Search For:

Displaying 1-50 out of 193 total
Influence of Incomplete Linkage between Marked and Functional Gene on Estimating Gene Effect by Molecular Marker Regression Model
Found in: Information Engineering, International Conference on
By Xue-Bin Li, Xiao-Ling Yu, Bin Li
Issue Date:July 2009
pp. 418-421
In the past decades, regression approach was a main gene mapping method. For avoiding the QTL mapping to estimate the gene effects, the molecular marker regression was used to research the quantitative trait controlled by polygene under the condition of co...
 
Research of Friction and Wear Behavior of Sliding Contacts under Strong Current Conditions
Found in: Electrical and Control Engineering, International Conference on
By Guo-qiang Jiang, Zhi-yong Wang, Zhong-hua Chen, Ru-bin Zhao, Zhi-ling Ren, Bin Li, Wei Jia
Issue Date:June 2010
pp. 5462-5465
The friction and wear behavior of powder metallurgy copper-based slide and Cu impregnation carbon slide under different current conditions was studied by carrying out lots of friction experiments between slide and the CTS120 type wire with sliding electric...
 
Document Classification with One-class Multiview Learning
Found in: Intelligent Information Systems, IASTED International Conference on
By Bin Chen,Bin Li,Zhisong Pan,Aimin Feng
Issue Date:April 2009
pp. 289-292
Recently, automatic document classification has attracted a lot of attentions due to the large quantity of web documents. Amongst, a special case is to distinguish whether a document belongs to a target class (Directory) when only the documents of target c...
 
A multi-template deconvolution algorithm based on compressed sensing for UWB channel modeling
Found in: Software Maintenance and Reengineering, European Conference on
By Dejian Li,Zheng Zhou,Bin Li,Weixia Zou, Xuan Sun
Issue Date:August 2011
pp. 974-978
Deconvolution is a key operation for the post-processing of ultra-wideband (UWB) channel modeling. Due to the wideband of the radio channel sounding pulse, the nature of the UWB channel can be frequency selective. This paper presents a multi-template compr...
 
A useful design technique of helix pitch profile for high efficiency TWTs
Found in: IEEE International Vacuum Electronics Conference
By YuLu Hu, YanMei Wang, ZhongHai Yang, JianQing Li, XiaoFang Zhu, Bin Li
Issue Date:February 2011
pp. 141-142
A useful design technique of helix pitch profile for high-efficiency Traveling-Wave tubes (TWTs) is put forward. The purpose of the design technique is to increase the normalized axial growth rate of ac electric field amplitude by selecting an appropriate ...
 
Impact of Process and Temperature Variations on Network-on-Chip Design Exploration
Found in: Networks-on-Chip, International Symposium on
By Bin Li, Li-Shiuan Peh, Priyadarsan Patra
Issue Date:April 2008
pp. 117-126
With the continuing scaling of CMOS technologies, process variation is becoming a key factor highly impacting system-level power and temperature. Traditional methods of assuming a uniform temperature and no process variation can lead to gross inaccuracies ...
 
A fast and efficient multigrid eigensolver for modeling microwave tubes using hierarchical vector finite elements
Found in: IEEE International Vacuum Electronics Conference
By Li Xu, Zhen Ye, ZhongHai Yang, JianQing Li, Bin Li
Issue Date:February 2011
pp. 119-120
This paper presents the application of hierarchical vector finite element method (FEM) with second-order basis for modeling slow-wave structures (SWSs) in microwave tubes, and consequently, a robust, fast and efficient multigrid eigensolver (MGES) is devel...
 
Research Based on CAD/CAE/CFD for Collaborative Design of Automotive Engines
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Shuai, Yang Jing, Li Bin, Li Bo
Issue Date:January 2011
pp. 1044-1047
This paper describes the idea of collaborative design process based on CAD/CAE/CFD for automotive engines design with a design process of a 4V105 diesel engine as an example. To establish collaborative design environment, the entire design of automobile en...
 
A Real-Time Pineapple Matching System Based on Speeded-Up Robust Features
Found in: Computational Intelligence and Security, International Conference on
By Bin Li, Maohua Wang, Li Li
Issue Date:December 2010
pp. 243-247
Real-time and accurate image matching is a key to stereo vision of agricultural harvesting robots. This research is part of a pineapple harvesting robot project. In this paper, pineapples were selected as research objects and low cost binocular vision plat...
 
Accurate Prediction of Transition Energies in Organic Molecules
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Ting Gao, Hui Li, Dong-Bing Pu, Ying-Hua Lu, Hai-Bin Li, Hong-Zhi Li, Zhong-Min Su
Issue Date:August 2010
pp. 479-482
Least squares support vector machines (LSSVM) has been carried out in order to obtain a statistically meaningful analysis of the extended set of molecules. The combined HF with LSSVM correction approach (LSSVM/HF) has been applied to evaluate the transitio...
 
Improving the Accuracy of Low Level Density Functional Theory Calculation for Absorption Energies: The Least Squares Support Vector Machine
Found in: Intelligent Computation Technology and Automation, International Conference on
By Ting Gao, Dong-Bing Pu, Hui Li, Ying-Hua Lu, Hai-Bin Li, Hong-Zhi Li, Zhong-Min Su
Issue Date:May 2010
pp. 522-525
Least squares support vector machines (LS-SVM) was introduced to improve the calculation accuracy of low level density functional theory. As a demonstration, this combined low level quantum mechanical calculation with LS-SVM correction approach has been ap...
 
Research on an Ant Colony ISODATA Algorithm for Clustering Analysis in Real Time Computer Simulation
Found in: Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on
By Ying Wang, Ren-Wang Li, Bin Li, Peng-Ju Zhang, Yao-Hui Li
Issue Date:December 2007
pp. 223-229
This paper intends to propose an advanced clustering method, ant colony ISODATA algorithm (ACIA) in real time computer simulation. Ant colony algorithm is used as the method of cursory clustering based on ants piling up their corpses and classifying their ...
 
Automatic Test Data Generation Tool Based on Genetic Simulated Annealing Algorithm
Found in: Computational Intelligence and Security Workshops, International Conference on
By Li Bin, Li Zhi-Shu, Chen Yan-Hong, Li Bao-Lin
Issue Date:December 2007
pp. 183-186
This paper presents an automatic test data generation tool that aims at generating test data dynamically by reducing the problem of test data generation to one minimizing function. The tool is composed of three parts: program instrumentation module; test p...
 
A Policy Language for Adaptive Web Services Security Framework
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Jian-Xin Li, Bin Li, Liang Li, Tong-Sheng Che
Issue Date:August 2007
pp. 261-266
How to resolve access control on Web Services has become one of the important research tasks about the application of Web Services. In this paper, we propose a policy based adaptive Web Services security framework. In this framework, the ReiT policy is a d...
 
Self-Taught Active Learning from Crowds
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Meng Fang,Xingquan Zhu,Bin Li,Wei Ding,Xindong Wu
Issue Date:December 2012
pp. 858-863
The emergence of social tagging and crowdsourcing systems provides a unique platform where multiple weak labelers can form a crowd to fulfill a labeling task. Yet crowd labelers are often noisy, inaccurate, and have limited labeling knowledge, and worst of...
 
Nested Subtree Hash Kernels for Large-Scale Graph Classification over Streams
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Bin Li,Xingquan Zhu,Lianhua Chi,Chengqi Zhang
Issue Date:December 2012
pp. 399-408
Most studies on graph classification focus on designing fast and effective kernels. Several fast subtree kernels have achieved a linear time-complexity w.r.t. the number of edges under the condition that a common feature space (e.g., a subtree pattern list...
 
Cross-Domain Collaborative Filtering: A Brief Survey
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Bin Li
Issue Date:November 2011
pp. 1085-1086
Cross-domain collaborative filtering (CF) is an emerging research topic in recommender systems. It aims to alleviate the sparsity problem in individual CF domains by transferring knowledge among related domains. In this paper, we will give a brief survey o...
 
An Improved Implementation for the Recursive V-BLAST Algorithms to Save Memories and Permutation Operations
Found in: Communications and Mobile Computing, International Conference on
By Hufei Zhu, Bin Li, Wen Chen
Issue Date:April 2010
pp. 352-355
In this paper, we propose an improved implementation for the recursive V-BLAST algorithms, which saves memories and permutation operations, as the existing VBLAST algorithm with memory saving. When the same number of transmit and receive antennas are assum...
 
Nitrogen and Phosphate Removal by Zeolite-Rare Earth Adsorbents
Found in: Environmental Science and Information Application Technology, International Conference on
By Bin Li, Xiwu Lu, Ping Ning, Yuehong Yang
Issue Date:July 2009
pp. 599-602
Zeolite modified by rare earth lanthanum compounds would be an excellent water purification agent that can simultaneously remove both nitrogen and phosphate in aqueous solution. In the context, a novel adsorbent was prepared by loading lanthanum chloride o...
 
A Robust Algorithm for Iris Localization Based on Radial Symmetry
Found in: Computational Intelligence and Security Workshops, International Conference on
By Wencong Zhang, Bin Li, Xueyi Ye, Zhenquan Zhuang
Issue Date:December 2007
pp. 324-327
Previous algorithms have good localization performance for iris images captured in the ideal condition. However, in practice, the quality of iris image is greatly influenced by luminance, eyelashes, hair or glasses frame, which is easy to cause mis- locali...
 
An Approach for Dynamic Hardware /Software Partitioning Based on DPBIL
Found in: International Conference on Natural Computation
By Le-jun Fan, Bin Li, Zhen-quan Zhuang, Zhong-qian Fu
Issue Date:August 2007
pp. 581-585
HW/SW partitioning is one of the key steps in high-level modeling of embedded system co-design. In some kinds of data-dependence applications, the partitioning environment is dynamic. An approach based on a kind of evolutionary algorithm called DPBIL is pr...
 
Pseudo-Three-Dimensional Navigation in Helical Scan Security Inspection
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Li Bin,Li Baolei,Mo Yang,Zhang Yaojun
Issue Date:July 2013
pp. 838-841
In order to solve the navigation problem in x-ray security inspection, a stereoscopic visualization method is proposed in this paper. By analyzing the geometric relations between x-ray generator, detector and baggage on conveyor belt, a data reorganization...
 
Improved Design for the Testing Circuit of Wind Turbines Voltage Flicker
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Dexiong Li,Bin Li
Issue Date:June 2013
pp. 1099-1102
Due to the randomicity of wind power energy, the voltage flicker of power grid will occur after large-scale wind power is connected with power grid. The factors such as wind regime, characteristics of wind power generators and system condition of power gir...
 
Fast Transcoding from H.264 AVC to High Efficiency Video Coding
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Dong Zhang,Bin Li,Jizheng Xu,Houqiang Li
Issue Date:July 2012
pp. 651-656
In this paper, we present several strategies for transcoding from H.264/AVC bit streams to High Efficiency Video Coding (HEVC) bit streams. Because HEVC and AVC share the similar coding architecture, we try to exploit the information in AVC bit streams as ...
 
An Adaptive Modulation Selection Scheme Based on Error Estimating Coding
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Qing Li,Bin Li,Yu Liu,Lin Zhang
Issue Date:December 2011
pp. 330-334
Adaptive modulation selection plays an important role in wireless communication and wireless sensor network since the wireless channel condition is time-varying due to some factors e.g. path-loss and multipath propagation. Therefore, using one modulation t...
 
Testing for Linear and Nonlinear Granger Causality between the Carbon Spot and Futures Prices
Found in: Business Intelligence and Financial Engineering, International Conference on
By Ying Gao,Bin Li,Ziran Li
Issue Date:October 2011
pp. 439-443
The pricing of carbon allowance has gained wide attention from practitioners, economists and policy makers in recent years. Our paper constitutes the first exercise to employ nonlinear Granger causality test to examine the role of price discovery through t...
 
Neutral pressure effects on ionization characteristics of electron cyclotron resonance discharge
Found in: IEEE International Vacuum Electronics Conference
By XiaoLin Jin, ZhongHai Yang, Tao Huang, XiaoFang Zhu, JianQing Li, Bin Li
Issue Date:February 2011
pp. 377-378
The code with quasi-three-dimensional electromagnetic particle-in-cell plus Monte Carlo collision (PIC/MCC) method is developed for the research of ionization process of argon electron cyclotron resonance (ECR) discharge. Monte Carlo techniques are used on...
 
A nonlinear time-dependent simulation for helix traveling wave tubes
Found in: IEEE International Vacuum Electronics Conference
By WeiFeng Peng, YiXue Wei, YuLu Hu, ZhongHai Yang, JianQing Li, Bin Li
Issue Date:February 2011
pp. 143-144
A one dimensional nonlinear time-dependent theory for helix traveling wave tubes in beam-wave interaction is studied. A generalized electromagnetic field is applied to the expression of radio frequency field. The substitution of a spatial average over a wa...
 
High-Performance Computing to the Electron Optics Simulator
Found in: IEEE International Vacuum Electronics Conference
By Tao Huang, MingHua Yang, Quan Hu, ZhongHai Yang, JianQing Li, XiaoLin Jin, XiaoFang Zhu, Bin Li
Issue Date:February 2011
pp. 65-66
Some developments to the Electron Optics Simulator (EOS) in high-Performance Computing (HPC) are illustrated in this paper, including LU decomposition, 64-bit Computing and multicore Parallel Computing.
 
Research and Development of the Thermal Error Compensation Embedded in CNC System
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Ling Yin, Jihong Chen, Haizhou Li, Bin Li, Xinyong Mao, Bo Tan, Guo Liu
Issue Date:November 2010
pp. 52-55
Thermally-induced errors are the major contributor to the inaccuracy of the high-precision machine tools. Limited by CNC system’s close-loop structure, the present thermal error compensations are difficult to be embedded in CNC system and only can be as an...
 
Satellite Network Range Scheduling
Found in: Grid and Cloud Computing, International Conference on
By Jun Wu, Shuang Cao, Yong Li, Bin Li
Issue Date:November 2010
pp. 326-331
Constellation networking is the prominent technology for the next generation satellite systems. The communication schedule is a key problem for constellation maintenance. However, the traditional SRS (Satellite Range Scheduling) model do not use inter-sate...
 
Modeling and Dynamic Response Simulation of GTO-Based STATCOM
Found in: Electrical and Control Engineering, International Conference on
By Huang Shao-Ping, Li Yong-Jian, Jin Guo-Bin, Li Ling
Issue Date:June 2010
pp. 1293-1296
The Static Synchronous Compensator (STATCOM) is a shunt device using power electronics to control power flow and improve transient stability on power grids. A model of a 100Mvar GTO-based STATCOM on a 500kV transmission system is built and its dynamic resp...
 
Planning and Design of Distributed Multilayer EP-ERP System
Found in: International Conference on E-Business and E-Government
By Cheng Chen,Lie-Yun Ding,Bin Li,Ya-Qing Li
Issue Date:May 2010
pp. 2076-2079
The paper illustrates the necessity and development prospect of EP-ERP system application in electricity generating enterprises by analyzing significance of information-based construction. The conception of establishing EP-ERP system model in management of...
 
A Employment Situation Survey Research to Online Accounting Education Undergraduates
Found in: Education Technology and Computer Science, International Workshop on
By Bin Li, Yue E Li
Issue Date:March 2010
pp. 745-747
Based on the survey analysis of 2008 year online accounting undergraduates in job hunting, we conclude that they faced more employment difficulty and it makes bad effect to the long-term development of online education. In our study, most network graduates...
 
Electromagnetic Interference Issues in Numerical Control Machine Tools
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Bin Li, Yi Dai, Yajuan Cao, Binquan Li
Issue Date:March 2010
pp. 83-86
With the rising of PWM carrier frequency, the fast swishing of IGBT produces more and more harm to motor drive system. Effective measures must be taken to suppress electromagnetic interference in order to ensure a reliable work of NC machine tools. Electro...
 
Mechatronic Modeling and Analyzing for Feed Servo Control System Based on Torsion Dynamics of Lead-Screw
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yong Zhou, Fangyu Peng, Bin Li, Yongzhi Li
Issue Date:March 2010
pp. 632-635
Dividing the rotor-screw system of machine tool into a multi-degree-of-freedom torsion system, this paper educes the transfer function model of the mechanism including torsion vibration modes of the first two orders. Consequently, a mechatronic model of se...
 
Trust and Privacy in Dissemination Control
Found in: E-Business Engineering, IEEE International Conference on
By Xiaojun Ye, Zude Li, Bin Li, Feng Xie
Issue Date:October 2009
pp. 173-180
Dissemination control is concerned with controlling electronic resources even after they have been delivered to a legitimate recipient. This paper proposes a secure resource dissemination system framework in which resource providers and recipients are inte...
 
A New Application-Tuned Processor Architecture for High-Performance Reconfigurable Computing
Found in: Adaptive Hardware and Systems, NASA/ESA Conference on
By Li-Hong Shang, Mi Zhou, Jiong Zhang, Hong-Bin Li
Issue Date:August 2009
pp. 138-143
One design goal of future processors is to maximize the performance per watt. However, the performance of general purpose processors can be hardly improved by barely increasing clock frequency. This paper presents an application specific reconfigurable pro...
 
Study on the Improvement of Encryption Algorithm of Bluetooth
Found in: Networking and Digital Society, International Conference on
By Li Juan, Chen Bin, Li Kun
Issue Date:May 2009
pp. 89-92
Bluetooth is a low-cost short-range wireless communications technology standard, widely used in business. But now people may pay a heavy price for the incompatible, security and other problems of the Bluetooth. In this paper, on the basis of technical defe...
 
An E-Government Platform Based on Multi-Tier Architecture
Found in: Information Technology: New Generations, Third International Conference on
By Xiaoyuan Zhang, Guoqiang Han, Bin Li, Kun Zou, Wen Li
Issue Date:April 2008
pp. 1170-1172
With the development of dynamic e-government and the network, the application system becomes more complicated. Traditional e-government system will have an inherent scalability problem as the number of applications increases continuously. To solve this pro...
 
An Effective Mechanism Based on Watermark for E-government Information
Found in: Convergence Information Technology, International Conference on
By Xiaoyuan Zhang,Guoqiang Han,Kun Zou,Wen Li,Bin Li
Issue Date:November 2007
pp. 580-585
E-government information security has attracted tremendous attention recently and most research concentrates on the theory of cryptography. With the development of dynamic e-government system and the widespread use of network, the data in e-government syst...
 
D-S Theory-based Trust Model FIRE^+ in Multi-agent Systems
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Ping-Ping Lu, Bin Li, Mao-Lin Xing, Liang Li
Issue Date:August 2007
pp. 255-260
In open multi-agent systems (MAS), interaction between agents is uncertain. Trust plays an important role in deciding with whom to interact and how to interact with it. Current trust models have solved the problem of how to quantify, deduce and evaluate tr...
 
Analysis and Improvement of An Iris Identification Algorithm
Found in: Pattern Recognition, International Conference on
By Peng Yao, Jun Li, Xueyi Ye, Zhenquan Zhuang, Bin Li
Issue Date:August 2006
pp. 362-365
Iris recognition using complex valued 2D Gabor filters received a great success in broad applications. Such method encoded the iris phase information which was extracted according to the complex valued 2D filters? response. In this paper, we theoretically ...
 
Iris Recognition Algorithm Using Modified Log-Gabor Filters
Found in: Pattern Recognition, International Conference on
By Peng Yao, Jun Li, Xueyi Ye, Zhenquan Zhuang, Bin Li
Issue Date:August 2006
pp. 461-464
In this paper, we presented an iris recognition algorithm based on modified Log-Gabor filters. The algorithm is similar as the method proposed by Daugman in general procedure while modified Log-Gabor filters are adopted to extract the iris phase informatio...
 
An Image Hiding Method Based on Correlation Analysis and Image Fusion
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Liu Bin, Li Zhitang, Li Yao
Issue Date:December 2005
pp. 1049-1051
A multiple image hiding method for one secret image is proposed in this paper. First, different bit planes of a secret image are hided into different bit planes of those different open images by the technique of bit plane analysis. Second, employing image ...
 
License management scheme with anonymous trust for digital rights management
Found in: Multimedia and Expo, IEEE International Conference on
By Jiang Zhang, Bin Li, Li Zhao, Shi-Qiang Yang
Issue Date:July 2005
pp. 4 pp.
One of the major issues raised by digital rights management systems concerns the protection of the user's privacy and anonymous consumption of content. However, most existing license management schemes for DRM systems do not support the protection of user ...
 
Integrating Software into PRA
Found in: Software Reliability Engineering, International Symposium on
By Bin Li, Ming Li, Susmita Ghose, Carol Smidts
Issue Date:November 2003
pp. 457
Probabilistic Risk Assessment is a technique to assess the probability of failure or success of a mission. Results provided by the risk assessment methodology are used to make decisions concerning choice of upgrades, scheduling of maintenance, decision to ...
 
An Effective Collision Resolution Mechanism for Wireless LAN
Found in: Computer Networks and Mobile Computing, International Conference on
By Chonggang Wang, Bin Li, Bo Li, Kazem Sohraby
Issue Date:October 2003
pp. 18
Based on the current standardized IEEE 802.11 distributed coordination function (DCF) protocol, this paper proposes a new efficient collision resolution mechanism, called GDCF. Our main motivation is based on the observation that 802.11 DCF decreases the c...
 
Computing Word Similarity on Large-Scale Corpus
Found in: Innovative Computing ,Information and Control, International Conference on
By Tao Xu, Weiguang Qu, Xuri Tang, Dexin Ding, Bin Li, Hui Li
Issue Date:December 2009
pp. 1076-1079
This paper proposes a novel approach for word similarity computation based on word sense vectors. The word sense vector is built using HIT-IR Tongyici Cilin (Extended) for concept generalization and is further modified by the use of relative and absolute f...
 
A Case Study on the Communication and Computation Behaviors of Real Applications in NoC-Based MPSoCs
Found in: 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
By Zhe Wang,Weichen Liu,Jiang Xu,Bin Li,Ravi Iyer,Ramesh Illikkal,Xiaowen Wu,Wai Ho Mow,Wenjing Ye
Issue Date:July 2014
pp. 480-485
Network-on-chip (NoC) based multiprocessor system-on-chips (MPSoCs) have been proposed as promising architectures to meet modern applications' ever-increasing demands for computing capability under limited power budget. Understanding the behaviors of MPSoC...
 
 1  2 Next >>