Search For:

Displaying 1-50 out of 55 total
Study on Typical Bus Fire Simulation and Control Technology
Found in: Intelligent Computation Technology and Automation, International Conference on
By Jia-lei Tan, Long-zhe Jin, Tong Wang, Bin Hu
Issue Date:May 2010
pp. 639-643
The bus increases with the development of urbanization. The bus accidents gradually increase, which cause the great casualties and property losses. In order to study this problem, three kinds of typical bus fires were simulated. The temperature on z=1.0m c...
 
A Research on Multiuser Collaborative Modelling and Simulating Network System
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Youtian Wang,Bin Hu
Issue Date:September 2013
pp. 728-733
This paper attempts to introduce the concept of cloud computing into simulation and proposes a multi-user collaborating simulation mechanism based on cloud computing. This mechanism is different from the ideology of integrating (with the same language, on ...
 
Automatic Balancing Chord: A Dynamic Load Balancing Mechanism for High Efficient
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Bin Hu,Xiaotong Zhang,Xiaolu Zhang
Issue Date:September 2013
pp. 137-144
This paper presents a distributed lookup protocol named Automatic Balancing Chord(ABC) to solve load imbalance problems in distributed system. Load balancing problems in P2P environment have an important impact on the performance of P2P applications, which...
 
A Research on Multiuser Collaborative Modelling and Simulating Network System
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Youtian Wang,Bin Hu
Issue Date:September 2013
pp. 728-733
This paper attempts to introduce the concept of cloud computing into simulation and proposes a multi-user collaborating simulation mechanism based on cloud computing. This mechanism is different from the ideology of integrating (with the same language, on ...
 
Automatic Balancing Chord: A Dynamic Load Balancing Mechanism for High Efficient
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Bin Hu,Xiaotong Zhang,Xiaolu Zhang
Issue Date:September 2013
pp. 137-144
This paper presents a distributed lookup protocol named Automatic Balancing Chord(ABC) to solve load imbalance problems in distributed system. Load balancing problems in P2P environment have an important impact on the performance of P2P applications, which...
 
Improved Lightweight Encryption Algorithm Based on Optimized S-Box
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Hongbo Wang,Haoran Zheng,Bin Hu,Hongwu Tang
Issue Date:June 2013
pp. 734-737
Hui and Wang proposed a lightweight security encryption algorithm-LEA. And by increasing the bit selection logic traps, the S-box design is optimized. However, we show that there is something wrong in their design. Firstly, the initial key is too short. Se...
 
Evaluation Model for Enterprise's Innovation Vigor on Fuzzy Mathematics
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Bin Hu
Issue Date:October 2012
pp. 545-548
In this paper, synthetic evaluation index system about enterprise's innovation vigor is established from five aspects of innovation assets, manpower resource, organization and management of innovation, innovation performance, and innovation environment. A ...
 
Parallel Traffic Management System Helps 16th Asian Games
Found in: IEEE Intelligent Systems
By Gang Xiong,Sheng Liu,Xisong Dong,Fenghua Zhu,Bin Hu,Dong Fan,Zi Zhang
Issue Date:May 2012
pp. 74-78
To overcome public transportation problems during the 16th Asian Games held in Guanhzhou China, a PtMS (Parallel Transportation Management System), a novel application of Intelligent Transportation Systems, was introduced for effective and convenient traff...
 
NV-DICE: A Ferroelectric Nonvolatile DICE Storage Element for Tolerance to Single Event Upsets
Found in: Intelligent System Design and Engineering Application, International Conference on
By Ya-Hong Zhai,Wei Li,Ping Li,Bin Hu,Ke Gu,Xue Fan
Issue Date:January 2012
pp. 1281-1284
This paper proposes a new nonvolatile Dual Interlocked Cell (NV-DICE) storage element. The cell includes a DICE latch and four backup ferroelectric capacitors. It can perform store automatically when the power is off abruptly and has high tolerance to SEU....
 
A Real-Time Electroencephalogram (EEG) Based Individual Identification Interface for Mobile Security in Ubiquitous Environment
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Bin Hu,Quanying Liu,Qinglin Zhao,Yanbing Qi,Hong Peng
Issue Date:December 2011
pp. 436-441
With the booms of mobile communication, especially mobile smart phone, technologies to identify individuals for mobile security calls for some more strict requirements in user-friendly, real-time and ubiquitous aspects. In addition to traditional approache...
 
The Analysis on Posture Control of Micro Quadrotor Based on PID
Found in: Computational Intelligence and Design, International Symposium on
By Shu Fang,Yan Xu,Jingxue Jiang,Bin Hu,Xinggui Que
Issue Date:October 2011
pp. 283-286
The posture control of micro quadrotor is the key point in flying stability, in this paper, the structure of quadrotor is analyzed, and the kinetic equation has been deduced, a new proportional-integral-derivative controller (PID) control algorithm has bee...
 
Multi-hop Encryption Protocol for Wireless Sensor Network
Found in: Networking and Distributed Computing, International Conference on
By Yang Li,Bin Hu
Issue Date:September 2011
pp. 289-293
No summary available.
 
Automatic Verification of Password-Based Authentication Protocols Using Smart Card
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Bin Hu,Qi Xie,Yang Li
Issue Date:September 2011
pp. 34-39
Password-based authentication protocols attempt to establish mutual authentication in remote access control and other applications in computer networks. However, up to now, most of their security properties are not rigidly proved, but informally discussed ...
 
EEG-Based Cognitive Interfaces for Ubiquitous Applications: Developments and Challenges
Found in: IEEE Intelligent Systems
By Bin Hu,Dennis Majoe,Martyn Ratcliffe,Yanbing Qi,Qinglin Zhao,Hong Peng,Dangping Fan,Fang Zheng,Mike Jackson,Philip Moore
Issue Date:September 2011
pp. 46-53
Technical advances in the neuroelectric recordings and in the computational tools for the analysis of the brain activity and connectivity make it now possible to follow and to quantify, in real time, the interactive brain activity in a group of subjects en...
 
Rule Strategies for Intelligent Context-Aware Systems: The Application of Conditional Relationships in Decision-Support
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Philip Moore, Bin Hu, Mike Jackson
Issue Date:July 2011
pp. 9-16
Rule-based systems have been shown to enable automated problem solving and decision-support. Rule-based systems are however inherently domain specific requiring strategic rules design to address the requirements specification for the problem under consider...
 
Unidirectional Pedestrian Flow in a Lattice Gas Model Coupled with Game Theory
Found in: Computational Sciences and Optimization, International Joint Conference on
By Qing-yi Hao, Rui Jiang, Mao-Bin Hu, Qing-Song Wu
Issue Date:April 2011
pp. 1054-1058
This paper studies unidirectional pedestrian flow in a channel by using a lattice gas model with parallel update rule. Game theory is introduced to deal with the conflict that several pedestrians intend to move to the same site. A pedestrian is either a co...
 
Theoretical Analysis of Lowest Limits of NOx Formation of Methane-Air Mixtures
Found in: Asia-Pacific Power and Energy Engineering Conference
By Bin Hu, Huang Yong
Issue Date:March 2011
pp. 1-6
NA
 
Diagnosis Design Based on KWP2000 in Body Control Module
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Sun Bin, Hu Yue-li, Wang Kun
Issue Date:January 2011
pp. 1071-1074
This article describes the KWP2000 protocol interface design in the body control module and the related information acquisition mode in vehicle body control module, using the MC33972 chip to multi-sample analog signal. The fault diagnosis will be known thr...
 
A Memetic Algorithm with Population Management for the Generalized Minimum Vertex-Biconnected Network Problem
Found in: Intelligent Networking and Collaborative Systems, International Conference on
By Anna Pagacz, Bin Hu, Günther R. Raidl
Issue Date:November 2010
pp. 356-361
We consider the generalized minimum vertex-biconnected network problem (GMVBCNP). Given a graph where nodes are partitioned into clusters, the goal is to find a minimal cost sub graph containing exactly one node from each cluster and satisfying thevertex-b...
 
A Multifunction Snapshot ROIC Design for Low and High Background Application
Found in: Optoelectronics and Image Processing, International Conference on
By Bin Hu, Ping Li, Ai-wu Ruan
Issue Date:November 2010
pp. 44-46
A snapshot infrared read out circuit (ROIC) with multifunction and very wide dynamic range was presented in the paper. The merits of the ROIC include small layout area, CTIA (capacitive transimpedance amplifier) integrator, selectable integration capacitor...
 
Application of Composite Soil Nailing Structure in Foundation Pit Supporting
Found in: Information and Computing Science, International Conference on
By Qingping Jin, Xiaoqing Li, Bin Hu
Issue Date:June 2010
pp. 181-184
Soil nailing supporting technology is applied widely in China, soil nailing and prestressed anchor cable combined is a new composite soil nailing structure for foundation pit supporting, and there are more advantages, but many key issues require to be stud...
 
Matrix Description on Cryphographic Properties of Plateaued Functions
Found in: Computational Sciences and Optimization, International Joint Conference on
By Xiaojian Luo, Bin Hu
Issue Date:May 2010
pp. 312-316
In this paper, the cryptographic properties of the Plateaued functions such as propagation criterion, linear structures are studied by a new method, which is denoted by the dot product matrix. The upper and lower bounds of the correlation coefficient when ...
 
Propagation Characteristics of Plateaued Functions
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Bin Hu, Shanshan Hao
Issue Date:March 2010
pp. 947-951
In this paper, we discuss the propagation characteristics of plateaued functions, we give the bounds of autocorrelation coefficient of rth-order plateaued function, present the second-order autocorrelation coefficient of plateaued function, which has some ...
 
Translational Research and Context in Health Monitoring Systems
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Robert Ashford, Philip Moore, Bin Hu, Mike Jackson, Jizheng Wan
Issue Date:February 2010
pp. 81-86
Context has been applied to a broad range of domains and systems ranging from location-based tourist applications to motion capture. An area relatively under-represented in the literature is health-monitoring systems. This paper considers the application o...
 
Constraint Satisfaction in Intelligent Context-Aware Systems
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Philip Moore, Mike Jackson, Bin Hu
Issue Date:February 2010
pp. 75-80
Context-aware systems provide an effective basis upon which the processing of captured and user-entered data (contextual information) with a direct relationship to an individuals current personal and environmental situation (termed ‘situated role’) can be ...
 
The Walsh Spectrum Property of Resilient Boolean Functions
Found in: Computational Intelligence and Security, International Conference on
By Jiayao Wang, Bin Hu, Quanlai Wang
Issue Date:December 2009
pp. 409-413
The Walsh spectrum of m-resilient Boolean function at any point is divisible by 2m+2. This property is proved by two new methods in this work, which differ from the known method presented by Maitra. The first method is to compute the Walsh spectrum of resi...
 
Agent Based Simulation Research of Mobile Commerce Value Chain
Found in: Computational Intelligence and Design, International Symposium on
By Qingqun Zeng, Bin Hu, Debin Zhang
Issue Date:December 2009
pp. 136-139
The value added process of mobile commerce value chain is studied. Technical aspect of mobile commerce has matured, however, development of any industry needs a stable and sustainable benefit pattern, thus the research of value chain could find and enforce...
 
A Memetic Algorithm for the Generalized Minimum Vertex-Biconnected Network Problem
Found in: Hybrid Intelligent Systems, International Conference on
By Bin Hu, Günther R. Raidl
Issue Date:August 2009
pp. 63-68
The generalized minimum vertex-biconnected network problem plays an important role in the design of survivable backbone networks that should be fault tolerant to single component outage.When given a graph where the nodes are partitioned into clusters, the ...
 
An Analysis on Green Supply Chain Management in E-Commerce under the Economic Globalization
Found in: Business Intelligence and Financial Engineering, International Conference on
By Yu Bin, Hu Jun
Issue Date:July 2009
pp. 595-599
With the development of E-technology and internet, information technology is introduced to commercial activities as a tool, which creates a new business operation E-Commerce. Meanwhile, Chinese entrepreneurs have gradually realized that there is no doubt t...
 
A Hybrid Music Recommendation System by M-LSA
Found in: Computational Intelligence and Natural Computing, International Conference on
By Bin Hu, Meng Guo, Hongbin Zhang
Issue Date:June 2009
pp. 129-132
In this paper, a hybrid music recommendation system is proposed, which combines collaborative filtering and content-base recommendation. Neither of these two parts can make full use of all the information. Our method integrates both user rating and music c...
 
Manned Vehicle Man-Machine Function Assignment Research Based on Man-Machine Integration
Found in: Future Computer and Communication, International Conference on
By Xia Bin, Hu Fang
Issue Date:June 2009
pp. 213-216
This article through the man-machine function assignment research's development evolution, has carried on the man-in-space flight the person - machine characteristic contrastive analysis, and aimed at person's ability and the limited analysis, the explorat...
 
Based on Pessimistic Level Appraisal Military Enterprise Industry Colony Competitive Power Research
Found in: Future Computer and Communication, International Conference on
By Xia Bin, Hu Fang
Issue Date:June 2009
pp. 217-220
This article to the Military enterprise industry colony competitive power thorough analysis's foundation, has established the Military enterprise industry colony competitive power evaluating indicator system. According to Military enterprise industry colon...
 
Achieving Energy Conservation, Coverage and Connectivity Requirements in Wireless Sensor Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Li Liu, Bin Hu, Huifang Miao, Hao Li, Lian Li, Qinglin Zhao
Issue Date:June 2009
pp. 227-232
critical application requirements in wireless sensor networks. Related researches have either concerned coverage, connectivity, and energy conservation separately or required sensing/communication range restrictions. In this paper, we aim to maximize the n...
 
An Autonomous Layered Normative System Framework
Found in: Computer Science and Information Engineering, World Congress on
By Bin Hu, Ji Gao, Guoyong Cai
Issue Date:April 2009
pp. 564-568
One of the main problems of normative system implementation is the semantic gap between the abstract norms described by natural language and the concrete norms described by operational language. This paper introduced an autonomous layered normative system ...
 
Service-Oriented Spatial Information Sharing Model Using Geo-ontology
Found in: Computer Science and Information Engineering, World Congress on
By Zhiqiang Zou, Bin Hu, Wanming Huang, Jiagao Wu
Issue Date:April 2009
pp. 331-335
With the development of Web Service technology, it gives us a chance to solute the difficult problem in spatial information sharing. This paper proposes a service-oriented model, named SISM (Spatial Information Sharing Model). This model includes three asp...
 
Intelligent Context for Personalised M-Learning
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Philip Moore, Bin Hu, Mike Jackson, Jizheng Wan
Issue Date:March 2009
pp. 247-254
Developments in higher education have driven interest in personalised education. Concomitant with these developments are the evolving capabilities of mobile technologies. Context has been shown to facilitate personalisation in mobile systems, the issue is ...
 
Pedestrian Detection Based on Hybrid Features
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Bin Hu, Shengjin Wang, Xiaoqing Ding
Issue Date:December 2008
pp. 321-325
In this paper, we propose a new approach for pedestrian detection in crowded scene from static images.The method is based on hybrid features, one type of middle-level features, which include haar-like features and gradient features, two low-level feature s...
 
Study on the Principles of the Intelligent Diet Arrangement System Based on Multi-Agent
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Fule Wang, Yuan Yuan, Yu Pan, Bin Hu
Issue Date:December 2008
pp. 264-268
Based on the individualized requirements of the customers as regards to reasonable diet, diet medication and so on, this article simulates the nutritionist's experience by artificial intelligence, and uses Internet as the technical platform, so as to intro...
 
Greedily Mining l-dense Subgraphs in Protein Interaction Networks
Found in: Young Computer Scientists, International Conference for
By Min Li, Jianxin Wang, Jian'er Chen, Bin Hu
Issue Date:November 2008
pp. 1018-1023
Dense subgraphs of protein interaction networks are believed to be potential protein complexes and play an important role in analyzing cellular organization and predicting functions of proteins. In this paper, we present a new algorithm LD-Miner for mining...
 
Solving the Railway Traveling Salesman Problem via a Transformation into the Classical Traveling Salesman Problem
Found in: Hybrid Intelligent Systems, International Conference on
By Bin Hu, Günther R. Raidl
Issue Date:September 2008
pp. 73-77
The Railway Traveling Salesman Problem (RTSP) is a practical extension of the classical traveling salesman problem considering a railway network and train schedules. We are given a salesman who has to visita number of cities to carry out some business. He ...
 
A Lightweight Approach towards Autonomic Service-Oriented Computing System Development
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Guoyong Cai, Ji Gao, Bin Hu
Issue Date:December 2006
pp. 392-399
Autonomic service-oriented computing system, which exposes much flexbility and intelligence, is taken as a promising paradigm to deal with drawbacks appearing in current complex large scale heterogeneous computing systems, such as difficulties in construct...
 
Research on the bilateral negotiation algorithms of cooperative design system based on genetic algorithm
Found in: International Conference on Computer Supported Cooperative Work in Design
By Shao-Mei Wang, Wen-Bin Hu
Issue Date:May 2005
pp. 39-43 Vol. 1
The negotiation of conflict problem in the cooperation design system was studied from the view of solving negotiation problems. A bilateral negotiation algorithm, which was based on genetic algorithm, was presented for the cooperative design system, the re...
 
A Model of Scalable Distributed Network Performance Management
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Zeng Bin, Hu Tao, Wang Wei, Li ZiTan
Issue Date:May 2004
pp. 607
Quality of service in IP networks necessitates the use of performance management. As Internet continues to grow exponentially, a management system should be scalable in terms of network size, speed and number of customers subscribed to value-added services...
 
Research of Scheduling Strategy on OpenStack
Found in: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)
By Bin Hu,Hong Yu
Issue Date:December 2013
pp. 191-196
Cloud computing can provide Virtual Machine (VM) computing resources to meet the growing computational demands. Efficient and flexible resource management is a critical issue in cloud computing context. We present a scheduling study on OpenStack VMs schedu...
 
An XML format for electroencephalogram data presentation (eegML)
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Xiaowei Zhang,Bin Hu,Lin Zhou,Jing Chen,Philip Moore
Issue Date:December 2013
pp. 584-588
With the development of the electronic health record, sharing biomedical and healthcare data among heterogeneous systems has great potential to benefit both clinical healthcare and scientific research. Standardizing the data presentation is the best soluti...
   
The removal of ocular artifactsfrom EEG signals: An adaptive modeling technique for portable applications
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Yang Li,Bin Hu,Qinglin Zhao,Hong Peng,Yujun Shi,Yunpeng Li,Philip Moore
Issue Date:December 2013
pp. 222-228
Modeling and prediction of Electroencephalogram (EEG) signals is very important for Portable applications; EEG signals are however widely regarded as being chaotic in nature. An adaptive modeling technique that combines Discrete Wavelet Transformation (DWT...
   
An evolutionary algorithm with solution archives and bounding extension for the generalized minimum spanning tree problem
Found in: Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference (GECCO '12)
By Bin Hu, Günther Raidl
Issue Date:July 2012
pp. 393-400
We consider the recently proposed concept of enhancing an evolutionary algorithm (EA) with a complete solution archive. It stores evaluated solutions during the optimization in order to detect duplicates and to efficiently transform them into yet unconside...
     
Ubiquitous affective awareness and intelligent interaction 2011
Found in: Proceedings of the 13th international conference on Ubiquitous computing (UbiComp '11)
By Bin Hu, Jürg Gutknecht, Li Liu
Issue Date:September 2011
pp. 633-634
The goal of the workshop is to build a forum for researchers from academy and industry to investigate challenging and innovative research issues in the subject, which combines Affective Interaction within ubiquitous environment and to explore creative conc...
     
A pervasive EEG-based biometric system
Found in: Proceedings of 2011 international workshop on Ubiquitous affective awareness and intelligent interaction (UAAII '11)
By Bin Hu, Chengsheng Mao, Guoqing Zhao, Li Liu, Philip Moore, William Campbell
Issue Date:September 2011
pp. 17-24
Identification of individuals is ubiquitous with increasing reliance by financial and governmental organizations on reliable and robust personal recognition systems to determine and confirm the identity and policy constraints for specific individuals in 'r...
     
Ubiquitous awareness and intelligent solutions lab: Lanzhou University
Found in: Proceedings of the ACM 2011 conference on Computer supported cooperative work (CSCW '11)
By Bin Hu, Fang Zheng, Li Liu
Issue Date:March 2011
pp. 151-158
We describe the activities of the Empirical Software Engi-neering (ESE) group at Microsoft Research. We highlight our research themes and activities using examples from our research on socio technical congruence, bug reporting and triaging, and data-driven...
     
 1  2 Next >>