Search For:

Displaying 1-50 out of 102 total
A Mixed Localization Algorithm Based on RSSI and APIT with Fitness Analysis and Optimization
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Bo Chen,Jun Sun,Wen Bo Xu,Jian Xu
Issue Date:October 2012
pp. 164-168
As a new information acquisition and processing technology, wireless sensor networks can achieve tasks with complex large-scale monitoring and tracking in wide range of applications, but the localization for node itself is the basis of most applications. A...
 
A Novel Traveling Wave Based Differential Protection for Distributed Parameter Line
Found in: Asia-Pacific Power and Energy Engineering Conference
By Jing Cai, HengXu Ha, Yang Yu, Z. Q. Bo, Bo Chen
Issue Date:March 2011
pp. 1-5
NA
 
Research on Kansei Image in Kansei-Based Design System for CNC Machine Tools
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Bo Chen,Shengju Tang,Zhang Pan,Jiaxin Zhang,Deke Guo
Issue Date:August 2012
pp. 1220-1223
In order to establish the perceptual function model of products, we use image semantics words to express the perceptual capabilities of CNC machine tools in the study of their image modeling design. Consider the complexity of the image information, users t...
 
Deep Learning with Hierarchical Convolutional Factor Analysis
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Bo Chen,Gungor Polatkan,Guillermo Sapiro,David Blei,David Dunson,Lawrence Carin
Issue Date:August 2013
pp. 1887-1901
Unsupervised multilayered (“deep”) models are considered for imagery. The model is represented using a hierarchical convolutional factor-analysis construction, with sparse factor loadings and scores. The computation of layer-dependent...
 
Research of Structure Integration Based on Struts and Hibernate
Found in: Computer Science and Information Engineering, World Congress on
By Juanjuan Yan, Bo Chen, Xiu-e Gao, Le Wang
Issue Date:April 2009
pp. 530-534
Struts framework based on MVC has brought the best code reuse and the legible code structure in entire system by far, but it has some problems such as complicated program, high coupling among layers and hard maintenance because its model part adopts JDBC t...
 
An Integrated System of Intrusion Detection Based on Rough Set and Wavelet Neural Network
Found in: International Conference on Natural Computation
By Ling Yu, Bo Chen, Junmo Xiao
Issue Date:August 2007
pp. 194-199
In order to improve the performance of traditional intrusion detection system(IDS) based on neural network, we design and implement an integrated model of IDS based on rough set and wavelet neural network(RWNN-IDS). This paper focuses on applying RWNN for ...
 
Research on Improved EDF Scheduling Algorithm Based on Error
Found in: Innovative Computing ,Information and Control, International Conference on
By Bo Chen, Xueping Zhang, Chaoming Meng
Issue Date:June 2008
pp. 599
Schedule plays a significant role in networked controll systems of multi-tasks. So it is an important research on scheduling algorithms of NCS. The class data structure of true-time box is introduced at first. On top of that, it is mainly discussed about t...
 
Video Stream Adaptive Real-Time Transmission for Intelligent Terminals
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Jian-Ping Ma,Bo Chen,Shi-Jia Ma,Qiang Chen
Issue Date:November 2012
pp. 426-431
Video real-time communication of Intelligent terminal is the core technology for video telephone, telemedicine and tele-education. By discussing the video communication hardware platform of both IP carmer and STB and software of IP crammer based on RTSP pr...
 
Agent Recommendation for Agent-Based Urban-Transportation Systems
Found in: IEEE Intelligent Systems
By Cheng Chen,Shuang Shuang Li,Bo Chen,Ding Wen
Issue Date:November 2011
pp. 77-81
Mobile-agent technology has been adopted in many transportation fields to take advantages of different agents to deal with dynamic changes and uncertainty in traffic environments. However, few research studies have been conducted in urban-transportation sy...
 
Base on Fluid-Structure Coupling Transient Impact Analysis of Particular Structure
Found in: Digital Manufacturing and Automation, International Conference on
By Xinglin Yang,Bo Chen,Dong Chen
Issue Date:August 2011
pp. 250-253
The underwater particular structure cover system is discovered the connecting bolt had spLit by impact. It brought to the product normal using a certain security risk. In the paper, estabLish the mathematical model of fluid-cover structure coupLing, and ob...
 
Research on XML-Based Key Management Service for Identity-Based Cryptography
Found in: Multimedia Information Networking and Security, International Conference on
By Tieming Chen, Jie Jiang, Bo Chen, Wei Li
Issue Date:November 2010
pp. 468-472
Research on the certificate-less public key cryptography has been widely concerned recently. Identity-based cryptography, viz.IBE, is the most successful certificate-less solution. It can employ an arbitrary ID of a user as her public key, while as the use...
 
Data Aggregation and Routing in Wireless Sensor Networks Using Improved Ant Colony Algorithm
Found in: Computer Science-Technology and Applications, International Forum on
By Wang Jinghua, He Huan, Chen Bo, Chen Yuanyuan, Guan Tingting
Issue Date:December 2009
pp. 215-218
A wireless sensor network consists of a large number of sensor nodes scattered in the region of the network which have limited energy and limited computational and sensing ability. Data aggregation is important in this kind of network which can make use of...
 
A Novel Principal Component Analysis Neural Network Algorithm for Fingerprint Recognition in Online Examination System
Found in: Information Processing, Asia-Pacific Conference on
By Chen Yu, Zhang Jian, Yi Bo, Chen Deyun
Issue Date:July 2009
pp. 182-186
To solve the authentication problem in online examination system for large-scale, a novel principal component analysis neural network algorithm for fingerprint recognition is presented. Based on the introduction of the basic principles of feature selection...
 
Kernel Subspace LDA with Self-Constructed Mercer Kernel for Face Recognition
Found in: Computational Intelligence and Security, International Conference on
By Xuehui Xie, Wen-Sheng Chen, Bo Chen, Hui Liu
Issue Date:December 2008
pp. 194-199
This paper proposes a self-constructed Mercer kernel based subspace LDA approach for face recognition. Our self-constructed Mercer (SM) kernel function is constructed from a given block diagonal matrix. The entries of all its block diagonal sub-matrices ar...
 
Image Restoration Based on Fourth-Order PDE Model
Found in: International Conference on Natural Computation
By Bo Chen, Wen-Sheng Chen, Li-Wei Zhang
Issue Date:October 2008
pp. 549-553
In order to avoid the blocky effects of second-order PDE model and preserve edges, a new fourth-order PDE model was proposed in this paper. Based on four-neighbor system, a simple and symmetrical difference scheme was also developed to make the model more ...
 
A New Statistical Active Contour Model for Noisy Image Segmentation
Found in: Image and Signal Processing, Congress on
By Bo Chen, Pong-Chi Yuen, Jian-Huang Lai, Wen-Sheng Chen
Issue Date:May 2008
pp. 226-230
This paper addresses the segmentation problem in noisy image based on Fast Edge Integration (FEI) method in active contour model (ACM) and proposes a new statistical active contour model (SACM). Two modifications are performed in FEI method. First, in orde...
 
Firewall Rules Sorting Based on Markov Model
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Weiping Wang, Rong Ji, Wenhui Chen, Bo Chen, Zhepeng Li
Issue Date:November 2007
pp. 203-208
Firewall technique is a major measure to solve network security problems for enterprises. However, firewall efficiency is compromised by lots of tuple-comparisons. In this research, we established a Markov model for package matching statistics and predicti...
 
Towards A Model Refactoring Conflict Resolution Algorithm
Found in: Information Science and Engineering, International Conference on
By Junbing Chen, Zhijian Wang, Bo Chen, Si Qian
Issue Date:December 2009
pp. 5439-5442
Conflict resolution is a key problem in research of model refactoring, while the majority of researchers focus on conflicts detection. Conflict resolution is usually performed manually after being analyzed known conflicts. Three categories of conflicts cou...
 
Defensive strategy of the goalkeeper based on the 3D vision and field division for the middle-size league of robocup
Found in: 2013 IEEE International Conference on Granular Computing (GrC)
By Jiehao Chen,Chen Ma,Zizhen Yan,Bo Chen,Yu Shen,Yu Liang
Issue Date:December 2013
pp. 49-52
In the Middle-size League of RoboCup, the situation on the ground is unpredictable as the football moves irregularly whether viewed from the speed or the direction or the height of the football movement. Therefore, a single defensive strategy cannot meet t...
   
Discovering Low-Rank Shared Concept Space for Adapting Text Mining Models
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Bo Chen,Wai Lam,Ivor W. Tsang,Tak-Lam Wong
Issue Date:June 2013
pp. 1284-1297
We propose a framework for adapting text mining models that discovers low-rank shared concept space. Our major characteristic of this concept space is that it explicitly minimizes the distribution gap between the source domain with sufficient labeled data ...
 
Implementation of Asynchronous Receiver/ Transmitter Based on FPGA
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Xiao-Li Hu,Feng-Ying Wang,Bo Chen
Issue Date:November 2012
pp. 226-228
This article discusses the basic principles of the universal asynchronous receiver/transmitter, and design and realize of universal asynchronous receiver/transmitter base on Alter a NIOSII Development Board integrated in EDA experiment platform. the main c...
 
Robust Dynamic Provable Data Possession
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Bo Chen,Reza Curtmola
Issue Date:June 2012
pp. 515-525
Remote Data Checking (RDC) allows clients to efficiently check the integrity of data stored at untrusted servers. This allows data owners to assess the risk of outsourcing data in the cloud, making RDC a valuable tool for data auditing. A robust RDC scheme...
 
A Modified Wiener Filtering Method for DT-CWT Domain Image Denoising
Found in: Multimedia and Signal Processing, International Conference on
By Hongxia Wang, Bo Chen
Issue Date:May 2011
pp. 298-302
A novel scheme for reducing additive Gaussian noise from images in the dual tree complex wavelet transform (DTCWT) domain is introduced in this paper. The doubly Wiener filtering algorithm is investigated and a simple one-step Wiener filtering method in DT...
 
An Extensible Framework for RBAC in Dynamic Ad-Hoc Coalitions
Found in: Network Computing and Information Security, International Conference on
By Bo Chen, Lingna He
Issue Date:May 2011
pp. 17-21
The need to securely share information in dynamic ad-hoc coalition among collaborating entities is increasingly becoming important. In a dynamic coalition environment, organizations should be able to execute their local fine-grained access control policies...
 
Development of a Ka-band Space TWT
Found in: IEEE International Vacuum Electronics Conference
By Bo Chen, QingPing Zhao, ShaoLun Cai, Jinjun Feng, Ming Q. Ding
Issue Date:February 2011
pp. 247-248
This paper presents the development of Ka-band Space TWTs with an output power of ≥ 80W and efficiency of ≥ 40% ranging from 29GHz to 34GHz.
 
Design and Configuration of a Hexapod Walking Robot
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Jin Bo, Chen Cheng, Li Wei, Li Xiangyun
Issue Date:January 2011
pp. 863-866
This paper introduces the design and control system of a hexapod walking robot. The robot is developed based on a previous version which is focused on the straight-line walking. To enhance its ability to adapt to the terrain, each leg of it in this paper h...
 
All-digital Real Time Demodulation System of Fiber Laser Hydrophone Using PGC Method
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Yu, Huang Junbin, Gu Hongcan, Li Rizhong, Tan Bo, Chen Liang
Issue Date:January 2011
pp. 359-362
After analyzing the sensing theory of a DFB fiber laser, the demodulation principle of fiber Bragg grating hydrophone using a phase generated carrier based on Michel son interferometer was introduced. A digital demodulation system based on DSP was designed...
 
Reasoning on Formalizing WS-CDL Mobility Using Process Algebra
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Philbert Nduwimfura, Dong Xu, HuaiKou Miao, Zhou Lei, Bo Chen
Issue Date:December 2010
pp. 676-682
With a good understanding of mobility mechanisms of WS-CDL, we can easily design applications that acquire, during the execution, all the information they need to invoke services. One of the means to ensure good interoperability between Web services is to ...
 
Location and Scatter Matching for Dataset Shift in Text Mining
Found in: Data Mining, IEEE International Conference on
By Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
Issue Date:December 2010
pp. 773-778
Dataset shift from the training data in a source domain to the data in a target domain poses a great challenge for many statistical learning methods. Most algorithms can be viewed as exploiting only the first-order statistics, namely, the empirical mean di...
 
Research on Product Design Driven by Reach Area
Found in: Computational Intelligence and Design, International Symposium on
By Bo Chen, Li Deng, Ling Li
Issue Date:October 2010
pp. 178-181
In traditional design, ergonomic design is often used to examine in product design. If the ergonomic examination has serious problem, it needs to modify the size of the product structure that extend the design cycle. Using the computer-aided ergonomics tec...
 
A Fuzzy-Based Decision Approach for Supporting Multimedia Content Request Routing in CDN
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Jian-Bo Chen, Shao-Jun Liao
Issue Date:September 2010
pp. 46-51
The technology of multimedia Content Delivery Network (CDN) is to build some replica servers in the network. The origin server replicates some multimedia contents to these replica servers in order to reduce the loading of the origin server and to reduce th...
 
Research on Fault Diagnosis Method of Pressurization System of Water-Jet Cutting Machine Based on Support Vector Machine
Found in: Electrical and Control Engineering, International Conference on
By Haixia Zhang, De-an Zhao, Wei Ji, Deyuan Kong, Bo Chen
Issue Date:June 2010
pp. 1680-1683
Water-jet cutting machine is one of the high-tech products setting of ultra-high pressure technology, numerical control technology, computer application technology as a whole, make use of the kinetic energy of abrasive water-jet cutting of various material...
 
Context-Based Modularization of Large Ontologies
Found in: International Conference on E-Business and E-Government
By Zhong Shengda,Cheng Bo,Chen Junliang
Issue Date:May 2010
pp. 1410-1413
Ontology has a very wide range of applications, however the large-scale ontologies are not easy to manage and produce redundancy during deduction. In this paper, we first analyzed how to map the OWL into Graph and summarized six relations in Modular Modeli...
 
A Method of Differential Median Calibration for the Temperature of Beer Fermentation
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yang Qingchuan, Sun Bo, Chen Gang
Issue Date:May 2010
pp. 156-159
In embedded-distribution control system, the analogue signal under test is usually non-linear. Differential median calibration method based on four-wire platinum resistance temperature compensated constant current source is proposed in accordance with the ...
 
Towards an Effective XML Keyword Search
Found in: IEEE Transactions on Knowledge and Data Engineering
By Zhifeng Bao, Jiaheng Lu, Tok Wang Ling, Bo Chen
Issue Date:August 2010
pp. 1077-1092
Inspired by the great success of information retrieval (IR) style keyword search on the web, keyword search on XML has emerged recently. The difference between text database and XML database results in three new challenges: 1) Identify the user search inte...
 
Analysis of Web Security Comprehensive Evaluation Tools
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Hui-zhong Shi, Bo Chen, Ling Yu
Issue Date:April 2010
pp. 285-289
Web security evaluation is an important way for resolving Web security. This paper introduces the commonly used Web security comprehensive evaluation tools. Application examples and the comparison of their abilities are also given. Some inherent flaws in t...
 
Intelligent Control System Design of the Abrasive Water-jet Cutting Machine Based on ARM9+ Mu C/OS
Found in: Education Technology and Computer Science, International Workshop on
By Wu Xia, De-an Zhao, Zhijin Li, Bo Chen
Issue Date:March 2010
pp. 377-380
An intelligent control system of the abrasive waterjet cutting machine is designed based on ARM9 and &µ C/OS-|. The input signals (thickness of the workpiece, abrasive flow, surface roughness, pressure of abrasive water-jet) are received by the control...
 
The Design and Implementation of SIP Signal Control Framework of Application Server Based on JAIN-SLEE
Found in: Computer Science-Technology and Applications, International Forum on
By Hu Xiaoxiao, Zhang Shicheng, Cheng Bo, Chen Junliang
Issue Date:December 2009
pp. 451-455
In this paper, we introduced a design and implementation of a SIP signal control framework as a medium between the service logic and SIP stack. It is used to establish different kinds of RTP connections controlled by SIP application server according to the...
 
Evolution of Reference Networks with Fitness Inheritance
Found in: Computer Science-Technology and Applications, International Forum on
By Yang Jialin, Cheng Bo, Chen Junliang
Issue Date:December 2009
pp. 213-217
The vertex connectivity of many large networks follows a scale-free power-law distribution. BA model and many other BA-derived models reproduce such property and acquire a special status. The most distinct characteristic of these models is that during the ...
 
Extracting the Coronary Artery in Angiographic Image Based on à Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient
Found in: Computational Intelligence and Security, International Conference on
By Qingzhu Wang, Ke Wang, Donghong An, Bo Chen, Miao Liu, Yingying Ying
Issue Date:December 2009
pp. 160-164
According to the matching differences cased by cardiac non-rigid motion between angiographic images before and after injected in subtract angiography which is most widely used in diagnosis, a new algorithm based on à trous wavelet of rotary Gaussian with a...
 
The Research of Intrusion Detection Based on Support Vector Machine
Found in: Computer and Communications Security, International Conference on
By Li Bo, Chen Yuan Yuan
Issue Date:December 2009
pp. 21-23
Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves th...
 
Medial Axis Extraction Using Growing Neural Gas
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Yee Zhang, Guisong Liu, Xiufen Fang, Bo Chen
Issue Date:November 2009
pp. 544-548
In this paper, a medial axis extracting method is proposed by using a self-organising neural network, namely the Growing Neural Gas (GNG), which is applied to preserve the topology of any input space. The boundaries of a given figure are sampled with induc...
 
Composite E-services Behavioral Requirements Based on Activity Chain and Their Dynamic Operation Semantics
Found in: Multimedia Information Networking and Security, International Conference on
By Bo Chen, Chungui Li, Qixian Cai
Issue Date:November 2009
pp. 595-598
E-service composition is most impressing method for development and deployment of e-business. Description and modeling the behavior requirements of composite e-services for users is an important key in design of services. But most work does not address the...
 
Formal Analysis and Improvement of iKP Protocol
Found in: Management of e-Commerce and e-Government, International Conference on
By Hong Wang, Liwei Dong, Ying Huang, Bo Chen
Issue Date:September 2009
pp. 465-468
Accountability and fairness are two importantrequirements of secure E-payment protocols, which canprovide evidences to solving disputes in E-commerce and keepsure that each participant in protocol achieves fairness in anunreliable channel. Therefore logic ...
 
Prediction of Chinese Listed Companies' Credit Risk Based on Mixed Logit Model and Factor Analysis
Found in: Management of e-Commerce and e-Government, International Conference on
By Xiaolin Sun, Xuezhi Qin, Bo Chen
Issue Date:September 2009
pp. 258-261
This paper used mixed logit model to predict credit risk of listed companies in China. In order to reduce the difficulty in dealing with the facts of correlation and multi-dimension of the financial indexes of listed companies and meanwhile to ensure that ...
 
Process-Oriented Approach for Validating Asset Value for Evaluating Information Security Risk
Found in: Computational Science and Engineering, IEEE International Conference on
By Shi-Cho Cha, Li-Ting Liu, Bo-Chen Yu
Issue Date:August 2009
pp. 379-385
To provide a systematic means of identifying and assessing information security risks, organizations typically adopt asset-driven (or asset-oriented) risk assessment schemes. These schemes require organizations to identify their information assets, find ou...
 
F-Compactness in L-closure Spaces
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Bo Chen
Issue Date:August 2009
pp. 199-202
In this paper, the concepts of F-compactness set and F-compactness space in L-closure space are defined. In term of net, cover and L-closed sets, some characterizations of F-compactness are obtained. Furthermore, a series of interesting properties of F-com...
 
On-line Fault Diagnosis Model of the Hydropower Units Based on MAS
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Liao Jiaping, Fu Bo, Chen Yu
Issue Date:July 2009
pp. 470-476
The paper introduced a novel on-line fault diagnosis system model of the hydropower units based on multi-agent system. In allusion to the classical MAS-based fault diagnosis model, it proposes a new function of information interactive between the mission-c...
 
The Binary Behavioral Modes Based on Action Sequence and Compliance Verification for Compositional Web Service
Found in: Information Processing, Asia-Pacific Conference on
By Bo Chen, Guosun Zeng, Hongzhen Xu
Issue Date:July 2009
pp. 415-419
To verify whether a compositional web service is compliant to the specific requirements of users is one of important research issue for web service. Most of existed work about web service verification do not address the issue of how to model the requiremen...
 
The Property Based on Action Sequence and Compliance Verification for Compositional Web Service
Found in: New Trends in Information and Service Science, International Conference on
By Bo Chen, Guosun Zeng, Hongzhen Xu
Issue Date:July 2009
pp. 225-230
Requirement-driven behavioral verification for web service compositions is one of important research issue for web service. Most of behavioral specifications to be checked in existed web service verification works have forms like LTL or MSC. They are tempo...
 
 1  2 Next >>