Search For:

Displaying 1-50 out of 152 total
A Revised Evidential Reasoning Model Based on Interval Information
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Mi Zhou, Xin-bao Liu, Jian-bo Yang, Hao Qu
Issue Date:August 2009
pp. 239-243
The basic theory of the evidential reasoning (ER) approach is firstly introduced. Since many uncertainties and ambiguities are included in a variety of real decision making problems, accurate number is not competent for the description of the assessment va...
An Accurate GPS-Based Localization in Wireless Sensor Networks: A GM-WLS Method
Found in: Parallel Processing Workshops, International Conference on
By Bo Cheng,Rong Du,Bo Yang,Wenbin Yu,Cailian Chen,Xinping Guan
Issue Date:September 2011
pp. 33-41
For wireless sensor networks, localization is crucial due to the dynamic nature of deployment. In absolute localization, a few nodes (called beacon nodes or anchors) need to know their absolute positions, and all the other nodes are absolutely localized in...
Research on WIM Technology Using Cement-Based Piezoelectric Sensor
Found in: Information Science and Engineering, International Conference on
By Yan bo Xue, Bo Yang, Li zhi Peng, Yi qi Sun
Issue Date:December 2009
pp. 651-654
Weigh-in-Motion (WIM) devices are specifically designed to capture and record gross axle load of moving vehicles. Compared with the traditional sensor, cement-based piezoelectric sensor has good compatibility with the concrete. Therefore it's suitable to d...
A Multi-agent and GIS Based Simulation for Emergency Evacuation in Park and Public Square
Found in: Computational Intelligence and Security, International Conference on
By Bo Yang, Yong-gang Wu, Cheng Wang
Issue Date:December 2009
pp. 211-216
The emergency evacuation is an important measure for the public safety. However, the insufficient facilities and complex environment of parks and public squares make public difficult to evacuation efficiently. This paper presents a new emergency evacuation...
Network Traffic Classification Based on Error-Correcting Output Codes and NN Ensemble
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xiao Xie, Bo Yang, Yuehui Chen, Lin Wang, Zhenxiang Chen
Issue Date:August 2009
pp. 475-479
Classification of network traffic is basic and essential for many network researches and managements. Howeverclassification of network traffic using port-based and simple payload-based methods is diminished with the rapid development of peer-to-peer (P2P) ...
Optimal software release time determination with risk constraint
Found in: Reliability and Maintainability Symposium
By Bo Yang, Huajun Hu, Jun Zhou
Issue Date:January 2008
pp. 393-398
For a software development project, when to stop testing the software and release it for operation is of great importance as it impacts both the software reliability and the total cost of the project. Software release time determination, therefore, has att...
Parameter estimation for software reliability models considering failure correlation
Found in: Reliability and Maintainability Symposium
By Bo Yang, Suchang Guo, Ning Ning, Hong-Zhong Huang
Issue Date:January 2008
pp. 405-410
Many existing software reliability models are based on the assumption of statistical independence among successive software failures. In reality, this assumption could be easily violated. In recent years, efforts have been made to relax this unrealistic as...
A Packing Algorithm for Non-Manhattan Hexagon/Triangle Placement Design by Using an Adaptive O-Tree Representation
Found in: Design Automation Conference
By Jing Li, Tan Yan, Bo Yang, Juebang Yu, Chunhui Li
Issue Date:June 2004
pp. 646-651
A non-Manhattan Hexagon/Triangle Placement (HTP for short) paradigm is proposed in the present paper. Main feature of this paradigm lies in adapting to the Y- architecture which is one of the promising non-Manhattan VLSI circuit layout architectures. Aim o...
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
Found in: IEEE Transactions on Computers
By Jing Liu,Qiong Huang,Bo Yang,Yang Zhang
Issue Date:August 2013
pp. 1656-1672
When assigning personal keys, stateful multicast key distribution (MKD) protocols usually rely on some type of dynamic group access structure which helps achieve a better tradeoff among storage, communication, and computation overheads. However, there exis...
A Novel Biometric Authentication Scheme with Privacy Preserving
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Dexin Yang,Baolin Xu,Bo Yang,Jianping Wang
Issue Date:November 2012
pp. 452-456
In this paper, a novel biometric authentication scheme is proposed, which combines zero-knowledge proof, - protocols and bit commitment scheme. The remote server compares biometric template using committed values, this can keep privacy of user's biometrics...
Numerical Simulation on the Mixture of Multi-Inlet Vertical Jet and Mainstream in Reactor
Found in: Asia-Pacific Power and Energy Engineering Conference
By Rong Xie, Liang Guan, Feng-zhen Yang, Bo Yang
Issue Date:March 2011
pp. 1-4
A Provable Security Biometric Password Multi-server Authentication Scheme with Smart Card
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Dexin Yang, Bo Yang
Issue Date:September 2010
pp. 33-38
In this paper, a new biometric password multi-server authentication scheme with smart card is proposed. To the best knowledge of us, this is the first biometric password authentication scheme which can be used in the multi-server environment and the distri...
A Novel Two-Server Password Authentication Scheme with Provable Security
Found in: Computer and Information Technology, International Conference on
By Dexin Yang, Bo Yang
Issue Date:July 2010
pp. 1605-1609
Traditional protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, there is a fatal limitation of this approach (assuming low-entropy passwor...
A New Password Authentication Scheme Using Fuzzy Extractor with Smart Card
Found in: Computational Intelligence and Security, International Conference on
By Dexin Yang, Bo Yang
Issue Date:December 2009
pp. 278-282
In this paper, a new biometric authentication scheme based on fingerprint is proposed. To the best knowledge of us, this is the first biometric authentication scheme which is combined with fuzzy extractor and smart card. Futhermore, this scheme has improve...
Study on the Measurement of M & A Performance of Chinese Listed Companies
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Chao-yang Xu, Jing Huang, Bo Yang
Issue Date:December 2008
pp. 236-241
M & A between companies go up quickly in the past 20 years in china, M & A performance is focused gradually, and the study on the measurement of M & A Performance becomes more and more important. This paper researches the M & A happened in ...
Adaptive Lifting Scheme for Image Compression
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xiaoyuan Yang, Zhipin Zhu, Bo Yang
Issue Date:October 2008
pp. 547-551
In the subband coding of image, direction of image features has already emphasized to want a function. In this paper, we propose a Adaptive Lifting Transform (ALT) that adapts the direction filter to image based on the lifting scheme. In addition, We desig...
Bar Code Recognition in Complex Scenes by Camera Phones
Found in: International Conference on Natural Computation
By Yue Liu, Bo Yang, Ju Yang
Issue Date:October 2008
pp. 462-466
Mobile phones with a camera function are capable of capturing image and processing tasks. Quick Response Code has been widely used in industrial information tagging applications where high data capacity, robust error corrections are required. It has become...
NTS6: IPv6 based Network Topology Service System of CERNET2
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Ye Wang
Issue Date:April 2007
pp. 1010-1015
In this paper, we propose NTS6, an IPv6 based Network Topology Service system, which provides a Query and Response Service of Network Topology Information between any pair of hosts accessing IPv6 Internet via CERNET2. The NTS6 system periodically collects ...
A Textile Image Separation Algorithm Based on BP Network
Found in: Information Science and Engineering, International Conference on
By Xu Yang, Hui Zhou, Shao-Cui Guo, Jing-bo Yang
Issue Date:December 2009
pp. 1113-1115
At present, the textile image is separated by manpower with low efficiency. In order to deal with this problem, this paper proposes a novel algorithm for textile image separation based on back propagation artificial neural network. The factors that can aff...
A Bayesian Network-Based Knowledge Engineering Framework for IT Service Management
Found in: IEEE Transactions on Services Computing
By Wei Wang,Hao Wang,Bo Yang,Liang Liu,Peini Liu,Guosun Zeng
Issue Date:January 2013
pp. 76-88
Service management is becoming more and more important within the area of IT management. How to efficiently manage and organize service in complicated IT service environments with frequent changes is a challenging issue. IT service and the related informat...
Improving the Recommendation of Collaborative Filtering by Fusing Trust Network
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Bo Yang,Pengfei Zhao,Shuqiu Ping,Jing Huang
Issue Date:November 2012
pp. 195-199
To accurately and actively provide users with their potentially interested information or services is the main task of a recommender system. Collaborative filtering is one of the most widely adopted recommender methods, whereas it is suffering the issue of...
Predicting Cement Compressive Strength Using Double-Layer Multi-expression Programming
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Qingke Zhang,Bo Yang,Lin Wang,Fuxiang Zhu
Issue Date:August 2012
pp. 94-97
This paper presents a novel algorithm named Double-layer Multi-expression Programming (DMEP). Then DMEP model is applied to the prediction of 28-day Portland cement compressive strength. We compare DMEP model with other four soft computing models, namely M...
Mining Data Chain Graph for Fault Localization
Found in: 2012 IEEE 36th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW)
By Bo Yang,Ji Wu,Chao Liu
Issue Date:July 2012
pp. 464-469
Fault localization is a challenging task in domain specific data mining. Most existing works focus on call graph that can find bugs which are associated with control flow. However, there are a lot of bugs related to data flow. In this paper, we presented a...
Multi-target tracking by online learning of non-linear motion patterns and robust appearance models
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Bo Yang,R. Nevatia
Issue Date:June 2012
pp. 1918-1925
We describe an online approach to learn non-linear motion patterns and robust appearance models for multi-target tracking in a tracklet association framework. Unlike most previous approaches that use linear motion methods only, we online build a non-linear...
An online learned CRF model for multi-target tracking
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Bo Yang,R. Nevatia
Issue Date:June 2012
pp. 2034-2041
We introduce an online learning approach for multitarget tracking. Detection responses are gradually associated into tracklets in multiple levels to produce final tracks. Unlike most previous approaches which only focus on producing discriminative motion a...
Variation of Soil Organic Carbon Stock under Land Use and Land Cover Changes in Farming-Pastoral Ecotone over the Past Century in Zhenlai, China
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jie Tang,Nan Zhang,Zhaoyang Li,Bo Yang
Issue Date:May 2012
pp. 1885-1888
The impact of land use and land cover changes (LUCC) on global carbon cycle raises more and more serious concerns. Various methods were assessed to determine the influence of LUCC on soil organic carbon (SOC). However, the regional patterns and causes of t...
Anaerobic Baffled Reactor (ABR) for Alkali-minimization Dyeing-printing Wastewater Biodegradation
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Qijun Zhong,Bo Yang
Issue Date:May 2012
pp. 1205-1208
The performance of the laboratory scale anaerobic baffled reactor (ABR) was investigated by the use of granular sludge to treat alkali-minimization and dyeing-printing wastewater (ADW-water). The experiment showed that the start-up of reactor was completed...
Developing and Simulation Research of the Control Model and Control Strategy of Static Frequency Converter
Found in: Intelligent System Design and Engineering Application, International Conference on
By Deshun Wang,Lichun Zhang,Bo Yang,Guanjun Li,Yibin Tao,Jianzhong Fu,Jianfeng Li,Liantao Ji
Issue Date:January 2012
pp. 1032-1035
a control model and control strategy of static frequency converter (SFC) for pumped storage power plant unit is presented. Control strategy of static start-up and its mathematical model is discussed in detail. And based on the 42 poles of synchronous machi...
Predicting Pareto Dominance in Multi-objective Optimization Using Pattern Recognition
Found in: Intelligent System Design and Engineering Application, International Conference on
By Guanqi Guo,Wu Li,Bo Yang,Wenbin Li,Cheng Yin
Issue Date:January 2012
pp. 456-459
A method of predicting Pareto dominance in multi-objective optimization using pattern recognition, and the framework of Pareto dominance classifier are proposed. A kind of Bayesian classifier is preliminarily implemented. It is used to predict Pareto domin...
Caching for Location-Aware Image Queries in Mobile Networks
Found in: Multimedia, International Symposium on
By Bo Yang,Manohar Mareboyana
Issue Date:December 2011
pp. 410-415
Caching has been widely used in mobile networks to improve system performance. However, conventional caching methodologies have two major drawbacks in dealing with spatial queries in a dynamic mobile network: (i) the description of cached data is defined b...
An utility-based job scheduling algorithm for Cloud computing considering reliability factor
Found in: Cloud and Service Computing, International Conference on
By Bo Yang,Xiaofei Xu,Feng Tan,Dong Ho Park
Issue Date:December 2011
pp. 95-102
Cloud computing' service-oriented characteristics advance a new way of service provisioning called utility based computing. However, toward the practical application of commercialized Cloud, we encounter two challenges: i) there is no well-defined job sche...
Communities Detection with Applications to Real-World Networks Analysis
Found in: Computational Intelligence and Security, International Conference on
By Bo Yang
Issue Date:December 2011
pp. 244-248
Community structure is one of non-trivial topological properties ubiquitously demonstrated in real-world complex networks. Related theories and approaches are of fundamental importance for understanding the functions of networks. Previously, we have propos...
Freehand Tracking Based on Behavioral Model Analysis
Found in: International Conference on Virtual Reality and Visualization
By Zhiquan Feng,Yanwei Zheng,Bo Yang,Wei Gai,Yi Li,Yan Lin,Haokui Tang,Xianhui Song
Issue Date:November 2011
pp. 103-108
A novel framework for 3D freehand tracking is put forward in this paper. Firstly, we model and investigate this problem under our virtual assembly system (VAS), so as to decrease the arbitrariness and complexity of this issue. Secondly, we put emphasis on ...
Microfinance in China's Poor Area and Its Impact to Loan Type - Evidence from Xinjiang Uygur Autonomous Region
Found in: Business Intelligence and Financial Engineering, International Conference on
By Bo Yang,Paerhati Jialali,Xianhua Wei
Issue Date:October 2011
pp. 486-490
China has made a great progress in poverty alleviation. One of the contributions is micro finance, which helps the poor access financial services. In this paper, we do surveys in Xinjiang Uygur Autonomous Region and conduct Log it models to search the dete...
Performance analysis of an OFDM transmission system based on IEEE802.11a
Found in: Global Mobile Congress
By Kuixi Chen, Jihua Lu, Bo Yang, Zhilun Li, Zibin Zhang
Issue Date:October 2011
pp. 1-6
Due to the strong ability in combating multipath fading, OFDM has been adopted in IEEE802.11a standard and has received considerable attention. The fundamental physical layer parts of OFDM-based IEEE802.11a are modeled and simulated in this paper. Second, ...
Puncturing and interleaving analysis of a physical layer link based on IEEE802.11a
Found in: Global Mobile Congress
By Bo Yang, Jihua Lu, Kuixi Chen, Jiannan Zhang, Chengran Dai
Issue Date:October 2011
pp. 1-7
We built a Simulink PHY Layer platform of OFDM-based IEEE802.11a standard. An improved puncturing method was proposed according to the principle of Viterbi decoding, and we did some simulations and analysis of the link layer properties under different E
Quality of Protection in Web Service: An Overview
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Yu Bo,Yang Lin,Ma Lin Ru
Issue Date:October 2011
pp. 495-498
Security has become an important aspect for Web Service technology. Along with the deep research of security technologies, a set of measureable and quantifiable indexes for evaluating security quality are strongly required. As a new research topic of Web S...
Change Function of 2D/3D Network-on-Chip
Found in: Computer and Information Technology, International Conference on
By Alexander Wei Yin,Thomas Canhao Xu,Bo Yang,Pasi Liljeberg,Hannu Tenhunen
Issue Date:September 2011
pp. 181-188
Network-on-Chip (NoC) has been widely accepted as one of the most promising on-chip communication architectures for many-core Systems-on-Chip (SoC). With billions of transistors integrated on a single chip, inter-component communication becomes more and mo...
Discovering Explorative Patterns from Real-World Complex Networks
Found in: Social Network Analysis and Mining, International Conference on Advances in
By Bo Yang, Jiming Liu
Issue Date:July 2011
pp. 502-506
The ability to discover patterns of networks is fundamental for structural analysis applied to them. Many ubiquitous patterns demonstrated by real-world networks have been discovered, and corresponding tools for finding them also have been developed. Altho...
A Random Network Ensemble Model Based Generalized Network Community Mining Algorithm
Found in: Social Network Analysis and Mining, International Conference on Advances in
By Bo Yang, Jing Huang, Dayou Liu
Issue Date:July 2011
pp. 79-86
The ability to discover community structures from explorative networks is useful for many applications. Most of the existing methods with regard to community mining are specifically designed for assortative networks, and some of them could be applied to ad...
Learning affinities and dependencies for multi-target tracking using a CRF model
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Bo Yang, Chang Huang,R. Nevatia
Issue Date:June 2011
pp. 1233-1240
We propose a learning-based Conditional Random Field (CRF) model for tracking multiple targets by progressively associating detection responses into long tracks. Tracking task is transformed into a data association problem, and most previous approaches dev...
SC-OA: A Secure and Efficient Scheme for Origin Authentication of Interdomain Routing in Cloud Computing Networks
Found in: Parallel and Distributed Processing Symposium, International
By Zhongjian Le,Naixue Xiong,Bo Yang,Yuezhi Zhou
Issue Date:May 2011
pp. 243-254
IP prefix hijacking is one of the top threats in the cloud computing Internets. Based on cryptography, many schemes for preventing prefix hijacks have been proposed. Securing binding between IP prefix and its owner underlies these schemes. We believe that ...
Random Rough Subspace Based Neural Network Ensemble for Insurance Fraud Detection
Found in: Computational Sciences and Optimization, International Joint Conference on
By Wei Xu, Shengnan Wang, Dailing Zhang, Bo Yang
Issue Date:April 2011
pp. 1276-1280
In this paper, a random rough subspace based neural network ensemble method is proposed for insurance fraud detection. In this method, rough set reduction is firstly employed to generate a set of reductions which can keep the consistency of data informatio...
A clock-gating based capture power droop reduction methodology for at-speed scan testing
Found in: 2011 Design, Automation & Test in Europe
By Bo Yang,A Sanghani,S Sarangi, Chunsheng Liu
Issue Date:March 2011
pp. 1-7
Excessive power dissipation caused by large amount of switching activities has been a major issue in scan-based testing. For large designs, the excessive switching activities during launch cycle can cause severe power droop, which cannot be recovered befor...
Modeling and Simulation of Axial Piston Hydraulic Pump
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Chen Bo, Yang Guoping, Xing Dongshi, Gao Junhao
Issue Date:January 2011
pp. 609-612
The operating principle of the swash plate axial piston pump is analysed. Based on AMESim software, the modeling and simulation on the axial piston pump are conducted. The mechanical model, hydraulic model and complete simulation model are established and ...
On the Spectral Characterization and Scalable Mining of Network Communities
Found in: IEEE Transactions on Knowledge and Data Engineering
By Bo Yang,Jiming Liu,Jianfeng Feng
Issue Date:February 2012
pp. 326-337
Network communities refer to groups of vertices within which their connecting links are dense but between which they are sparse. A network community mining problem (or NCMP for short) is concerned with the problem of finding all such communities from a giv...
Modeling Technology of Design Information in Rapid Design
Found in: System Science, Engineering Design and Manufacturing Informatization, International Conference on
By Bo Yang, Haitao Li, Wei Wang
Issue Date:November 2010
pp. 196-199
Key technologies of information reuse, which supports rapid collaborative design under network environment, are studied in this paper. The methods for integration modeling of information, the representation methods for information unit based on global view...
Study on Template-Based Coding Method of Binary OCR Table Image
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Zhengqiang Guan, Bo Yang, Pengfei Li
Issue Date:October 2010
pp. 498-501
The binary image is commonly found with a lower compression ratio in lossless coding, for which a template-based coding method was employed in the coding of the OCR table images. Specifically, a template image was first established in the same context of t...
Product Design Based on Biological Growth Mechanism
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Bo Yang, Wei Wang, Haitao Li
Issue Date:October 2010
pp. 82-84
According to the similarities between biological growth and product architecture evolution, the key procedures of biological growth are introduced into product design. The self-organizing design strategy and its implementation methods are proposed by apply...
A Novel Image Denoising Algorithm Based on Non-uniform Rectangular Partition and Interpolation
Found in: Multimedia Communications, International Conference on
By KinTak U,Xiaoyu He,Bo Yang,Dongxu Qi,Zesheng Tang
Issue Date:August 2010
pp. 9-12
This paper proposes a novel denoising algorithm according to the image approximation after the Non-Uniform Rectangular Partition. A given image can automatically be partitioned into different sub-rectangles with different dimensions and the bivariate polyn...
 1  2 Next >>