Search For:

Displaying 1-12 out of 12 total
Engine Condition Monitoring Based on Grey AR Combination Model
Found in: Challenges in Environmental Science and Computer Engineering
By Qiang Wang, Sheng Hui Dai
Issue Date:March 2010
pp. 215-218
Aiming at the problems of the wear condition monitoring, grey theory and auto-regressive combination forecasting model was put forward, and the combination model was build. The rough trend of the wear particle content change can be reflected through grey t...
 
The Clustering Algorithm of Wireless Sensor Networks Based on Multi-hop between Clusters
Found in: Computer Science and Information Engineering, World Congress on
By Guitang Wang, Honglei Zhu, Hui Dai, Liming Wu, Banghong Xiong
Issue Date:April 2009
pp. 177-181
By the reason of the node energy in wireless sensor networks is limited, energy-efficient routing algorithm must be designed to prolong the network lifetime. The paper proposes one new algorithm (MH-LEACH) based on classical Low Energy Adaptive Clustering ...
 
Interconnect Delay and Power Optimization by Module Duplication for Integration of High Level Synthesis and Floorplan
Found in: VLSI, IEEE Computer Society Annual Symposium on
By Zhipeng Liu, Jinian Bian, Qiang Zhou, Hui Dai
Issue Date:March 2007
pp. 279-284
This article proposes an efficient algorithm by module duplication for integration of high-level synthesis and floorplan to optimize the interconnect delay and power. Module duplication can bring down the interconnect wire length among physical modules, th...
 
Unifying Micro Sensor Networks with the Internet via Overlay Networking
Found in: Local Computer Networks, Annual IEEE Conference on
By Hui Dai, Richard Han
Issue Date:November 2004
pp. 571-572
No summary available.
   
PKI-Based E-Business Security System
Found in: Innovative Computing ,Information and Control, International Conference on
By Hua-Qing Zhou, Sheng-Hui Dai
Issue Date:June 2008
pp. 203
When e-business changing people's business model, security has also become the focus the people attended increasingly. PKI (Public Key Infrastructure) is the key technology to ensure the network security. In this paper, the composition of the PKI and archi...
 
Model and Application of Web-Based Intelligent Tutoring System
Found in: Innovative Computing ,Information and Control, International Conference on
By Gang-Yong Lin, Sheng-Hui Dai, Zhao-You Zhu
Issue Date:June 2008
pp. 208
Intelligent Tutoring System (ITS) is one of the important fields of the current computer application. In this paper a Web-based intelligent tutoring system model is designed, the system function structure, the construction of the student model and teaching...
 
Synchronization Model Design and Implementation of Distributed Multimedia System
Found in: Innovative Computing ,Information and Control, International Conference on
By Sheng-Hui Dai, Zhao-You Zhu, Gang-Yong Lin
Issue Date:June 2008
pp. 209
Multimedia computing has become an important study area in recent years. Multimedia synchronization mechanism is a key issue of the distributed multimedia system. The research of multimedia synchronization technology will greatly promote the popularity and...
 
ELF: an efficient log-structured flash file system for micro sensor nodes
Found in: Proceedings of the 2nd international conference on Embedded networked sensor systems (SenSys '04)
By Hui Dai, Michael Neufeld, Richard Han
Issue Date:November 2004
pp. 176-187
An efficient and reliable file storage system is important to micro sensor nodes so that data can be logged for later asynchronous delivery across a multi-hop wireless sensor network. Designing and implementing such a file system for a sensor node faces va...
     
Sensor-enhanced mobile web clients: an XForms approach
Found in: Proceedings of the twelfth international conference on World Wide Web (WWW '03)
By Fahd Al-bin-ali, Hui Dai, John Barton, Nissanka B. Priyantha, Tim Kindberg
Issue Date:May 2003
pp. 80-89
This paper describes methods for service selection and service access for mobile, sensor-enhanced web clients such as wireless cameras or wireless PDAs with sensor devices attached. The clients announce their data-creating capabilities in "Produce" headers...
     
Optimized Scalable Hardware Architecture for Modular Addition and Subtraction in Dual-Field
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Qin Fan, Yang Xiao-hui, Dai Zi-bin
Issue Date:May 2009
pp. 650-653
Modular addition and subtraction are applied in every Public Key Cryptography (PKC), such as RSA and ECC. But they are time consuming operations with delay of long carry and borrow propagations when the operands are great numbers. An optimized scalable and...
 
Evaluation on Safety Performance of Air Traffic Management Based on Fuzzy Theory
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Run-tu Nie, Yong Zhao, Jie-hui Dai
Issue Date:April 2009
pp. 554-557
The safety of Air Traffic Management is basic goal during researching, planning and allocating Air Traffic Management system. It is significant to evaluate the safety performance of Air Traffic Management. Expert evaluation is the traditional method for sa...
 
Semantic Computing in Scalable Text-to-Speech System
Found in: Semantic Computing and Systems, IEEE International Workshop on
By Zhang Wei, Pang Min-hui, Dai Li-rong
Issue Date:July 2008
pp. 113-118
Because of diversity of hardware environments, building scalable text-to-speech system is an important issue of Corpus-based text-to-speech system. This paper proposes and analyses three semantic computing problems of building scalable text to speech syste...
 
 1