Shiming Xiang,Chunhong Pan
Issue Date:December 2013
pp. 617-624
Images captured in foggy weather conditions often suffer from bad visibility. In this paper, we propose an efficient regularization method to remove hazes from a single input image. Our method benefits much from an exploration on the inherent boundary cons...
 
Robust Tracking Integrated with Detection and Online Learning
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Bo Zhao,Hong Du,Ying Wang,Xiaozheng Zhang
Issue Date:December 2013
pp. 537-541
This paper focuses on long-term target tracking which need defining bounding-box in the first frame, and then performing target tracking automatically. Observing that neither tracking nor detection can solve long-term tracking task independently, we combin...
 
Sketch Based Anomaly Detection Scheme in Wireless Sensor Networks
Found in: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Guorui Li, Ying Wang
Issue Date:October 2013
pp. 344-348
The constrained capacity of wireless sensor nodes and harsh, unattended deploy environments make the data collected by sensor nodes usually unreliable. In this paper, we propose a sketch based anomaly detection scheme in order to detect the anomaly data va...
 
The Construction and Validation Studies on Principle Prototype of Electric Force-feeling Simulation System
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Lu Ying,Wang Yongliang,Sun Fangyi,Zhao Yulong
Issue Date:June 2013
pp. 1048-1051
In order to improve the control loading fidelity of helicopter flight simulator force-feeling simulation system, this paper develops the principle prototype of force-feeling simulation system, establishes the electro-motive force servo loading system model...
 
Research on Forecasting Method of GIC Caused by Gradual Commencement Magnetic Storm
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Pengyang Zhou,Ying Wang,Lianguang Liu
Issue Date:June 2013
pp. 1975-1978
The mechanism of power grid GIC is complex and has multiple factors. The geomagnetic activity is one of the main factors. In this paper, by using the wavelet neural network, a forecasting model for GIC caused by gradual commencement magnetic storm is intro...
 
Network Community Discovery Method Based on User Link and Interest
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Jianzhuo Yan,Ying Wang,Liying Fang,Hexin Duan,Mengyao Qi
Issue Date:June 2013
pp. 626-629
In order to enhance the service quality of network community, satisfy the growing demand of community users, this paper analyzes the content of network community from different aspects and provides a comprehensive method to divide the network community use...
 
Factors that Influence Transportation Security Funding: A Data Mining Analysis on U.S. Airport Improvement Grants
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Ying Wang,Francis Andoh-Baidoo,Jun Sun
Issue Date:January 2013
pp. 3778-3786
Terrorist attacks have awakened the awareness of nations around the globe on transportation security/safety. Effective security enhancement measures are needed to prevent terrorist attacks. Prior to the September 11 attack, the Federal Aviation Administrat...
   
Implementation of Asynchronous Receiver/ Transmitter Based on FPGA
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Xiao-Li Hu,Feng-Ying Wang,Bo Chen
Issue Date:November 2012
pp. 226-228
This article discusses the basic principles of the universal asynchronous receiver/transmitter, and design and realize of universal asynchronous receiver/transmitter base on Alter a NIOSII Development Board integrated in EDA experiment platform. the main c...
 
Based on Image Salient Features Network Image Retrieval Method
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Kai Yan,Kefeng Feng,Ying Wang,Bo Pan
Issue Date:November 2012
pp. 293-297
Traditional image retrieval depends on the images embedded in text messages, text description of the limitations of image content, resulting in low quality of image retrieval. The local information extracted image itself, the use of local features LSH imag...
 
 1  2 Next >>