Search For:

Displaying 1-50 out of 64 total
HYBRID TCP/UDP video transport for H.264/AVC content delivery in burst loss networks
Found in: Multimedia and Expo, IEEE International Conference on
By Timothy Porter,Xiao-Hong Peng
Issue Date:July 2011
pp. 1-5
In this paper we propose a hybrid TCP/UDP transport, specifically for H.264/AVC encoded video, as a compromise between the delay-prone TCP and the loss-prone UDP. When implementing the hybrid approach, we argue that the playback at the receiver often need ...
 
Observation Reduction for State-Action Tables
Found in: Computational Intelligence and Security, International Conference on
By Wei Huang, Hong Peng
Issue Date:December 2009
pp. 10-14
The problem of planning for reachability goals in full observable nondeterministic domains has been addressed in the literature, where plans are often expressed as state-action tables under the hypothesis that, states of the world can be sensed directly by...
 
A Color Image Watermarking Scheme in Wavelet Domain Based on Support Vector Machines
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Deyu Hu, Jun Wang, Hong Peng, Xun Wang
Issue Date:December 2008
pp. 404-407
A digital watermarking method for color image in wavelet domain is proposed. The watermarking information which include a section of template information, is embedded into low-frequency coefficients of Y component in YUV color space. This section of templa...
 
EEG-Based Cognitive Interfaces for Ubiquitous Applications: Developments and Challenges
Found in: IEEE Intelligent Systems
By Bin Hu,Dennis Majoe,Martyn Ratcliffe,Yanbing Qi,Qinglin Zhao,Hong Peng,Dangping Fan,Fang Zheng,Mike Jackson,Philip Moore
Issue Date:September 2011
pp. 46-53
Technical advances in the neuroelectric recordings and in the computational tools for the analysis of the brain activity and connectivity make it now possible to follow and to quantify, in real time, the interactive brain activity in a group of subjects en...
 
Energy Saving Routing Algorithm Based on Stable Zone in Mobile Ad Hoc Networks
Found in: International Symposiums on Information Processing
By Hong Peng, Lin Shao
Issue Date:October 2010
pp. 181-185
In mobile ad hoc networks, the nodes are powered by batteries. So one of the most important merits when evaluating a given protocol is its ability to decrease node energy consumption and prolong network lifetime. Concerning this problem, an improved routin...
 
Support Vector Machines for Text Categorization in Chinese Question Classification
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Xu-Dong Lin, Hong Peng, Bo Liu
Issue Date:December 2006
pp. 334-337
Question classification plays a crucial important role in the question answering system because categorizing a given question is beneficial to identify an answer in the documents. The goal of question classification is to accurately assign labels to questi...
 
Document Classification Based on Support Vector Machine Using a Concept Vector Model
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Shuang Deng, Hong Peng
Issue Date:December 2006
pp. 473-476
This paper proposes a new method for document categorization, based on support vector machine (SVM) using a concept vector model (CVM). The traditional document classification usually ignores the semantic relations among the keywords or documents. To effec...
 
Pause Intensity: A No-Reference Quality Assessment Metric for Video Streaming in TCP Networks
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Colin Bailey,Mirghiasaldin Seyedebrahimi,Xiao-Hong Peng
Issue Date:July 2012
pp. 818-823
In this paper a full analytic model for pause intensity (PI), a no-reference metric for video quality assessment, is presented. The model is built upon the video play out buffer behavior at the client side and also encompasses the characteristics of a TCP ...
 
Quality Assessment of Video Transmission in Heterogeneous Networks as Applied to Real-Time Telecare
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Colin Bailey,Xiao-Hong Peng
Issue Date:June 2012
pp. 1850-1855
This work looks into video quality assessment applied to the field of telecare and proposes an alternative metric to the more traditionally used PSNR based on the requirements of such an application. We show that the Pause Intensity metric introduced in [1...
 
Research on VAF of IFPUG Method Based on Fuzzy Analytic Hierarchy Process
Found in: Computer and Information Science, ACIS International Conference on
By Hong Peng,Gen Xing Yang,Lizhi Cai
Issue Date:June 2012
pp. 593-597
As the weight of the general system characteristics (GSC) in IFPUG method is the same in the different types of software systems. To solve the problem, this article uses the Fuzzy AHP (Analytic Hierarchy Process) approach to assign weight to the fourteen g...
 
A Real-Time Electroencephalogram (EEG) Based Individual Identification Interface for Mobile Security in Ubiquitous Environment
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Bin Hu,Quanying Liu,Qinglin Zhao,Yanbing Qi,Hong Peng
Issue Date:December 2011
pp. 436-441
With the booms of mobile communication, especially mobile smart phone, technologies to identify individuals for mobile security calls for some more strict requirements in user-friendly, real-time and ubiquitous aspects. In addition to traditional approache...
 
Exploring the Effect of Buffer Behaviour on Perceived Video Quality
Found in: Computer and Information Technology, International Conference on
By Colin Bailey,Xiao-Hong Peng
Issue Date:September 2011
pp. 591-596
In this work we deal with video streams over TCP networks and propose an alternative measurement to the widely used and accepted peak signal to noise ratio (PSNR) due to the limitations of this metric in the presence of temporal errors. A test-bed was crea...
 
A Fragile Watermarking Scheme Based on Hash Function for Web Pages
Found in: Network Computing and Information Security, International Conference on
By Zulin Zhang, Hong Peng, Xianzhong Long
Issue Date:May 2011
pp. 417-420
With the development of Internet, the integrity protection of web pages has become an important problem. A fragile watermarking scheme based on hash function for web pages is proposed in this paper. Watermarks are generated by using hash function and these...
 
A Defense Model Study Based on IDS and Firewall Linkage
Found in: Information Science and Management Engineering, International Conference of
By Lei-jun Li, Hong Peng
Issue Date:August 2010
pp. 91-94
In the face of many network security problems, the firewall and intrusion detection systems have been powerless. Current network security model of a hot spot is to the advantage of two fully integrated. This paper discusses an intrusion detection system an...
 
Investigation of PHY, MAC and APP Layers for Adaptive and Cross-Layer Optimization in IEEE802.11 WLAN
Found in: Computer and Information Technology, International Conference on
By Mirghiasaldin Seyedebrahimi, Xiao-Hong Peng
Issue Date:July 2010
pp. 2581-2588
Due to huge popularity of portable terminals based on Wireless LANs and increasing demand for multimedia services from these terminals, the earlier structures and protocols are insufficient to cover the requirements of emerging networks and communications....
 
Study on Gob-Side Small Pillar Stress Analysis and Deformation Mechanism
Found in: Intelligent Computing and Cognitive Informatics, International Conference on
By Xiu-feng Meng, Hong Peng
Issue Date:June 2010
pp. 239-242
Roadway side of coal pillar for the isolation and maintenance of gob roadway, the pillar is the main supporting role, the pillar on the roof rock deformation and failure of the control law has a great influence. The comprehensive analysis of gob-side small...
 
Improving the Computational Efficiency of Recursive Cluster Elimination for Gene Selection
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Lin-Kai Luo, Deng-Feng Huang, Ling-Jun Ye, Qi-Feng Zhou, Gui-Fang Shao, Hong Peng
Issue Date:January 2011
pp. 122-129
The gene expression data are usually provided with a large number of genes and a relatively small number of samples, which brings a lot of new challenges. Selecting those informative genes becomes the main issue in microarray data analysis. Recursive clust...
 
Analysis of E-business Model Classification Framework Based on Value Proposition
Found in: International Conference on E-Business and E-Government
By Hong Peng
Issue Date:May 2010
pp. 3699-3702
Classification method is a hotspot and difficult issue in the analysis of e-business model. On the basis of analysis and summarization of present classification research of business model, a e-business model classification framework is built based on value...
 
Automatic Summarization for Chinese Text Based on Combined Words Recognition and Paragraph Clustering
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Chang-jin Jiang, Hong Peng, Qian-li Ma, Jian-chao Chen
Issue Date:April 2010
pp. 591-594
With the tremendous amount of information available electronically, there is an increasing requirement for automatic text summarization systems. An extractive summarization method is represented. The weight of a Chinese word/phrase is computed based on its...
 
Optimal Caching for H.264 Partitioned Video Streaming
Found in: Multimedia, International Symposium on
By Richard Haywood, Xiao-Hong Peng
Issue Date:December 2009
pp. 235-242
In this paper we investigate the possible benefits of a caching scheme for video encoded using the data partitioning option from the H.264 standard. We propose a method to measure the importance of a partition based on its contribution to the peak signal-t...
 
Fault Diagnosis Based on Particle Swarm Optimization by Artificial Immunisation Algorithm
Found in: Multimedia Information Networking and Security, International Conference on
By Chu-Jiao Wang, Shi-Xiong Xia, Hong-Peng Xuan
Issue Date:November 2009
pp. 557-560
Particle swarm optimization (PSO) is a new general machine-learning tool under the evolutionary algorithms (EAs) and gained lots of attention in various engineering applications, this paper presents an intelligent methodology for diagnosing incipient fault...
 
A Semi-fragile Image Watermarking Resisting to JPEG Compression
Found in: Management of e-Commerce and e-Government, International Conference on
By Xiangqing Wang, Jun Wang, Hong Peng
Issue Date:September 2009
pp. 498-502
Semi-fragile watermark has attracted attention due to itsimportant role in content authentication for multimedia. In order to distinguish malicious tampering from incidental attacks, semi-fragile watermark must be robust against content-protection image pr...
 
A Watermarking-Based Host Correlation Detection Scheme
Found in: Management of e-Commerce and e-Government, International Conference on
By Zheng Pan, Hong Peng, Xianzhong Long, Changle Zhang, Ying Wu
Issue Date:September 2009
pp. 493-497
A watermarking-based host correlation detection method is proposedin this paper. The idea is to embed some unique watermark into theflow by slightly adjusting the timing of selected packets in theflow. In the embedding phase, we use network flow groupingst...
 
A Fragile Software Watermarking for Tamper-Proof
Found in: Information Assurance and Security, International Symposium on
By Changle Zhang, Hong Peng, Xianzhong Long, Zheng Pan, Ying Wu
Issue Date:August 2009
pp. 309-312
A fragile software watermarking scheme for integrity verification of software is proposed in this paper. The algorithm uses the idea of semantic-preserving code substitution for embedding the watermark. With the system, the generated watermark relates clos...
 
A Fragile Watermarking Scheme for Tamper-Proof of Web Pages
Found in: Information Engineering, International Conference on
By Xianzhong Long, Hong Peng, Changle Zhang, Zheng Pan, Ying Wu
Issue Date:July 2009
pp. 155-158
With the development of the Internet, getting informationthrough browsing web pages has become a popularway. How to protect the integrity of a web page is anurgent problem. As an effective method, a novel fragilewatermarking scheme for tamper-proof of web ...
 
An Integrated Water Quality-Quantity Method for Water Resource Management
Found in: Environmental Science and Information Application Technology, International Conference on
By Wanshun Zhang, Yan Wang, Hong Peng
Issue Date:July 2009
pp. 178-181
As the increasing water demand and serious water pollution, conventional allocation pattern, which mainly considers water quantity as the key factor, is no longer satisfying the water allocation need. An integrated water quantity-quality method for water r...
 
An Adaptive Audio Watermarking Method Based on Local Audio Feature and Support Vector Regression
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Hong Peng, Jun Wang, Weixing Wang
Issue Date:May 2009
pp. 381-384
Based on local audio feature and support vector regression (SVR), an adaptive blind audio watermarking algorithm in wavelet domain is proposed in this paper. The audio signal is partitioned into audio frames, and the watermark is embedded in wavelet domain...
 
An Information Hiding Algorithm Based on Blocks and Scrambling
Found in: Artificial Intelligence, International Joint Conference on
By Hong Peng,YanBin Lin,Yuanzhi Wang
Issue Date:April 2009
pp. 327-329
There are low bit and high bit hiding algorithms in the spatial domain. The paper proposes a new algorithm. First, divide the cover image into three-pixel blocks. Then, use Arnold transformation to scramble the secret image. Eventually, modify the pixel va...
 
Application of Modified Genetic Algorithm in Feature Extraction of the Unstructured Data
Found in: Advanced Computer Control, International Conference on
By Nan Du, Hong Peng, Wenfeng Zhang
Issue Date:January 2009
pp. 124-128
Since unstructured data’s quantity is huge and the form is not disunity, thus the extent mining algorithms are hard to mine them. This paper supposes a modified genetic algorithm which extracts the feature from the unstructured data in a high efficiency an...
 
The Research on Responding Time and Precision of Centralized Controlled Cricket Indoor Location System
Found in: Communications and Mobile Computing, International Conference on
By Hong-Peng Wang, Gang Han
Issue Date:January 2009
pp. 349-352
In this paper, a semi-centralized controlled architecture based on Cricket is presented; it can reduce the interference to obtain a shorter responding time (it’s better than decentralized architecture). A simplified method to be proposed to measure the dis...
 
A Robust Watermarking Scheme Based on Audio Features in Multiwavelet Domain
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Xun Wang, Hong Peng, Deyu Hu, Jun Wang
Issue Date:December 2008
pp. 408-412
Combined with audio features and the advantage of discrete multiwavelet transform (DMT) in signal processing, a novel audio watermarking scheme is proposed in this paper. Due to the high relevance between adjacent audio frames, the watermark embedding and ...
 
A New Kind of Weighted Median Filtering Algorithm Used for Image Processing
Found in: Information Science and Engieering, International Symposium on
By Xiuqin Deng, Yong Xiong, Hong Peng
Issue Date:December 2008
pp. 738-743
Aimed at the excellence and shortcoming of the traditional median filtering algorithm, this paper proposes a new adaptive weighted median filtering algorithm. The new algorithm first determines noise points in image through noise detection, then adjusts th...
 
A New Feature Extraction Approach Based on Sentence Element Analysis
Found in: Computational Intelligence and Security, International Conference on
By Chuangxin Yang, Hong Peng, Jiabing Wang
Issue Date:December 2008
pp. 90-95
Considering that each sentence element of a sentence or clause plays an important role in describing case and (or) object in documents, a feature extraction method based on sentence element is proposed in this paper. The method can extract feature terms fr...
 
A Novel Blind Image Watermarking Scheme Based on Support Vector Machine in DCT Domain
Found in: Computational Intelligence and Security, International Conference on
By Fanman Meng, Hong Peng, Zheng Pei, Jun Wang
Issue Date:December 2008
pp. 16-20
This paper proposed a novel blind image watermark scheme in discrete cosine transform (DCT) domain. The original image is divided into small image blocks with size 8*8 first, and then the binary watermark bits are embedded into DCT domain of image blocks a...
 
Improved Strategies for OBB Fitting and Overlap Test for OBB
Found in: Computer Science and Software Engineering, International Conference on
By Gan Jian-Hong, Peng Qiang, Jim X. Chen
Issue Date:December 2008
pp. 996-999
The OBB (Oriented Bounding Box) are limited in application for the great computation load, especially deformable soft object for its complex computation. An improved OBB fitting method and OBB overlap test method are presented in this paper. The improve OB...
 
GRE: Graded Residual Energy Based Lifetime Prolonging Algorithm for Pipeline Monitoring Sensor
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Zhong-wen Guo, Hanjiang Luo, Feng Hong, Peng Zhou
Issue Date:December 2008
pp. 203-210
Wireless sensor networks have been applied to monitor pipeline structural health. In these networks, expensive multi-sinks with energy harvesting modules are deployed along the linear pipeline, and battery powered sensor nodes are deployed between the sink...
 
A Clustering Algorithm for Weighted Graph Based on Minimum Cut
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Chuangxin Yang, Hong Peng, Jiabing Wang
Issue Date:November 2008
pp. 649-653
Clustering is the unsupervised classification of patterns into groups. It groups a set of data in a way that maximizes the similarity within clusters and minimizes the similarity between two different clusters. In this paper, the Hartuv and Shamir’s cluste...
 
Polynomial Radial Base Function: A New Local Similarity Measure
Found in: International Conference on Natural Computation
By Linkai Luo, Ting Liu, Hong Peng, Qifeng Zhou
Issue Date:October 2008
pp. 116-119
This paper studies the local similarity measure function. First, we propose polynomial radial base function (PRBF) as a local similarity measure. Then we compare the properties between Gaussian radial base function (GRBF) and PRBF, and show PRBF not only i...
 
Implementation and Performance Evaluation of an Experimental Wireless Relay Sensor Network
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Gu-Chun Zhang, Xiao-Hong Peng, Xuan-Ye Gu
Issue Date:September 2008
pp. 513-519
We investigate the performance of an experimental wireless relay sensor network comprising a source node, a destination node and dedicated relay nodes. Two relaying algorithms, dynamic relaying and fixed relaying, are tested to find out to what extent the ...
 
Grey Theory Based Evaluation for SAR Image Denoising
Found in: Image and Signal Processing, Congress on
By Miao Ma, Yan-Ning Zhang, Hong-Peng Tian
Issue Date:May 2008
pp. 608-612
To evaluate the quality of denoised SAR images, this paper discusses some performance parameters, and proposes a grey-theory-based method. The main idea of the method is to extract some comparative sequences and a reference sequence, respectively standing ...
 
State-of-the-Art in Volterra Series Modeling for ADC Nonlinearity
Found in: Asia International Conference on Modelling & Simulation
By Hu Xiao, Ma Hong, Peng Juan, Tian Chen
Issue Date:May 2008
pp. 1043-1047
The Volterra series behavioral approach has been largely applied in recent years for modeling of nonlinear dynamic systems. Only recently it was used to mathematically model time-invariable systems such as analog to digital devices (ADCs). In this paper, t...
 
Probabilistic Document Correlation Model
Found in: Computational Intelligence and Security Workshops, International Conference on
By Xiping Jia, Hong Peng
Issue Date:December 2007
pp. 433-436
Vector Space Model (VSM) and related models are popular in document relationship analysis in text mining recently. However, they are failed to discover the document correlation from topic level. This paper proposes a probabilistic document correlation mode...
 
Security Operation Center Based on Immune System
Found in: Computational Intelligence and Security Workshops, International Conference on
By Yi Niu, Quanju Zhang, QiLun Zheng, Hong Peng
Issue Date:December 2007
pp. 97-103
With the widespread application of large and compli- cated network, network safety has become an important is- sue. In this paper, we design a security operation center (SOC) using an analogy of natural world immunology, We adopt an immune mechanism that d...
 
Niche Gene Expression Programming Based on Clustering Model
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Yishen Lin, Hong Peng
Issue Date:December 2007
pp. 10-13
A hybrid niching gene expression programming algorithm, which combines the niching method and clustering model, is proposed. Similar to other evolution algorithms, GEP also has the problem of premature convergence. Niching method is critical to keep divers...
 
Adaptive Watermarking Algorithm Using SVR in Wavelet Domain
Found in: Computer and Information Science, ACIS International Conference on
By Jun Li, Hong Peng, Zheng Pei
Issue Date:July 2007
pp. 207-211
An adaptive blind watermarking algorithm based on the human visual system (HVS) and support vector regression (SVR) in wavelet domain is proposed in this paper. Thanks to the good non-linear function learning and generalization capability, SVR is adopted t...
 
Enabled SIP-Based Multimedia Services with MPLS Technology in Ad Hoc Wireless Networks
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hong-Peng Wang, Tie-Jun Zhang, Xiao-Zong Yang
Issue Date:December 2006
pp. 189-192
The next generation communication system will provide high quality multimedia service in a more flexible and intelligent manner. As the extension of next generation network?s last one mile, multi-hop wireless ad hoc networks have attracted more research at...
 
Support Vector Regression Based on Scaling Reproducing Kernel for Black-Box System Identification
Found in: Intelligent Systems Design and Applications, International Conference on
By Hong Peng, Jun Wang
Issue Date:October 2006
pp. 212-216
A new least squares support vector regression model based on scaling reproducing kernel for black-box system identification is presented in this paper. The scaling reproducing kernel, which is a reproducing kernel in reproducing kernel Hilbert space (RKHS)...
 
Smoothing Support Vector Machines for e-Insensitive Regressi
Found in: Intelligent Systems Design and Applications, International Conference on
By Jinzhi Xiong, Tianming Hu, Jinlian Hu, Guangming Li, Hong Peng
Issue Date:October 2006
pp. 222-228
Researching smooth support vector machine (SVM) for regression is an active field in data mining. Recently, Lee et al. proposed the smooth SVM for e-insensitive regression, where smoothing functions play a vital role in smooth SVMs. This paper presents a c...
 
Research for a Dynamic Recurrent Fuzzy Wavelet Network
Found in: Intelligent Systems Design and Applications, International Conference on
By Zhigang Wang, Hong Peng, Jun Wang
Issue Date:October 2006
pp. 914-918
This paper proposes a dynamic recurrent fuzzy wavelet network (DRFWN) for identified nonlinear dynamic systems. Temporary relations are embedded in the network by adding feedback connections in the second layer of the fuzzy wavelet network. In addition, th...
 
Knowledge and Process Based Decision Support in Business Intelligence System
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Luan Ou, Hong Peng
Issue Date:June 2006
pp. 780-786
As a kind of data-driven decision support systems, business intelligence tools focus too much on data and have low efficiency of decision making. Companies in today are more process-oriented than in the past and process-driven decision support system is em...
 
 1  2 Next >>