Search For:

Displaying 1-50 out of 149 total
A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection
Found in: IEEE Transactions on Knowledge and Data Engineering
By Hong Liu,Hong Lu,Xiangyang Xue
Issue Date:August 2013
pp. 1706-1718
We propose in this paper a segmentation and graph-based video sequence matching method for video copy detection. Specifically, due to the good stability and discriminative ability of local features, we use SIFT descriptor for video content description. How...
 
The Eutrophication Process in a Plateau Deepwater Lake: Response to the Changes of Anthropogenic Disturbances in the Watershed
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Chang-Liang Yang,Shi-Yu Li,Lin-Na Yuan,Liang-Xiu Yang,Hong-Zhou Zhang,Wei-Hong Liu
Issue Date:May 2012
pp. 1815-1821
Lake eutrophication, a serious environmental issue in the world, especially in recent years. In Lake Yangzonghai, a plateau deepwater lake in China, the anthropogenic disturbances have increased the eutropication, while people has not as yet known the effe...
 
Depth Recovery from Defocus Images Using Total Variation
Found in: Computer Modeling and Simulation, International Conference on
By Hong Liu,Yu Jia,Hong Cheng,Sui Wei
Issue Date:January 2010
pp. 146-150
According to defocus imaging theory, the amount of blur in the defocus images varies with depth of the object in the scene. So depth in the scene can be recovered by estimating the blur with the knowledge of the lens parameters. A novel application of the ...
 
Phase Retrieval Using the Transport-of-Intensity Equation
Found in: Image and Graphics, International Conference on
By Hong Cheng, Hong Liu, Quanbing Zhang, Sui Wei
Issue Date:September 2009
pp. 417-421
The transport-of-intensity equation describes the internal relationship between the intensity and phase distribution while wave is propagating in the mobile space. So the phase distribution can be solved by the use of the equation. It is an important measu...
 
The design and implementation of ontology based image retrieval for Xu Beihong Museums
Found in: Computer Science and Information Technology, International Conference on
By Liang Ye, Bao Hong, Liu Hong-zhe, Li Guofeng
Issue Date:August 2009
pp. 191-195
Ontology is formal shared conceptualization of domains of interest providing common vocabularies and used more and more for information retrieval system. In the paper, ontology is used in XuBeihong Museums retrieval system. A framework based on ontology is...
 
The Simulation Research of Dynamic Anti-collision
Found in: Software Engineering, World Congress on
By Bing Yi, Qi-hong Liu, Tian-de Li, Liang Zhang, Cai-hong Shen, Su-yi Zhang
Issue Date:May 2009
pp. 177-181
In this paper, We evaluate the performance of Anti-collision Algorithm of RFID system. we research dynamic framed slotted algorithm (DFSA) based on EPC Gen2 protocol based on this we studied a kind of framed time slot improvement algorithm (EDFSA) this alg...
 
Modeling the Intelligent Community Defense and Security System with Petri Nets
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Li Naiwen,Zheng Hong,Liu Yulong
Issue Date:November 2012
pp. 283-287
With the increasing popularity of the intelligent community, the intelligent community defense and security system is the core module of the intelligent community system. Modeling the defense and security system is the most important work among the design ...
 
A study on the value network of telecom service and the organization change of Chinese telecom operator
Found in: International Conference on Services Systems and Services Management
By Ying Peng, Hong liu, Houyong Tao, Fucheng Ming
Issue Date:June 2009
pp. 493-497
Since China joined the WTO, the Chinese telecom market has been transformed from a seller's to a buyer's market due to the new competition pattern and booming telecom technology. Therefore, the telecom industry must transform their production centered oper...
 
A Node-based Parallel Game Tree Algorithm Using GPUs
Found in: 2012 IEEE International Conference on Cluster Computing (CLUSTER)
By Liang Li,Hong Liu,Peiyu Liu,Taoying Liu,Wei Li,Hao Wang
Issue Date:September 2012
pp. 18-26
Game tree search is a classical problem in the field of game theory and artificial intelligence. Fast game tree algorithm is critical for computer games asking for real-time responses. In this paper, we focus on how to leverage massive parallelism capabili...
 
Diatomological Distribution of Pearl River in Guangzhou and Yangtze River in Hubei Province and Its Application to the Diagnosis of Drowning Cases
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Huifang Su,Chao Liu,Sunlin Hu,Yan Liu,Xinshu Xu,Hong Liu,Jian Zhao
Issue Date:May 2012
pp. 157-162
Diatoms have received much popularity as forensic evidence for diagnosing death by drowning. Distribution of diatoms in any water body, and its correlation with the diatom genus recovered from the drowned body can be a method of choice to resolve questions...
 
AASMP -- Android Application Server for Mobile Platforms
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Jian-Hong Liu,Jing Chen,Yi-Li Wu,Pei-Li Wang
Issue Date:December 2013
pp. 643-650
This paper presents the development of an Android Application Server for Mobile Platforms (AASMP). It is motivated by the widespread cloud computing and the popularity of mobile platforms, such as smartphones and tablet computers, running Android system. T...
 
Animation of the Biological Pollutants Propagation on Large-Scale Water Surface
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Guijuan Zhang,Dianjie Lu,Dengming Zhu,Hong Liu,Xiangxu Meng
Issue Date:September 2013
pp. 233-236
We present a method to animate the propagation of biological pollutants (e.g., algae, water hyacinth etc.) on large-scale water surface. In this paper, we focus on the clusters and large patches of aquatic plants rather than each single aquatic plant. The ...
 
A Petri-Net Based Context-Aware Workflow System for Smart Home
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Zhang Xing,Zheng Hong,Liu Yulong
Issue Date:May 2012
pp. 2336-2342
Workflow model has been successfully applied to the traditional computing environment. Currently, there are many studies trying to apply workflow to ubiquitous computing environment. In ubiquitous computing environment, a service must be based on the user'...
 
Comparative Study of Using Different Flow Pattern Bio-trickling Filter Treating Hydrogen Sulfide
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Liu Chunjing, Li Jian, He Hong, Liu Jia, Peng Shujing, Li Chao
Issue Date:February 2011
pp. 698-701
H2S (hydrogen sulfide) was regarded as the research object in this study. The removal performance of two bio-trickling filters was compared. One is the counter flow one, a traditional bio-trickling filter, and the other is a newly self designed cross flow ...
 
Empirical Study of the Price Volatility of Domestic and International Oil Futures
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liu Hong, Liu Xiaoxi
Issue Date:November 2010
pp. 644-647
The volatility of oil futures price is a subject which has been studied extensively by researchers. In this thesis, time series of closing price of thirty three oil futures contracts are selected, such as 180CST fuel oil futures contracts between March 200...
 
UPDS: Reliable Storage for Personal Data in Online Services
Found in: Networking and Distributed Computing, International Conference on
By Hong Liu, Jiangning Cui, Taoying Liu, Wei Li
Issue Date:October 2010
pp. 357-361
We all have a large amount of data stored in Gmail, Facebook, Twitter, Google Docs and many other online services. With the increasingly importance of these online data, we need an effective way to protect it. This paper proposes a personal data storage sy...
 
Popular or Personal: Access Patterns of User Generated Content
Found in: Networking and Distributed Computing, International Conference on
By Yi Shan, Taoying Liu, Hong Liu
Issue Date:October 2010
pp. 367-371
It is generally believed that Zipf’s law is well applied for Web objects. However, as OSNs prevail and Internet begins to concentrate more and more on individuals, many researchers report that request frequency of Web objects deviates from Zipf’s law notab...
 
IRain: A Personal Storage Cloud for Integrating Web Data Services
Found in: Cloud Computing, IEEE International Conference on
By Jiangning Cui, Taoying Liu, Qian Chen, Hong Liu
Issue Date:July 2010
pp. 528-529
In this paper, we design and implement IRain, a prototype of storage cloud for computer scientists and graduate students to manage personal data that spreads over the web. IRain (1) integrates personal data with various metainfo structures that comes from ...
 
The Computer-Aided Design and Manufacture of the Vane Wheel
Found in: Computer Engineering and Applications, International Conference on
By Quan Hong Liu, Hu Ran Liu
Issue Date:March 2010
pp. 457-461
At present, CAD/CAM (computer-aided design and manufacture) have fine wider and wider application in mechanical industry. For the complex surfaces, the traditional machine tool can no longer satisfy the requirement of such complex task. Only by the help of...
 
Parameterized Complexity of Finding Elementary Modes in Metabolic Networks
Found in: Bioinformatics, Systems Biology and Intelligent Computing, International Joint Conference on
By Hong Liu,Haodi Feng,Daming Zhu
Issue Date:August 2009
pp. 479-482
The concept of elementary (flux) modes provides a rigorous description of pathways in metabolic networks. Finding the elementary modes with minimum number of reactions (shortest elementary modes) is an interesting problem and has potential uses in various ...
 
MRDWA: Multi-role Dynamic Weighting Aggregation Algorithm in Event Driven Wireless Sensor Networks
Found in: Information Assurance and Security, International Symposium on
By Ying Chen, Jian Shu, Hong Liu, Linlan Liu, Jiajie Gong
Issue Date:August 2009
pp. 311-314
Data aggregation in wireless sensor networks eliminates data redundancy, thereby improving bandwidth usage and energy utilization. This paper presents a data aggregation algorithm, called MRDWA (Multi-Role Dynamic Weighting Aggregation), it mainly used in ...
 
Parameterized Complexity of Inverse Scope Problems in Metabolic Networks
Found in: Information Engineering, International Conference on
By Hong Liu, Haodi Feng, Daming Zhu
Issue Date:July 2009
pp. 394-397
Inverse Scope Problem aims to determine, by analyzing the structure of a metabolic network, the minimum cardinality set of seed compounds required for the synthesis of a specific compound or set of compounds. This paper examines the computational complexit...
 
Analyzing the Pathway of Organizational Change Based on the Environmental Complexity
Found in: Electronic Commerce and Business Intelligence, International Conference on
By Ying Peng, Hong Liu, Houyong Tao
Issue Date:June 2009
pp. 463-466
In traditional organizations, the procedures of change in pattern of
 
A lattice based evolution scheme with applications to design optimization
Found in: International Conference on Computer Supported Cooperative Work in Design
By Xiyu Liu, Hong Liu
Issue Date:April 2009
pp. 728-733
Design optimization is a multi-modal and complex problem which can not be treated successfully in scalar optimizer, such as evolutionary techniques. For typical genetic algorithms, most generalizations and variations do not spread to vector valued fitness ...
 
THCASN: A Prototype of CAS Area Network
Found in: Future Generation Communication and Networking Symposia, International Conference on
By Da-Peng Ju, Chuan-Yi Liu, Dong-Sheng Wang, Hong Liu, Zhi-Zhong Tang
Issue Date:December 2008
pp. 26-31
Content Aware Storage (CAS) is a model of storage facility. In this paper, we present a prototype of CAS Area Network system implemented at Tsinghua University in China (THCASN) compliant to the OSD T-10 standard. Experimental results of performance compar...
 
433MHz Wireless Network Technology for Wireless Manufacturing
Found in: Future Generation Communication and Networking
By Dai Qingyun, Bao Hong, Liu Yihong, Liu Zexi, Zhou Ke, Wang Jin
Issue Date:December 2008
pp. 393-397
To collect spot data for Wireless manufacturing system, an effective wireless network communication method based on 433MHz is proposed in this paper. The needed network equipments, network architecture and some examples are also introduced. Application res...
 
A novel distribution signaling protocol based on mobile agents and obs for intelligent optical networks
Found in: Parallel and Distributed Processing Symposium, International
By Wei Li, Yuan Li, Hong Liu, Nan Chi, Dexiu Huang
Issue Date:April 2008
pp. 1-6
A novel optical signaling protocol is proposed in which the mobile agent MANet is used to transport the distribution network control and management information among the nodes. The 1310nm band is designed to be a control optical wavelength channel to trans...
 
A Novel EMG Motion Pattern Classifier Based on Wavelet Transform and Nonlinearity Analysis Method
Found in: Robotics and Biomimetics, IEEE International Conference on
By Jingdong Zhao, Li Jiang, Hegao Cai, Hong Liu, Gerd Hirzinger
Issue Date:December 2006
pp. 1494-1499
A novel electromyographic (EMG) motion pattern classifier which combines VLR (variable learning rate) based neural network with wavelet transform and nonlinearity analysis method is presented in this paper. This motion pattern classifier can successfully i...
 
A Teleprogramming Method for Internet-based Teleoperation
Found in: Robotics and Biomimetics, IEEE International Conference on
By Zainan Jiang, Zongwu Xie, Bin Wang, Jie Wang, Jianbin Huang, Hong Liu
Issue Date:December 2006
pp. 422-426
A teleprogramming method is presented in this paper for the Internet-based teleoperation. Since the Internet introduces random communication delays, limit of bandwidth and data loss, several challenges, such as instability and loss of transparency, may ari...
 
An Approach to Test Data Generation for Killing Multiple Mutants
Found in: Software Maintenance, IEEE International Conference on
By Ming-Hao Liu, You-Feng Gao, Jin-Hui Shan, Jiang-Hong Liu, Lu Zhang, Jia-Su Sun
Issue Date:September 2006
pp. 113-122
Software testing is an important technique for assurance of software quality. Mutation testing has been identified as a powerful fault-based technique for unit testing, and there has been some research on automatic generation of test data for mutation test...
 
A New CLARANS Algorithm Based on Particle Swarm Optimization
Found in: Computer and Information Technology, International Conference on
By Xiyu Liu, Hong Liu
Issue Date:September 2006
pp. 12
CLARANS is an efficient and effective clustering method especially in spatial data mining. It is applicable to locate objects with polygon shape. Inspired by its randomized searching nature, and based on the standard particle swarm optimization PSO) algori...
 
Generative Design Supported by Tree Based Genetic Algorithm
Found in: Computer and Information Technology, International Conference on
By Hong Liu, Xiyu Liu
Issue Date:September 2006
pp. 267
This paper presents a novel computational approach that uses tree based genarative algorithm to generate design. This approach is illustrated by a reading lamp design example, which uses general mathematical expressions and tree-based genetic algorithm to ...
 
Application-aware Interface for SOAP Communication in Web Services
Found in: Cluster Computing, IEEE International Conference on
By Hao Wang, Yizhu Tong, Hong Liu, Taoying Liu
Issue Date:September 2006
pp. 1-8
SOAP protocol has emerged as the Web service communication standard. Because of the relatively poor performance, many researchers focus on improving the speed of processing SOAP message. In this paper, we propose SPI, which introduces client usage pattern ...
 
3D Model Based Head Pose Tracking by Using Weighted Depth and Brightness Constraints
Found in: Image and Graphics, International Conference on
By Guoyuan Liang, Hongbin Zha, Hong Liu
Issue Date:December 2004
pp. 481-484
This paper proposes a robust method of tracking human head poses from a sequence of monocular images. First we estimate the head pose parameters in the first frame by an affine correspondence based method developed in our lab. Then both the linear brightne...
 
Deadlock detection by fair reachability analysis: from cyclic to multi-cyclic protocols (and beyond?)
Found in: Distributed Computing Systems, International Conference on
By Hong Liu, R.E. Miller, H. van der Schoot, H. Ural
Issue Date:May 1996
pp. 605
We generalize the technique of fair reachability analysis to multi-cyclic protocols modeled as networks of communicating finite state machines, where a number of cyclic protocols are interconnected in such a way that any two component cyclic protocols shar...
 
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
Found in: IEEE Transactions on Parallel and Distributed Systems
By Hong Liu,Huansheng Ning,Qingxu Xiong,Laurence Yang
Issue Date:February 2014
pp. 1
Cloud computing is emerging as a prevalent data interactive paradigm to realize users’ data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the...
 
Moving Target with Load Balancing in P2P Cloud
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Hong Liu,Johnson Thomas,Praveen Khethavath
Issue Date:June 2013
pp. 359-366
In this paper we propose a 'moving target' security mechanism for a P2P cloud where files are partitioned and sensitive sections are moved at different times without modifying the routing or finger tables, to reduce the risk of the file being compromised. ...
 
Introducing a Distributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation
Found in: 2013 IEEE World Congress on Services (SERVICES)
By Praveen Khethavath,Johnson Thomas,Eric Chan-Tin,Hong Liu
Issue Date:June 2013
pp. 386-392
Cloud computing is an emerging field in computer science. Users are utilizing less of their own existing resources, while increasing usage of cloud resources. With the emergence of new technologies such as mobile devices, these devices are usually under-ut...
 
The Research of RFID Wireless Network Based on ZigBee Technology
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Wusheng Ji,Dongsheng Yang,Guo Hong,Liu Ge
Issue Date:June 2013
pp. 1392-1395
Based on the traditional RFID network, we proposed the RFID wireless sensor network. Because ZigBee network technology has very good reliability, self-organizing and adaptability. Combining ZigBee technology and RFID technology, we can improve convenience ...
 
Applying Bioinformatics Methods to Detect the Relationship among Complex Diseases
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Lin Hua,Zheng Yang,Hong Liu
Issue Date:June 2013
pp. 214-217
With the development of high throughout SNP genotype sequencing technology, genetics epidemiology study has come into a new phase. Currently, using molecular network and protein structure information to research complex diseases and find related biology ph...
 
Cyberentity Security in the Internet of Things
Found in: Computer
By Huansheng Ning,Hong Liu,Laurence T. Yang
Issue Date:April 2013
pp. 46-53
A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
 
A Fast and Robust Pedestrian Detection Framework Based on Static and Dynamic Information
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Tao Xu,Hong Liu,Yueliang Qian,Zhe Wang
Issue Date:July 2012
pp. 242-247
With the powerful development of pedestrian detection technique based on sliding-window and machine-learning, detection-based tracking systems have become increasingly popular. Most of these systems rely on existing static pedestrian detectors only despite...
 
Supporting Audio Streaming in Application Cloud for Embedded Systems
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Jian-Hong Liu,Jing Chen,Yu-Chin Tsai,Yi-Chuan Tai,Chen-Hao Shih
Issue Date:June 2012
pp. 1800-1805
Clouding computing brings new paradigms in the development and deployment of software. An inevitable issue would be the deployment and the execution of existing application software, not necessarily legacy ones, in an environment of cloud computing. This i...
 
The Research on Treatment of Lead-Bearing Waste Water by Xonotlite Simultaneous Training and Domesticating Granular Sludge
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Han Jian Hong,Liu Pai,Ni Wen,Ma Xue Ling,Ma Li,Yang Dong Mei
Issue Date:March 2012
pp. 783-787
The experimental research was carried out to investigate the effect of putting xonotlite to train granular sludge in the training process, the analysis was done that the effect by xonotlite on reactor running, effluent value, microorganism and removing lea...
 
GPS-Free Event-to-Sink Routing Scheme for Data Aggregation in Wireless Sensor Networks
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Bing-Hong Liu,Jyun-Yu Jhang,Kuo-Wen Su
Issue Date:December 2011
pp. 25-28
Recently, many researchers address on the problem of reducing power consumption for data aggregation in wireless sensor networks. However, many existing event-to-sink routing schemes for data aggregation require assistance from a global positioning system ...
 
NN-SMC MPPT Method for PV Generating System
Found in: International Conference on Robot, Vision and Signal Processing
By Zhao Yong,Li Hong,Liu Liqun
Issue Date:November 2011
pp. 141-144
An efficient Maximum Power Point Tracking (MPPT) method is extremely important to improve the output efficiency and electrical energy quality of a photovoltaic (PV) generating system. The MPPT course is very difficult due to the nonlinear and time-varying ...
 
Application of Boundary Element Method in Unsteady Production Prediction
Found in: Computational and Information Sciences, International Conference on
By Hong Liu,Xinhai Wang
Issue Date:October 2011
pp. 1084-1086
Domestic and overseas investigation showed that boundary element method was widely used in seepage flow, but it was mostly used in well bore pressure curve feature research of different reservoir types. Its use in unsteady production prediction has not bee...
 
A Novel Hardware Acceleration Implementation for Parallel Finite-Difference Time-Domain Simulation
Found in: Computational and Information Sciences, International Conference on
By Lihong Zhang,Hong Liu,Xiaomei Guo,Wenhua Yu
Issue Date:October 2011
pp. 7-10
This article introduces a novel hardware acceleration technique based on Vector Arithmetic Logic Unit (VALU) built in a regular CPU for parallel Finite-Difference Time-Domain(FDTD) simulation with Convolutional Perfect Matched Layer(CPML) absorbing boundar...
 
An Improved Cellular Genetic Algorithm with Evolutionary Rules for 3D Animation Modeling Design
Found in: Computer-Aided Design and Computer Graphics, International Conference on
By Xiaopeng Yang,Hong Liu,Yanhui Ding,Hanchao Yu
Issue Date:September 2011
pp. 341-348
In order to inspire and assist designers to create novel 3D animation modelings, an improved cellular genetic algorithm with evolutionary rules is proposed in this paper and applied in 3D animation modeling design. In this algorithm, ACIS rule expressions ...
 
Research on Index Portfolio Optimized Replication Model Based on Liquidity Penalty Factor
Found in: Digital Manufacturing and Automation, International Conference on
By Hong Liu,Xiao Zhao
Issue Date:August 2011
pp. 972-975
The stock and portfoLio Liquidity are directly relating to the impact cost of portfoLio adjustments, with the lack of depth in the market, it may cause the failure of index repLication. In order to solve this problem, under the condition of considering tha...
 
 1  2 Next >>