Search For:

Displaying 1-50 out of 88 total
Automatic Detection and Tracking of Maneuverable Birds in Videos
Found in: Computational Intelligence and Security, International Conference on
By Xiao-yan Zhang, Xiao-juan Wu, Xin Zhou, Xiao-gang Wang, Yuan-yuan Zhang
Issue Date:December 2008
pp. 185-189
In this paper, we try to detect and track maneuverable birds in captured videos for further automatic research. To avoid abrupt scene change, videos are captured by pointing the camera upwards and making the image against the sky. Two levels (pixel level a...
 
A New Model of Describing Mutual Exclusion of Roles and Its Realization
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Yuan-sheng Lou,Sheng Chen,Wen-yuan Zhang,Hong-tao Xu
Issue Date:October 2012
pp. 256-259
The mutual exclusion of roles as an effective means of implementing separation of duty, has an important role on access control in RBAC systems. This paper deeply discusses the types that the mutual exclusion of roles come from, and puts forward a model of...
 
Collision and Corruption Awareness Enhancement to IEEE 802.11 DCF: Scheme and Performance Analysis
Found in: Communications and Mobile Computing, International Conference on
By Cheng Yuan, Zhang Yuan, Gao Xiqi
Issue Date:January 2009
pp. 407-411
The main motivation of the medium access control (MAC) protocol in 802.11 is to meet the need of high throughput and low access delay under distributed contention-based environment. Because the cause of transmission failures is unaware, a sender may misint...
 
Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test
Found in: Computer Science and Software Engineering, International Conference on
By Zhu Ning, Chen Xin-yuan, Zhang Yong-fu, Xin Si-yuan
Issue Date:December 2008
pp. 622-626
Attack model is the foundation for organizing and implementing attacks against the target system in Attack Resistance Test. By redefining the node of the attack tree model and redescribing the relation of the attack tree nodes, we build a penetration attac...
 
Study on Intelligent Optimization Model Based on Grey Relational Grade in Long?Medium Term Power Load Rolling Forecasting
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Dong-xiao Niu, Jian-rong Jia, Jia-liang Lv, Yuan Zhang
Issue Date:November 2008
pp. 227-232
According to the low sample and multifactor impact for long-medium term power load forecasting, the grey relational grade was used in screening factors, the combined model in BP neural network and SVM was established, and the multivariate variables and his...
 
The Error Correcting Markov Chains Study on Medium/Long Term Load Rolling Forecasting of SVM Based on Grey Relational Grade
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Dong-xiao Niu, Yuan Zhang, Jia-liang Lv, Jian-rong Jia
Issue Date:November 2008
pp. 233-238
According to the low sample and multifactor impact for long-medium term power load forecasting, the grey relational grade was used in screening factors, the combined model in BP neural network and SVM was established, and the multivariate variables and his...
 
Making eclipse attacks computationally infeasible in large-scale DHTs
Found in: IEEE International Performance Computing and Communications Conference
By Ren Zhang,Jianyu Zhang,Yu Chen,Nanhao Qin,Bingshuang Liu,Yuan Zhang
Issue Date:November 2011
pp. 1-8
The security aspect of Distributed Hash Tables (DHT-s), the principal model for structured P2P networks, has received considerable attention from research community, and the eclipse attack is one of the most severe threats targeting DHTs. Most of currently...
 
Research on Microwave Measurement for Grain Moisture Content in Granary
Found in: Computer-Aided Software Engineering, International Workshop on
By Yuying Jiang, Yuan Zhang
Issue Date:July 2009
pp. 327-330
A new method of grain moisture content measurement in granary is developed; it is based on the measuring principle and characteristics of microwave moisture content determination techniques. According to the relationship between the power attenuation, sign...
 
Incentive Mechanism of Supply Chain Inventory Management Based on Information Sharing
Found in: Business and Information Management, International Seminar on
By Qi Yuan, Zhang Qiong
Issue Date:December 2008
pp. 373-377
Information sharing and inventory management are increasingly recognized as areas generating potential improvements and creating competitive advantage to supply chain. Both of them have been analyzed extensively by number of researchers. However, there are...
 
Discussion on Some Issues in Large-Scale Project Management and Organization
Found in: Information Science and Engineering, International Conference on
By Yuan Zhang
Issue Date:December 2009
pp. 4262-4265
In China due to the scale of large projects too large and complex, which many deep-seated problems have also exposed in the implementation process. This paper analyzes the problems of the management model for the government and owners, management level, ce...
 
Hardware Layer Trusted Channel Model Based on the Trusted Platform Control Module
Found in: Computer and Information Science, ACIS International Conference on
By Mao Junjie,Guo Ying,Zhang Chongbin,Xu Yuan,Zhang Baofeng,Li Fengjuan,Xie Shihua,Jiang Wei
Issue Date:June 2012
pp. 572-576
this paper proposes a kind of hardware layer trusted channel model based on the trusted platform control module. Through being embedded into hardware equipment, measurement agent as well as control one constructs trusted computer system with hardware layer...
 
Research on the Maximum Flow in Large-scale Network
Found in: Computational Intelligence and Security, International Conference on
By Yan-ping Zhang,Bo Hua,Juan Jiang,Yuan Zhang,Xiao-yan Chen
Issue Date:December 2011
pp. 482-486
This article covers a problem that often arises in real life situations-the maximum flow problem. This problem is a classical combinatorial optimization problem, which arises in many engineering and scientific applications. It is also the important content...
 
A Maximal Clique Partition Method for Network Based on Granularity
Found in: Computational Intelligence and Security, International Conference on
By Yan-ping Zhang,Xiao-yan Chen,Bo Hua,Yuan Zhang
Issue Date:December 2011
pp. 416-420
With regard to large-scale network, the classical methods are not suitable for resolving the problems of network analysis, which is due to large space demanding and time consuming. Most of large-scale networks have the feature of community structure in the...
 
MQuery: Fast Graph Query via Semantic Indexing for Mobile Context
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Yuan Zhang, Ning Zhang, Jie Tang, Jinghai Rao, Wenbin Tang
Issue Date:September 2010
pp. 508-515
Mobile is becoming a ubiquitous platform for context-aware intelligent computing. One fundamental but usually ignored issue is how to efficiently manage (e.g., index and query) the mobile context data. To this end, we present a unified framework and have d...
 
A BT Traffic Identification Method Based on Peer-Cache
Found in: International Conference on Internet Computing in Science and Engineering
By Ruhui Zhang, Ye Du, Yuan Zhang
Issue Date:December 2009
pp. 320-323
In this paper, a method based on peer-information to control BitTorrent (BT) traffic in distributed model is proposed. It is called peer-cache method. Through recording and analyzing the peer-information which is obtained from the BT signaling traffic, the...
 
Complete Decentralized Mechanism Design for Online Machine Scheduling
Found in: Embedded Software and Systems, Second International Conference on
By Yuan Zhang, Chi-Hung Chi, Shengqing Zhang, Nan Zheng
Issue Date:May 2009
pp. 530-535
We study an online version of the classical parallel scheduling problem to minimize the total weighted completion time in a total decentralized setting: both the jobs and the machines are selfish entities who try to maximize their own interest. We study th...
 
Research on CGF Entity Model Based on Factory Mechanism
Found in: Computer Science and Software Engineering, International Conference on
By Yuan Zhang, Limin Zhang
Issue Date:December 2008
pp. 448-451
The model engine development for CGF entities is designed and realized based on “Abstract Factory” and “Factory Method” design pattern. Firstly, the entities factory manager encapsulates the responsibility and the process of creating CGF entities, and prov...
 
An Ant Colony System Algorithm for the Multicast Routing Problem
Found in: International Conference on Natural Computation
By Yuan Zhang, Huachun Cai, Ying Lin, Jing Xiao, Jun Zhang
Issue Date:August 2007
pp. 756-760
With the rapid development in network services, multicast has recently became a hot spot in communication technology. The multicast routing is the key to multicast implementation. A modified ant colony system is presented in this paper to do the single-ori...
 
On Reliability and Validity of the Computer Basic Knowledge Questionnaire in College Freshmen
Found in: Information Science and Engineering, International Conference on
By Lan-Fang Zhang, Yuan Zhang, Yong-Ming Chen
Issue Date:December 2009
pp. 3365-3367
In order to teach college freshmen more conveniently, we have formulated a questionnaire to investigate the computer basic knowledge they had got in secondary schools. This paper measures and analyzes the reliability and validity of that questionnaire by t...
 
Impact of Water Level Fluctuations on Soil Seed Bank along Riparian Zone in JingJiang River
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Long-Yi Yuan,Zhang-Yong Liu,Yong-Jun Feng,Xin-Hua Xue
Issue Date:January 2013
pp. 840-845
Riparian seeds contained in the seed bank are the potential plant population in a riparian ecosystem, and the basis of the settlement, survival, reproduction and spread of plant population. Moreover, they play a pretty important role in the process of spec...
 
Research on the Influence of Micro-bloggers -- Take Sina Celebrity Micro-blog as an Example
Found in: 2012 Eighth International Conference on Semantics, Knowledge and Grids (SKG)
By Yuan Zhang,Yuqian Bai
Issue Date:October 2012
pp. 189-192
Micro-blogging not only subverts the traditional means of communication, but also changes the entire media environment. The effects of explosive communication have a substantial impact on personal and public fields. This paper selects Sina micro-blog of ce...
 
The Construction of 3-D Mass Spectrogram Based on the Modern Computer Technology
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Lu Yuan,Zhang Bin,Xu Jing
Issue Date:July 2012
pp. 891-894
The software platforms of new-style gas chromatography-mass spectrometers have added the analysis fuction of three-dimensional mass spectrogram (3-D MS). In order to add this fuction in the original software platforms, this paper designs the construction m...
 
Quantitative Study of Individual Emotional States in Social Networks
Found in: IEEE Transactions on Affective Computing
By Jie Tang, Yuan Zhang, Jimeng Sun, Jinhai Rao, Wenjing Yu, Yiran Chen,A. C. M. Fong
Issue Date:April 2012
pp. 132-144
Marketing strategies without emotion will not work. Emotion stimulates the mind 3,000 times quicker than rational thought. Such emotion invokes either a positive or a negative response and physical expressions. Understanding the underlying dynamics of user...
 
Poster: De novo expression fragment assembly from Spanning Trees (EAST)
Found in: Computational Advances in Bio and Medical Sciences, IEEE International Conference on
By Yuan Zhang, Dhananjai Rao,Mufit Ozden,Jens Mueller,Praveen Raj Kumar,Chun Liang,John E. Karro
Issue Date:February 2012
pp. 1
In this poster we describe the methods underlying EAST, a novel algorithm based on Minimum Spanning Trees for the de novo assembly of short-read, traditional, and hybrid transcript-derived fragments sets, resulting in a tool that: consistently outperforms ...
 
Analysis of the Authentication Protocols Based on Game Theory
Found in: Computational Intelligence and Security, International Conference on
By Xinghua Li,Lingjuan Deng,Yuan Zhang,Dan Yang,Jianfeng Ma
Issue Date:December 2011
pp. 788-792
Using the ideas of game theory, L. H. Nguyen transformed two families of authentication protocols where the honest party transmitted some useless data with probability before the normal protocol run, so that even if an attacker attacks a protocol, the atta...
 
MoodCast: Emotion Prediction via Dynamic Continuous Factor Graph Model
Found in: Data Mining, IEEE International Conference on
By Yuan Zhang, Jie Tang, Jimeng Sun, Yiran Chen, Jinghai Rao
Issue Date:December 2010
pp. 1193-1198
Human emotion is one important underlying force affecting and affected by the dynamics of social networks. An interesting question is “can we predict a person’s mood based on his historic emotion log and his social network?”. In this paper, we propose a Mo...
 
A Distributed Location Based Service Framework of Ubiquitous Computing
Found in: Networking and Distributed Computing, International Conference on
By Weifeng Lv, Fei Wang, Yuan Zhang, Tongyu Zhu
Issue Date:October 2010
pp. 43-47
Location based services (LBS) are very abundant in our society, which focus on providing users navigation information to make the travel more convenient. With the rapid development of evolving mobile technologies (3G, Wi-Fi, and IPv6), large amounts of dat...
 
Dynamic Load Balancing Scheduling Model Based on Multi-core Processor
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Xiaozhong Geng, Gaochao Xu, Yuan Zhang
Issue Date:August 2010
pp. 398-403
As the computer industry moves toward large-scale multi-core processors (also called Chip Multi-Processor, CMP) ,the quantity of cores on a chip increases dramatically. In order to fully utilize these processing cores, load balancing has become one of the ...
 
Continuous Nearest Neighbor Queries in Weight Changing Road Networks
Found in: Systems and Networks Communication, International Conference on
By Weifeng Lv, Fei Wang, Tongyu Zhu, Yuan Zhang
Issue Date:August 2010
pp. 243-248
Recent researches have focused on continuous nearest neighbor queries in road networks with fixed weight, where all the users find the same routes to the nearest neighbors all the time. As more and more people follow the same way, traffic jams occur and us...
 
Performance Analysis of Passive Three Geostationary Satellites Navigation and Position
Found in: Information and Computing Science, International Conference on
By Lin Xue-Yuan, Zhang Ya-Zhou
Issue Date:June 2010
pp. 338-341
Aiming at the location technique with three geostationary satellites, this paper firstly introduces its basic positioning principle, and gives the positioning equation. Then this paper analyses the positioning error sources, and deduces its’ positioning er...
 
The Application of Safety Culture Model in the Construction Project
Found in: International Conference on E-Business and E-Government
By Gao Yuan,Zhang Lianying
Issue Date:May 2010
pp. 2817-2820
The concept of safety culture is relatively new in the project, especially in the construction industry; however, this concept is becoming more and more important due to its positive effects on ensuring the safety on the construction site. To gain a better...
 
Detecting New Decentralized Botnet Based on Kalman Filter and Multi-chart CUSUM Amplification
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Jian Kang, Yuan-Zhang Song
Issue Date:April 2010
pp. 7-10
Nowadays new decentralized botnets pose a great threat to Internet. They evolve new features such as decentralized architecture, using P2P networks and etc, which make traditional detection methods no longer be effective and accurate enough for indicating ...
 
A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks
Found in: Conference, International Asia-Pacific Web
By Yuan Zhang, Yongluo Shen, SangKeun Lee
Issue Date:April 2010
pp. 386-388
In this paper, we propose a cluster-based group key management scheme for wireless sensor networks(WSNs) that targets at reduce the communication overhead and storage cost of sensor nodes. In the proposed scheme, a group key is generated by the collaborati...
 
A Low Hardware Cost 2D Vector Graphic Rendering Algorithm for Supersampling Antialiasing
Found in: Education Technology and Computer Science, International Workshop on
By Yong-Luo Shen, Sang-Woo Seo, Yuan Zhang, Hyeong-Cheol Oh
Issue Date:March 2010
pp. 141-144
An edge-flag rendering algorithm for supersampling antialiasing with low hardware cost is presented. The proposed algorithm works differently from the common rendering algorithm, using only one counter per pixel instead of one counter per sample point. Com...
 
Base Station Localization in Search of Empty Spectrum Spaces in Cognitive Radio Networks
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Yuan Zhang, Lichun Bao, Max Welling, Shih-Hsien Yang
Issue Date:December 2009
pp. 94-101
The radio spectrum in wireless communication systems is being allocated up quickly with ever increasing demands in wireless industries. Cognitive radio is a way of opportunistically sharing the scare spectrum among primary and secondary users of the spectr...
 
Research on Classification and Subdivision Model of Telecom Rural Channel Based on Clustering Analysis
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Wang Yuan, Zhang Yihua
Issue Date:December 2009
pp. 531-534
Rapid advances in data collection and storage technology have enabled telecom company to accumulate vast amounts of data. However, extracting useful information has proven extremely challenging. Telecom enterprises are holding massive customers’ data and s...
 
Access Control Policies for Web Services in Medical Aid System
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Li-Qun Kuang, Yuan Zhang, Xie Han
Issue Date:December 2009
pp. 167-170
Along with the further improvement of Chinese medical aid system in 21st century, the system interface and security has been in front us. Web services are being positioned as the technological solution framework for achieving this aggregation in the contex...
 
Design and Realization of 2.45GHz Active RFID System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yanpeng Sun, Yuan Zhang, Peng Peng
Issue Date:October 2009
pp. 582-585
An active 2.45GHz RFID system based on C8051F3XX series MCU and nRF24L01 low power radio transceiver chip is introduced in this article with emphasis on the system’s hardware design, realization scheme of anti-collision algorithm (combined with the princip...
 
Implement TSK Model Using a Self-constructing Fuzzy Neural Network
Found in: Intelligent Systems, WRI Global Congress on
By Yao Yuan, Zhang Kailong, Zhou Xinshe
Issue Date:May 2009
pp. 479-483
This paper proposes an approach to implement TSK model by using a self-constructing fuzzy neural network (SCFNN). This network is built based on ellipsoidal basis function (EBF), which can be divided into two parts. The first hidden layer composed of EBF u...
 
Dual-Screw Profile Extruder Fuzzy-Control System Based on LonWorks
Found in: Information and Computing Science, International Conference on
By Gong Chenglong, Liu Yongqiang, Feng Yuan, Zhang Ming
Issue Date:May 2009
pp. 180-183
This paper study a dual-screw profile extruder with erose taper used in PVC-U molding processing, presents a temperature computer control system in which a combined-control strategy of on-off control, fuzzy-control and integral-control were adaptive electe...
 
A Multiple Regression Model for Predicting Comfort Sensation of Knitted Fabric in Sports Condition Based on Objective Properties
Found in: Information and Computing Science, International Conference on
By Min Li, Dong-Ping Li, Wei-Yuan Zhang, Xiao-Zhong Tang
Issue Date:May 2009
pp. 372-375
Clothing comfort is a state of satisfaction indicating physiological, psychological and physical balance among the person. Though objective experiments are easy to measure, subjective experiment is rated an end-use performance test to collect the comfort s...
 
Factor Analysis on Subjective Attributes Affecting Knitted Fabric's Comfort Sensation
Found in: Database Technology and Applications, International Workshop on
By Min Li, Dong-Ping Li, Wei-Yuan Zhang, Xiao-Zhong Tang
Issue Date:April 2009
pp. 695-698
Clothing comfort is a state of satisfaction indicating physiological, psychological and physical balance among the person. Subjective experiment is rated an end-use performance test to collect the comfort sensation of wears. In this paper, 20 samples are c...
 
A Method for Measuring Water Content of Oil Based on the Propagation of Electromagnetic Waves
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yanpeng Sun, Yuan Zhang, Peng Peng
Issue Date:April 2009
pp. 163-165
A method for measuring water content in oil based on the principle that the dielectric constant of oil can impact the transmitting properties of electromagnetic waves is introduced in this paper. Starting with the equivalent input impedance of antenna, ana...
 
Stable and Scalable Method Based on Application-Level for Improving Distributed Interactive Visual Applications' Performance
Found in: Information Management and Engineering, International Conference on
By Gen-Yuan Zhang, Zhao Lei
Issue Date:April 2009
pp. 588-592
virtual reality application such as second life and other multi-player game is a set of special Distributed Interactive Applications (DIAs), because a sender node forwards data to receivers due to their respective priorities. In general application level p...
 
Research on Communication Networks among Workshop NC Equipment Based on Networked Manufacturing
Found in: Computer Science and Information Engineering, World Congress on
By Hu Dachao, He Yu'an, Zhang Qiling
Issue Date:April 2009
pp. 611-615
Based on the analysis of the requirements and technology driving forces of the networked manufacturing, the basic features and connotation of Networked manufacturing (NM) based on workshop Numerical Control (NC) equipment are discussed. The structure and m...
 
Perceptual Relevance Measure for Generic Shape Coding
Found in: Data Compression Conference
By Zhongyuan Lai, Wenyu Liu, Yuan Zhang
Issue Date:March 2009
pp. 453
We address a fundamental problem in subjective reconstruction quality by introducing a perceptual relevance measure (ADM) for generic vertex-based shape coding. Different from traditional absolute distance measure (ADM), our proposed measure systemically c...
 
Research of WSN Localization Algorithm Based on Entropy Function
Found in: Education Technology and Computer Science, International Workshop on
By De-min Chen, Yuan Zhang
Issue Date:March 2009
pp. 229-233
Sensor networks are composed of large numbers of sensors that are equipped with a processor, memory, wireless communication capabilities, sensing capabilities and a power source (battery) on board. While in most existing sensor networks, sensors are static...
 
A New Method of Feature Selection for Information Fusion Based on the Game Theory
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Maixia Fu, Feiyu Lian, Qing Li, Yuan Zhang
Issue Date:December 2008
pp. 185-189
This paper extracts the player and strategy set from feature space by using the game theory. In doing so, it depicts the failure to define feature information by using mutual information entropy. It also exposes the underlying nature of the decision-making...
 
A Study on a General Model of Information Fusion Networks
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Feiyu Lian, Qing Li, Maixia Fu, Yuan Zhang
Issue Date:December 2008
pp. 579-584
The goal of this paper is to find a general model of information fusion network that may prove useful in adapting information fusion to NCW (Network centric warfare) and coordinated development. Based on the OSI reference model, our study presents a layere...
 
Optimize Algorithm of Decision Tree Based on Rough Sets Hierarchical Attributes
Found in: Computational Intelligence and Security, International Conference on
By Yuan Zhang, Yue-jin Lv
Issue Date:December 2008
pp. 133-137
Rough set theory is a new mathematical tool to deal with vagueness and uncertainty. And now it has been widely applied in constructing decision tree which has no hierarchical attributes inside. However, hiera-rchical attributes exist generally in realistic...
 
 1  2 Next >>