Search For:

Displaying 1-34 out of 34 total
System on Programmable Chip Development System
Found in: Education Technology and Computer Science, International Workshop on
By Lin Fei-yu, Jiao Xi-xiang, Guo Yu-Hui, Zhang Jian-chuan, Qiao Wei-ming, Jing Lan, Wang Yan-Yu, Ma Yun-hai
Issue Date:March 2010
pp. 471-474
The embedded systems have received increasing research interest in recent years due to its wide usage. This paper presents system on programmable chip (SOPC), a new technology in the embedded systems, to support the development of design projects for under...
 
Improved Compressive Tracking in Surveillance Scenes
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Huazhong Xu,Fei Yu
Issue Date:July 2013
pp. 869-873
In this paper we present a novel method for object tracking in surveillance scenes. We improve the 'ViBe' background subtraction algorithm by adding the scale invariant local ternary pattern operator 'SILTP' so as to detect moving shadow and increase the a...
 
Trends & Controversies
Found in: IEEE Intelligent Systems
By Anton Nijholt,Ronald C. Arkin,Sébastien Brault,Richard Kulpa,Franck Multon,Benoit Bideau,David Traum,Hayley Hung,Eugene Santos Jr.,Deqing Li,Fei Yu,Lina Zhou,Dongsong Zhang
Issue Date:November 2012
pp. 60-75
Many applications require knowledge about how to deceive, including those related to safety, security, and warfare. Speech and text analysis can help detect deception, as can cameras, microphones, physiological sensors, and intelligent software. Models of ...
 
Optimization for Fire Station Location Planning Based on Travel Time of Fire Vehicles
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Yan-Fei Yu
Issue Date:November 2012
pp. 328-331
A new fire station location planning method based on travel time of fire vehicles is demonstrated. In contrast to traditional circle-drawing method, it is quite easy to operate and make better balance between fire protection response performance and constr...
 
Control and Performance of the Multiphase Inverter
Found in: Asia-Pacific Power and Energy Engineering Conference
By Fei Yu, Mingzhong Qiao
Issue Date:March 2011
pp. 1-4
NA
 
A Four-Level Matching Model for Semantic Web Service Selection Based on QoS Ontology
Found in: Information Science and Engieering, International Symposium on
By Guangjun Guo, Fei Yu, Zhigang Chen, Dong Xie
Issue Date:December 2010
pp. 630-634
Services discovery based on syntactic matching cannot adapt to the open and dynamic environment of the web. In order to realize service selection for supporting QoS constraints, a Four-Level Matching Model for Semantic Web Service based on QoS Ontology and...
 
Impacts of Analysts' Cognitive Styles on the Analytic Process
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Eugene Santos Jr., Hien Nguyen, Fei Yu, Deqing Li, John T. Wilkinson
Issue Date:September 2010
pp. 601-610
A user’s cognitive style has been found to affect how they search for information, how they analyze the information, and how they make decisions in an analytical process. In this paper, we propose an approach that uses Hidden Markov Models (HMM) to dynamic...
 
Study on the Integrated Indicators of the Ecological Environment Evaluation on Karst Rock Desertification
Found in: Environmental Science and Information Application Technology, International Conference on
By Xiaoping Gu, Fei Yu, Yuxiang Luo, Jianguo Mo
Issue Date:July 2009
pp. 99-102
Some remarkable relative factors are selected after the relative analysis between factors selected from those possible causes, such as natural surroundings, meteorology, population feature, social economy and relationship between human and nature, related ...
 
Intent-Driven Insider Threat Detection in Intelligence Analyses
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Eugene Santos Jr., Hien Nguyen, Fei Yu, Keumjoo Kim, Deqing Li, John T. Wilkinson, Adam Olson, Russell Jacob
Issue Date:December 2008
pp. 345-349
When decisions need to be made in government, the intelligence community (IC) is tasked with analyzing the situation. This analysis is based on a huge amount of information and usually under severe time constraints. As such, it is particularly vulnerable t...
 
Optimal Two-Position Alignment for Strapdown Inertial Navigation System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Fei Yu, Yueyang Ben, Qian Li, Wei Gao
Issue Date:October 2008
pp. 158-164
The optimal two-position alignment using Kalman filter is newly derived for strapdown inertial navigation system (SINS). During the alignment process, SINS is rotated with respect to the heading axis. The Kalman filter estimates the misalignments and gyro ...
 
Locating Reference Points between Fingerprint Images
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xuzhou Li, Fei Yu
Issue Date:October 2008
pp. 64-67
Fingerprint matching is one of the most import modules in the Automatic Fingerprint Identification System (AFIS). This paper brings out an approach to locate the corresponding minutiae of two fingerprint images. The local feature, which consists of a centr...
 
An RFID-Based Automatic Identification System on Modern Grain Logistics
Found in: Management of e-Commerce and e-Government, International Conference on
By Zhuang Er, Fei Yu Lian, Jin Gong Lian
Issue Date:October 2008
pp. 10-13
Radio frequency identification (RFID) is a newly-developed automatic identification technology, superior qualities of which would make it possible to substitute the bar code system in the future. Most importantly, it plays a very important role in the area...
 
Design and Implementation of Embedded Multimedia Surveillance System
Found in: International Workshop on Knowledge Discovery and Data Mining
By Yan Liu, Ren-Fa Li, Cheng Xu, Fei Yu
Issue Date:January 2008
pp. 570-573
Due to the thrive of networking multimedia, artificial intelligence and embedded system, video surveillance system is evolved from computer-based to embedded-based. This paper presents an intelligent multimedia surveillance system based on embedded video s...
 
Intrusion Detection for High-Speed Networks Based on Producing System
Found in: International Workshop on Knowledge Discovery and Data Mining
By Ken Chen, Fei Yu, Cheng Xu, Yan Liu
Issue Date:January 2008
pp. 532-537
This paper firstly analyzed the front pattern matching algorithm of intrusion detection system, and improved on the pattern matching algorithm. Having immediately analyzed Rete algorithm and aimed at its shortage, the paper introduced the FRete net algorit...
 
The Implementation of Evidence Theory in Mobile E-Business Payment
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Ken Chen, Cheng Xu, Fei Yu
Issue Date:December 2007
pp. 214-217
One of the main features of modern payment system is to make the best use of the modern information technology to implement the payment information being transmitted ,handled and saved efficiently. With the rapid development of science technology and the a...
 
The Algorithms of Constructing Concept Lattices Based On CAT With Cognitive Diagnosis
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Liu Xiaojing, Wu Wenbing, Fei Yu, Deng Chang
Issue Date:December 2007
pp. 358-362
Constructing concept lattices plays an important role in Formal Concept Analysis. At present, cognitive diagnosis is a focus for researchers, and Computerized Adaptive Testing (CAT) with cognitive diagnosis is prospected but there are few relevant research...
 
PSO Algorithm Based Online Self-Tuning of PID Controller
Found in: Computational Intelligence and Security, International Conference on
By Xu-zhou Li, Fei Yu, You-bo Wang
Issue Date:December 2007
pp. 128-132
Proportional-Integral-Derivative (PID) controller is still widely used in control engineering, and tuning of PID is a crucial operation. We utilize particle swarm optimization algorithm to design an online self- tuning framework of PID controller. Our syst...
 
SVM Theory and Its Application in Fault Diagnosis of HVDC System
Found in: International Conference on Natural Computation
By Xi-Mei Liu, Wan-Yun Wei, Fei Yu
Issue Date:August 2007
pp. 665-669
Support Vector Machine (SVM), which based on Statistical Learning Theory, is a universal machine learning method. The fault diagnosis of nonlinear and high-controllable High Voltage Direct Current (HVDC) system based on SVM method is proposed, which can ta...
 
Optimal Joint Session Admission Control in Integrated WLAN and CDMA Cellular Networks with Vertical Handoff
Found in: IEEE Transactions on Mobile Computing
By Fei Yu, Vikram Krishnamurthy
Issue Date:January 2007
pp. 126-139
This paper considers optimizing the utilization of radio resources in a heterogeneous integrated system consisting of two different networks: a wireless local area network (WLAN) and a wideband code division multiple access (CDMA) network. We propose a joi...
 
The Fault Diagnosis of a Class of Nonlinear Stochastic Time-delay systems
Found in: Robotics and Biomimetics, IEEE International Conference on
By Fei Yu, Dong-mei Lv, Bing-yong Yan
Issue Date:December 2006
pp. 538-542
This paper presents a new fault detection algorithm for a class of nonlinear stochastic time-delay systems. Different from the classical fault detection design, a fault detection filter with an output observer and a consensus filter is constructed for faul...
 
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing
Found in: Semantics, Knowledge and Grid, International Conference on
By Rui Li, Renfa Li, Fei Yu, Jigang Wen
Issue Date:November 2006
pp. 73
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the underlying connectivity and routing protoc...
 
Research on User Authentication for Grid Computing Security
Found in: Semantics, Knowledge and Grid, International Conference on
By Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Cheng Xu
Issue Date:November 2006
pp. 72
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system is based on hash function, and mobile ...
 
Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security
Found in: Semantics, Knowledge and Grid, International Conference on
By Ronghui Wu, Renfa Li, Fei Yu, Guangxue Yue, Jigang Wen
Issue Date:November 2006
pp. 75
The tradition standby mechanism can?t carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid calculation is an important research subjec...
 
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation
Found in: Semantics, Knowledge and Grid, International Conference on
By Guang-xue Yue, Fei Yu, Yi-jun Chen, Rong-hui Wu, Ji-yao An, Ren-fa Li
Issue Date:November 2006
pp. 74
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper, the access control requirements in suc...
 
Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor
Found in: Semantics, Knowledge and Grid, International Conference on
By Cheng Xu, Fei Yu, Zhenghui Dai, Guangxue Yue, Renfa Li
Issue Date:November 2006
pp. 27
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adopting the network processor, a distribution...
 
A Privacy Policy of P3P Based on Relational Database
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Bin Jiang, Da-fung Zhang, Chao Yang, Guangxue Yue, Fei Yu
Issue Date:June 2006
pp. 510-515
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great dependence on the use application of static...
 
PVM: A Memory Management under Vertical Architecture
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Xinghui Zhu, Guang Lu, Fei Yu, Shuqiang Yang, Miaoliang Zhu
Issue Date:June 2006
pp. 326-331
In today's operating system, memory management policies based on the data-copying and hidden mechanisms blocks the system performance which is far from expectation. This paper introduces an innovative memory management system powered by vertical architectu...
 
Efficient QoS Provisioning for Adaptive Multimedia in Mobile Communication Networks by Reinforcement Learning
Found in: Broadband Networks, International Conference on
By Fei Yu, Vincent W. S. Wong, Victor C. M. Leung
Issue Date:October 2004
pp. 579-588
The scarcity and large fluctuations of link bandwidth in wireless networks have motivated the development of adaptive multimedia services in mobile communication networks, where it is possible to increase or decrease the bandwidth of individual ongoing flo...
 
Mobility-based anomaly detection in cellular mobile networks
Found in: Proceedings of the 2004 ACM workshop on Wireless security (WiSe '04)
By Bo Sun, Fei Yu, Kui Wu, Victor C. M. Leung
Issue Date:October 2004
pp. 61-69
This paper presents an efficient on-line anomaly detection algorithm that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme is derived from a well-developed data compression tec...
     
Programmable Digital Front-End Design for Software Defined Radio
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Lin Fei-yu, Qiao Wei-ming, Zhang Jian-chuan, Nan Gang-yang, Li Wei-bin, Mao Wei-yu
Issue Date:April 2010
pp. 321-324
The incoming evolution from 2G to 3G and beyond requires multimode operation of wireless communication system. In order to cope with these requirements, flexible and highly optimized digital signal processing has received growing interest. In this paper, a...
 
Performance Analysis of OFDM-IDMA System Based on QC-LDPC
Found in: Computer Science and Electronics Engineering, International Conference on
By Zhen-hua Wang,Ge-fei Yu,You-peng Zhang,Yuan-fu Lin,Cong Yang,Da-wei Liu
Issue Date:March 2012
pp. 99-102
To meet the need of high rate and high reliability for next generation of wireless mobile communication system, in this paper, we designed a new communications system of OFDM-IDMA based on QC-LDPC. The performance under different coding rate, different len...
 
A New Automobile Anti-interference Alarm System Based on Signal Detecting Technique to Design and Implement
Found in: Computer Science and Electronics Engineering, International Conference on
By Zhen-hua Wang,Xue-ping Zhang,Ge-fei Yu,Yuan-fu Lin,Lei Chen
Issue Date:March 2012
pp. 310-312
The populations of cars bring the convenience and happiness of living, but people are becoming more and more worried about the frequent loss of the cars. In this paper, a automobile security system is designed by adopting AT89C2051 and A7102C wireless tran...
 
Impact of Upstream Weaving Segment on Signalized Intersection Capacity
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xiao-guang Yang, Jing Zhao, Xiao-fei Yu
Issue Date:October 2008
pp. 377-382
Signalized intersections with weaving segment upstream are very common on urban roads. Weaving segment determines the arrival rate of the approach, and the operational condition of itself is affected by the approach queue accumulated at the same time. Acco...
 
Resource Selection based on Truthful Feedback in Grid Market
Found in: ChinaGrid, Annual Conference
By Ling-ling Hu, Yan-fei Yu, Shou-bao Yang
Issue Date:August 2008
pp. 28-32
In grid market, there is an information asymmetry problem between resource providers and users. In former approaches, users forecast resources' reliabilities to select resources based on historical feedbacks. Whether the feedbacks are credible is not incon...
 
 1