Search For:

Displaying 1-50 out of 78 total
Diatomological Distribution of Pearl River in Guangzhou and Yangtze River in Hubei Province and Its Application to the Diagnosis of Drowning Cases
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Huifang Su,Chao Liu,Sunlin Hu,Yan Liu,Xinshu Xu,Hong Liu,Jian Zhao
Issue Date:May 2012
pp. 157-162
Diatoms have received much popularity as forensic evidence for diagnosing death by drowning. Distribution of diatoms in any water body, and its correlation with the diatom genus recovered from the drowned body can be a method of choice to resolve questions...
LiveS Cube: An Experiment for Mobile Social Network
Found in: Networking and Distributed Computing, International Conference on
By Yu-qian Li,Yang Liu,Zhi-fang Liu,Chao Liu,Zhao-Nan Li,Fu-ye Han,Jun Li,Ming Xu,Xin Guan,Zhen Chen
Issue Date:September 2011
pp. 311-315
No summary available.
Mining Data Chain Graph for Fault Localization
Found in: 2012 IEEE 36th IEEE Annual Computer Software and Applications Conference Workshops (COMPSACW)
By Bo Yang,Ji Wu,Chao Liu
Issue Date:July 2012
pp. 464-469
Fault localization is a challenging task in domain specific data mining. Most existing works focus on call graph that can find bugs which are associated with control flow. However, there are a lot of bugs related to data flow. In this paper, we presented a...
The Research of a Multi-Factor Dynamic Authorization Model
Found in: 2012 IEEE 9th International Conference on e-Business Engineering (ICEBE)
By Jing Liu,Chao Liu,Dongliang Jiao,Jiaopeng Chen
Issue Date:September 2012
pp. 201-205
As there are always changes in trust level, organization structure, attributes of the subject, time strategy and so on, which will cause subject pemissions' change. The traditional static authorization based access control model is not appropriate in this ...
Basketball Court Detection Based on Adaptive Gaussian Mixture Model and the Application in Basketball Video Annotation
Found in: International Symposiums on Information Processing
By Liu Yun, Huang Chao, Liu Xueying
Issue Date:October 2010
pp. 368-371
Basketball court detection is the key step of video annotation, however the court present different color when using different camera or in different play court. In this paper the adaptive Gaussian Mixture Model (GMM) is used to build the model of the bask...
Pilot Study on Anoxic/Aerobic Membrane Bioreactor for Domestic Wastewater Treatment
Found in: Challenges in Environmental Science and Computer Engineering
By Zhiqiang Liu, Qingqing Li, Chao Liu, Xiaomei Zhang
Issue Date:March 2010
pp. 52-55
An Anoxic/Aerobic Membrane Bioreactor (A/O-MBR) system have been developed to improve the efficiency of nutrient removal. The important factors those system are the ratio of anoxic zone/aerobic zone (VA:VO), internal recycle rate (IR) and solids retention ...
Pilot Study on A/O Industrial Filter Cloth Self-forming Dynamic Membrane Reactor for Domestic Sewage Treatment
Found in: Challenges in Environmental Science and Computer Engineering
By Chao Liu, Zhiqiang Liu, Qingqing Li, Xiaomei Zhang
Issue Date:March 2010
pp. 60-62
This experiment used A/O industrial filter cloth self-forming dynamic membrane reactor to treat campus domestic sewage, COD removal rate of the effluent was 91%, NH3-N and TN removal rate of the effluent was 92.4% and 88.1% respectively, the average turbid...
Pilot Study on Vertical Anoxic-Oxic Submerged Membrane Bioreactor with Nylon Screen for Sewage Treatment
Found in: Challenges in Environmental Science and Computer Engineering
By Zhiqiang Liu, Xiaomei Zhang, Chao Liu, Qingqing Li
Issue Date:March 2010
pp. 48-51
To decrease further the footprint of common anoxic-oxic submerged membrane bioreactor (A-O SMBR), a vertical structure on A-O SMBR was introduced in this paper. A nylon screen (NS) was placed in the oxic zone together with hollow fiber membrane (HF). With ...
Eutrophication Assessment of Nansi Lake, China through Remote Sensing Technology
Found in: Future Computer and Communication, International Conference on
By Qun Miao, Chao Liu, Xiaohui Tan, Zhiqiang Liu, Ying Gao
Issue Date:June 2009
pp. 28-31
This research investigated the distribution of eutrophication degree in Nansi Lake using remote sensing data. Nine sampling points were monitored with Chla, TP and TN three parameters in upper lake of Nansi Lake. TSI of each sampling points was calculated ...
A Schema-Guiding Evolutionary Algorithm for 0-1 Knapsack Problem
Found in: Computer Science and Information Technology, International Association of
By Yan Liu, Chao Liu
Issue Date:April 2009
pp. 160-164
A Schema-Guiding Evolutionary Algorithm (SGEA) is proposed in this paper. The novel SGEA has many good features. It proposes the schema-modified operator to adjust the distribution of the population. What's more, it constructs an elite-schema space and pro...
Monitoring Chlorophyll-a and Suspended Substance in Nansi Lake, China through Remote Sensing Technology
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Miao Qun, Xiaohui Tan, Zhiqiang Liu, Chao Liu, Qingqing Li
Issue Date:December 2008
pp. 348-351
This research investigated the distribution of Chlorophyll-a and suspended substance (SS) in Nansi Lake using remote sensing data. The correlation between the Landsat5 TM data and the field measurement for water quality was analyzed using Pearson distribut...
Mining Open Source Component Behavior and Performance for Reuse Evaluation
Found in: Young Computer Scientists, International Conference for
By Ji Wu, Yong Po Liu, Xiao Xia Jia, Chao Liu
Issue Date:November 2008
pp. 1241-1247
Reusing Open Source Component (OSC) has become more and more popular in developing in-house applications. Before integrating an OSC into project, the component has to be evaluated according to the project. The lack of effective documentation, however, make...
IGSOM: Incremental Clustering Based on Self-Organizing-Mapping
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Ming Liu, Yuan-Chao Liu, Xiao-Long Wang
Issue Date:August 2008
pp. 885-890
Because of today's explosive information from internet, people will contact much new information at any moment. So how to analyze this non-stationary information becomes more and more important. Clustering analysis is a good information analysis method, bu...
Application of Maximum Entropy Principle to Software Failure Prediction
Found in: Computer Software and Applications Conference, Annual International
By Ji Wu, Hai-yan Yang, Xiao-xia Jia, Chang Liu, Chao Liu, Mao-zhong Jin
Issue Date:September 2004
pp. 180-185
How to predict failures from software input is still a tough issue. Two models, namely surface model and structure model, are presented in this paper to predict failure by applying the Maximum Entropy Principle. The surface model forecasts a failure from t...
Multi-label Classification based on Particle Swarm Algorithm
Found in: 2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Qingzhong Liang,Ze Wang,Yuanyuan Fan,Chao Liu,Xuesong Yan,Chengyu Hu,Hong Yao
Issue Date:December 2013
pp. 421-424
Multi-label classification is a generalization of single-label classification, and its samples belong to multiple labels. The K-nearest neighbor algorithm can solve this problem as an optimization problem. It finds the optimum solution by caculating the di...
The design model of evolutionary antenna with finite reflector
Found in: 2013 Ninth International Conference on Mobile Ad-hoc and Sensor Networks (MSN)
By Yuanyuan Fan,Qingzhong Liang,Xuesong Yan,Chengyu Hu,Chao Liu,Hong Yao
Issue Date:December 2013
pp. 262-266
In practical applications, the interference between the antenna and the metal structure nearby often cause deviation of the electromagnetic performance of the antenna. The factor of finite reflector should be considered in the evolutionary antenna to avoid...
Broadband Matching Network Design for Antennas Using Invasive Weed Optimization Algorithm
Found in: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Huaning Wu, Chao Liu
Issue Date:October 2013
pp. 500-503
In this paper, an Invasive Weed Optimization (IWO) algorithm has been proposed for designing antennas in broadband matching networks. The broadband matching network over the band 5-30MHz has been specifically designed based on our proposed IWO algorithm. A...
A Remote View System to Allow Real-Time Walkthrough
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Chao Liu,Toshiya Watanabe,Susumu Shibusawa,Tatsuhiro Yonekura
Issue Date:December 2012
pp. 918-923
A remote view system is a system for the delivery and presentation of information such as video and audio to users in remote locations. Methods for the construction of virtual environments based on video information have been applied to remote view technol...
CCSA: A Cloud Computing Service Architecture for Sensor Networks
Found in: 2012 International Conference on Cloud and Service Computing (CSC)
By Zhongwen Guo,Chao Liu,Yuan Feng,Feng Hong
Issue Date:November 2012
pp. 25-31
Sensor network systems have received amounts of attention and become a common practice in many fields. These systems are commonly developed by non-standard technologies, which bring lots of difficulties in system integration and interoperability. To figure...
Lock-Visor: An Efficient Transitory Co-scheduling for MP Guest
Found in: 2012 41st International Conference on Parallel Processing (ICPP)
By Lei Zhang,Yu Chen,Yaozu Dong,Chao Liu
Issue Date:September 2012
pp. 88-97
Multiprocessor (MP) virtual machines (VMs) are widely used in cloud environments. However, MP VMs suffer from lock holder preemption (LHP) issue. This causes a tremendous waste of CPU cycles, leading to deteriorated synchronization latency and a significan...
Storage and Solving of Large Sparse Matrix Linear Equations
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Chao Liu,Junmin Ye,Yining Ma
Issue Date:August 2012
pp. 673-677
Solving of large sparse matrix linear equations is always the research focus of scientific and engineering calculation field. With the sparsity and symmetry characteristics of coefficient matrix, Compressed Sparse Row (CSR) is adopted in the storage of lar...
Using Cluster Analysis to Identify Coincidental Correctness in Fault Localization
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Yihan Li,Chao Liu
Issue Date:August 2012
pp. 357-360
In order to improve efficiency of debugging, many fault localization techniques have been proposed to find out the program entities that are likely to contain faults. However, recent researches indicate that the effectiveness of fault localization techniqu...
Discriminative illumination: Per-pixel classification of raw materials based on optimal projections of spectral BRDF
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Jinwei Gu, Chao Liu
Issue Date:June 2012
pp. 797-804
Classifying raw, unpainted materials - metal, plastic, ceramic, fabric, etc. - is an important yet challenging task for computer vision. Previous works measure subsets of surface spectral reflectance as features for classification. However, acquiring the f...
Automatic Scanning by Scanning Electron Microscopy: The First Step towards Automation of Forensic Diatom Test
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jinfeng Wen,Sunlin Hu,Chao Liu,Weilie Dai,Songcai Wang,Hui Fang Su,Jian Zhao
Issue Date:May 2012
pp. 754-757
The diatom test is considered as the most reliable scientific method in solving the drowning cases. However, the detection and identification of diatoms have to be accomplished manually with the techniques of nowadays, which makes this test a time consumin...
K-AP Clustering Algorithm for Large Scale Dataset
Found in: Complexity and Data Mining, International Workshop on
By Chao Liu,Rosemary Hey,Wei Wang
Issue Date:September 2011
pp. 87-89
Affinity propagation clustering algorithm is with a broad value in science and engineering because of it no need to input the number of clusters in advances, robustness and good generalization. But the algorithm needs the initial similarity (the distance b...
A Cloud Service Cache System Based on Memory Template of Virtual Machine
Found in: ChinaGrid, Annual Conference
By Xuanhua Shi,Chao Liu,Song Wu,Hai Jin,Xiaoxin Wu,Li Deng
Issue Date:August 2011
pp. 168-173
In data centers and cloud computing environments, the number of virtual machines (VMs) increases when the number of service requests increases. Since services are invoked on demand, the corresponding virtual machines will be created and shut down frequentl...
Research on Dynamic Var Compensate Strategy of Wind Farm with Statcom
Found in: Asia-Pacific Power and Energy Engineering Conference
By Yongning Chi, Yan Li, Wei Sun, Chao Liu, Linjun Wei
Issue Date:March 2011
pp. 1-5
A Preliminary Study on the Components of Cotton Stalk Wood Vinegar by TG-FTIR
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Zhou Ling, Xu Chao, Liu Yi, Jiang En-chen, Xu Xi-wei
Issue Date:February 2011
pp. 683-685
Wood vinegar is a product of agriculture and forestry residues pyrolysis with insecticidal, antibacterial effect, and is even found to have health care. In recent years, wood vinegar is being taken seriously more and more by people. Cotton stalk wood vineg...
Deepening Treatment of the Low C/N Ratio Biogas Slurry at Mountainous Region Livestock Farming by Using Modified Two-Stage A/O System
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Wei-wei Yu, Zhi Zhang, Sheng-lan Bi, Shu-yang Li, Chao Liu
Issue Date:February 2011
pp. 1466-1469
The intensive and fast development of livestock farming with ecological pattern of raising¨Cbiogas¨Cirrigating is widely applied in China. After anaerobic fermentation the agricultural wastes can provides clean energy. However, there is problem by lack...
Comparison between Typical Discriminative Learning Model and Generative Model in Chinese Short Messages Service Spam Filtering
Found in: Asian Language Processing, International Conference on
By Xiaoxia Zheng, Chao Liu, Chengzhe Huang, Yu Zou, Hongwei Yu
Issue Date:December 2010
pp. 182-184
We used the experience of spam filtering on account of Chinese short messages service spam filtering and compared the performances of typical discriminative learning model and generative model, namely naive bayesian model and logistic regression model. Ove...
Research on the Fault Characteristic in Non-effectively Grounding Distribution Network with a Single-Phase-to-Earth Fault Based on Hilbert-Huang Transform
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Kang Zhong-jian, Li Dan-dan, Zhang Chao, Liu Xiao-lin
Issue Date:October 2010
pp. 276-279
According to the obvious transient characteristics at the beginning of the fault in the non-effectively grounding distribution system, a new method, based on Hilbert-Huang transform(HHT), is proposed to extract the non-power frequency transient current fro...
A Multi-node MPI Implementation on the CellBE Processor
Found in: ChinaGrid, Annual Conference
By Chao Liu, Xingjun Zhang, Jinghua Feng, Xiaoshe Dong
Issue Date:July 2010
pp. 197-202
Due to the heterogeneous multi-core architecture of the CellBE processor, the existing MPI implementation cannot effectively exert the SPE computing capability. In this paper, we design and implement a multi-node MPI programming and running environment for...
MISM: Modelica-Based Interactive Scheduling Mechanism for Virtual Educational Experiments
Found in: ChinaGrid, Annual Conference
By Wenbin Jiang, Zhen Tang, Hai Jin, Chao Liu
Issue Date:July 2010
pp. 103-108
Different virtual educational experiments (VEEs) have different frameworks and implementations in different disciplines. How to integrate different VEEs into one unified supporting platform is a challenging problem. The key problem of this integration is h...
Found in: International Conference on E-Business and E-Government
By Tao Li,Chao Liu
Issue Date:May 2010
pp. 2416-2419
In this paper, after the investigation and study the security situation of the accounting information system at home and abroad, analyzing the current security system of accounting information system with accounting data information security as an entry po...
Analysis of Transient Electromagnetic Field Coupling to Shielded Twisted-Pairs
Found in: Computational Sciences and Optimization, International Joint Conference on
By Chao Liu, Lixin Wang, Gang Zhang
Issue Date:May 2010
pp. 95-98
In order to predict the time domain response of the shielded twisted-pairs coupling from external transient electromagnetic field, an FDTD-MTL hybrid numerical model is developed. The coupling model is divided into two systems: external system and internal...
Design and Implementation for the Industrial Wireless Gateway of Smart Tunneling
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Quan Wang, Xuhui Chen, Ping Wang, Chao Liu
Issue Date:March 2010
pp. 938-941
By means of comprehensive analysis of the traits and demands of industrial wireless networks, interconnection issues between WIA-PA wireless industry network wireless networks and Ethernet for Plant Automation (EPA) are researched and concluded. Aim to sol...
Study on the Effect of Intellectual Capital on Firm Performance
Found in: Management of e-Commerce and e-Government, International Conference on
By Chao Liu
Issue Date:September 2009
pp. 228-231
The purpose of this paper is to explore the effects of intellectual capital on firm performance. Using data collected from 92 China’s high-tech firms, hypotheses were tested through hierarchical regression analysis. The empirical results of this study show...
Data Mining for Software Engineering
Found in: Computer
By Tao Xie, Suresh Thummalapenta, David Lo, Chao Liu
Issue Date:August 2009
pp. 55-62
To improve software productivity and quality, software engineers are increasingly applying data mining algorithms to various software engineering tasks. However, mining SE data poses several challenges. The authors present various algorithms to effectively...
TTCN-3 Based Robustness Test Generation and Automation
Found in: Information Technology and Computer Science, International Conference on
By Luo Xu, Ji Wu, Chao Liu
Issue Date:July 2009
pp. 120-125
Robustness testing is a widely accepted approach to detect potential robustness weaknesses. However, the existing robustness testing approach suffers from some limitations, especially lacking support for automatic extraction of the SUT(System Under Test) s...
A Novel Energy-Efficient Dynamic Voting Cluster Algorithm for Wireless Sensor Networks
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Ming Zhang, Chenglong Gong, Yuan Feng, Chao Liu, Huibin Feng
Issue Date:April 2009
pp. 631-634
For monitoring burst events in reactive Wireless sensor networks(WSNs),an novel energy-efficient dynamic voting cluster (EE-DVC) algorithm is proposed. EE-DVC has three obvious features: Firstly, it adopts virtual grid ideas to divide each cluster into M×N...
T3FAH: A TTCN-3 Based Fuzzer with Attack Heuristics
Found in: Computer Science and Information Engineering, World Congress on
By Luo Xu, Ji Wu, Chao Liu
Issue Date:April 2009
pp. 744-749
Fuzzing is an effective approach to detect vulnerabilities. Unfortunately, the existing fuzzing approach suffers from some limitations, especially lacking support for automation in extracting the SUT specific knowledge and generating test script. In this p...
DCSVS: Distributed Collaborative Set-Top-Box Video Service
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Chao Liu, Hao Chen, Dejian Ye
Issue Date:December 2008
pp. 354-359
This paper presents a novel video service system DCSVS (Distributed Collaborative Set-top-box Video Service), which encompasses several practical and effective solutions to both Live and VoD (Video-on-Demand) services. DCSVS is established on an overlay DH...
A Hybrid Re-sampling Method for SVM Learning from Imbalanced Data Sets
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Peng Li, Pei-Li Qiao, Yuan-Chao Liu
Issue Date:October 2008
pp. 65-69
Support Vector Machine (SVM) has been widely studied and shown success in many application fields. However, the performance of SVM drops significantly when it is applied to the problem of learning from imbalanced data sets in which negative instances great...
A Systematic Study of Failure Proximity
Found in: IEEE Transactions on Software Engineering
By Chao Liu, Xiangyu Zhang, Jiawei Han
Issue Date:November 2008
pp. 826-843
Software end-users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure reporting components have been widely deployed in released software. Many utiliti...
Web Application Model Recovery for User Input Validation Testing
Found in: Software Engineering Advances, International Conference on
By Nuo Li, Mao-zhong Jin, Chao Liu
Issue Date:August 2007
pp. 13
The invalidated input is one of the most critical web application security flaws. However, testing the user input validation function is an intellectual and labor intensive task. We are developing a model driven framework to help testers to accomplish this...
Implementation and performance evaluation of an iSCSI-Based Storage Virtualization
Found in: Networking, Architecture, and Storage, International Conference on
By Guang Yang, Jingli Zhou, Chao Liu
Issue Date:July 2007
pp. 273-274
Storage virtualization can be implemented at three layers: server-layer, storage-device-layer and network-layer. iSCSI-based storage virtualization is to implement storage virtualization at network-layer, and the implementation includes three sides: host, ...
How Bayesians Debug
Found in: Data Mining, IEEE International Conference on
By Chao Liu, Zeng Lian, Jiawei Han
Issue Date:December 2006
pp. 382-393
Manual debugging is expensive. And the high cost has motivated extensive research on automated fault lo- calization in both software engineering and data mining communities. Fault localization aims at automatically locating likely fault locations, and henc...
Metamodel Based Test Cases Generation in Model Driven Web Application Testing
Found in: Computational Intelligence for Modelling, Control and Automation, International Conference on
By Long Huang, Nuo Li, Ji Wu, Mao-zhong Jin, Chao Liu
Issue Date:December 2006
pp. 262
In model driven web application testing, the whole test process is driven and described by the test model which is based on test metamodel. In order to assure the quality of test model transformation and repository, metamodel based testing must be done. Fi...
Statistical Debugging: A Hypothesis Testing-Based Approach
Found in: IEEE Transactions on Software Engineering
By Chao Liu, Long Fei, Xifeng Yan, Jiawei Han, Samuel P. Midkiff
Issue Date:October 2006
pp. 831-848
Manual debugging is tedious, as well as costly. The high cost has motivated the development of fault localization techniques, which help developers search for fault locations. In this paper, we propose a new statistical method, called Sober, which automati...
A Framework of Model-Driven Web Application Testing
Found in: Computer Software and Applications Conference, Annual International
By Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu
Issue Date:September 2006
pp. 157-162
Web applications have become complex and crucial in many fields. In order to assure their quality, a high demand for systematic methodologies of Web application testing is emerging. <p>In this paper, a methodology of Model-Driven Testing (MDT) for We...
 1  2 Next >>