Search For:

Displaying 1-50 out of 284 total
Discovering Aging-Genes by Topological Features in Drosophila melanogaster Protein-Protein Interaction Network
Found in: 2012 IEEE 12th International Conference on Data Mining Workshops
By Xin Song,Yuan-Chun Zhou,Kai Feng,Yan-Hui Li,Jian-Hui Li
Issue Date:December 2012
pp. 94-98
An important task of aging research is to find genes that regulate lifespan. Wet-lab identification of aging genes is tedious and labor-intensive activity. Developing an algorithm to predict aging genes will be greatly helpful. In this paper, we systematic...
Delay Performance of Load-Balanced Packet Switching under Different Traffic Patterns
Found in: Information Processing, Asia-Pacific Conference on
By Hui Li, Bing-rui Wang, Hui-yao An, Li Yu, Wei Wang, Jia-qing Huang
Issue Date:July 2009
pp. 402-406
A concentrator-based load balancing multi-path self routing switching fabric(LB-MPSR-C) was proposed recently,which was based on sorting concentrators, load-balanced and Birkhoff von-Neumann switching theory. This structure can achieve 100% throughput unde...
Efficient and Secure Authentication Protocol for VANET
Found in: Computational Intelligence and Security, International Conference on
By Hui Liu, Hui Li, Zhanxin Ma
Issue Date:December 2010
pp. 523-527
VANET is very important for improving traffic safety and efficiency. So the messages in VANET must be trustworthy and disseminated very fast. In this paper, an efficient and secure scheme is proposed for VANET messages authentication, group signature is us...
An Efficient Fast Authentication Protocol
Found in: Computational Intelligence and Security, International Conference on
By Hui Zhu, Hui Li, Yu-min Wang
Issue Date:December 2009
pp. 222-225
Based on symmetrical encryption and signature, an efficient authentication key agreement protocol was proposed in this paper. The security analysis of the proposed protocol in the implementation plan with the Canetti-Krawczyk model is presented. The result...
A Pratical Method for Anti-sampling Offset in Digtial Reciver
Found in: Information Processing, Asia-Pacific Conference on
By Hui Li, Min Zhang, Peng Deng, GongCao Su, XiaoHui Lin, Hui Wang
Issue Date:July 2009
pp. 136-138
In a digital communication system, in order to recover the transmitted signal, the data receiver samples the received signal periodically. But there exists sampling clock offset between the transmitter and the receiver, and the receiver is very sensitive t...
Application of Bi-cepstrum Analysis to Gear Fault Detection and Diagnosis
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Lihui Fu, Hui Li, Yaning Wang
Issue Date:April 2009
pp. 590-593
The bi-cepstrum technique is presented based on bi-spectrum and cepstrum analysis. This new method combines bi-spectrum technique with cepstrum analysis. Firstly, in order to eliminate the noise effects, the bi-spectrum is calculated. Then the bi-spectrum ...
Condition Monitoring for Bearing Using Envelope Spectrum of EEMD
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Shufeng Ai, Hui Li, Yuping Zhang
Issue Date:April 2009
pp. 190-193
In order to overcome the shortcomings of the traditional envelope analysis in which manually specifying a resonant frequency band is required, a novel approach based on the ensemble empirical mode decomposition (EEMD) and envelope spectrum is proposed for ...
Gear Fault Diagnosis Based on EMD and AR Spectrum Analysis
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Shufeng Ai, Hui Li, Lihui Fu
Issue Date:April 2009
pp. 673-676
A novel method to fault diagnosis of gear crack based on empirical mode decomposition (EMD) and autoregressive (AR) spectrum is presented. This method can carry out empirical mode decomposition and extract feature information of different machine parts in ...
A Context-Aware AmI System Based on MAS Model
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Yong Zhang, Yibin Hou, Zhangqin Huang, Hui Li, Rui Chen
Issue Date:December 2006
pp. 703-706
Ambient Intelligence (AmI) is an internationally emerging research field of IT domain. The conception of AmI and its features are discussed in this paper firstly, and we discuss an intelligent context-aware application in order to study the framework of Am...
The Design of Variable Frequency Power Based on IGBT
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Jie Li,Guang-Hui Li,Li-Juan Hou,Xiu-Li Zhang
Issue Date:November 2012
pp. 217-219
This paper introduces the design method of variable frequency power based on IGBT and SPWM inverter technology. The drive signal of IGBT is SPWM wave produced by MCU, and then a undistorted sine signal can be obtained through the low pass filter. LED digit...
A Timing Recovery Scheme Using an Adaptive Interpolator
Found in: Information Science and Engineering, International Conference on
By Li Li, Hui-li Fan, Ping Yang, Ding-shan Li
Issue Date:December 2009
pp. 469-471
A novel symbol timing recovery scheme using an adaptive interpolator is proposed in this paper. This scheme is based on interpolation filter and adaptive equalizer, with minimizing mean square error (MMSE) of output signal as its design rule, to guarantee ...
Application of Random-SMOTE on Imbalanced Data Mining
Found in: Business Intelligence and Financial Engineering, International Conference on
By Jia Li,Hui Li,Jun-Ling Yu
Issue Date:October 2011
pp. 130-133
The performance of many classifiers based on balanced data sets can't do well in imbalanced data sets. This article integrates the over-sampling method of Random-SMOTE (R-S), which is based on SMOTE method, in imbalanced data mining. We use the R-S method ...
Fault Detection and Diagnosis of Gear Wear Based on Teager-Huang Transform
Found in: Artificial Intelligence, International Joint Conference on
By Hui Li,Lihui Fu,Zhentao Li
Issue Date:April 2009
pp. 663-666
A new approach to fault diagnosis of gear wear based on Teager-Huang transform is presented. This method is based on Empirical Mode Decomposition (EMD) and Teager Kaiser Energy Operator (TKEO) technique. EMD can adaptively decompose the vibration signal in...
Accurate Prediction of Transition Energies in Organic Molecules
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Ting Gao, Hui Li, Dong-Bing Pu, Ying-Hua Lu, Hai-Bin Li, Hong-Zhi Li, Zhong-Min Su
Issue Date:August 2010
pp. 479-482
Least squares support vector machines (LSSVM) has been carried out in order to obtain a statistically meaningful analysis of the extended set of molecules. The combined HF with LSSVM correction approach (LSSVM/HF) has been applied to evaluate the transitio...
Improving the Accuracy of Low Level Density Functional Theory Calculation for Absorption Energies: The Least Squares Support Vector Machine
Found in: Intelligent Computation Technology and Automation, International Conference on
By Ting Gao, Dong-Bing Pu, Hui Li, Ying-Hua Lu, Hai-Bin Li, Hong-Zhi Li, Zhong-Min Su
Issue Date:May 2010
pp. 522-525
Least squares support vector machines (LS-SVM) was introduced to improve the calculation accuracy of low level density functional theory. As a demonstration, this combined low level quantum mechanical calculation with LS-SVM correction approach has been ap...
Resource Organization and Discovery in Mobile Grid: Model and Algorithm
Found in: Computer Modeling and Simulation, International Conference on
By Li Hui,Li Fang Yun,Li Layuan
Issue Date:January 2010
pp. 416-420
Resource organization and discovery is one of the important research field in grid computing, however, the present technology and approaches did not consider the mobility of grid resource. As to the complicity of the resource’s management in mobile grid, T...
Research on an Ant Colony ISODATA Algorithm for Clustering Analysis in Real Time Computer Simulation
Found in: Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on
By Ying Wang, Ren-Wang Li, Bin Li, Peng-Ju Zhang, Yao-Hui Li
Issue Date:December 2007
pp. 223-229
This paper intends to propose an advanced clustering method, ant colony ISODATA algorithm (ACIA) in real time computer simulation. Ant colony algorithm is used as the method of cursory clustering based on ants piling up their corpses and classifying their ...
Some Strong Limit Theorems for Hidden Markov Models Indexed by a Non-homogeneous Tree
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Shaohua Jin, Yongxue Wang, Huitao Liu, Ying Tian, Hui Li
Issue Date:April 2010
pp. 169-172
The strong limit theorems is one of the central questions for studying in the International Probability theory. In this paper, some strong limit theorems for hidden Markov models indexed by a non-homogeneous tree were obtained by constructing a martingale ...
Towards Video Management over Relational Database
Found in: Conference, International Asia-Pacific Web
By Hui Li, Xiao Zhang, Shan Wang, Xiaoyong Du
Issue Date:April 2010
pp. 453-458
Video has become popular in our daily life for both professional and consumer applications. Both low level video processing and high level semantic video analysis are critically computational tasks in application domains. Most of current video computing to...
Detection for Vehicle's Overlap Based on Support Vector Machine
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Hui Li, Zengfang Zhang, Wangming Chen
Issue Date:December 2009
pp. 410-412
In the paper, support vector machine is presented to detection for vehicle’ s overlap, which has stronger generalization ability than the algorithm based on the empirical risk, such as artificial neural network. In the process of detection for vehicle’ s o...
Intelligent Fuzzy Agent for Intelligent Inhabited Environments
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Hui Li, Qingfan Zhang, Peiyong Duan
Issue Date:August 2009
pp. 465-469
In intelligent inhabited environments(IIEs), the different user’s preferences and needs are different, and the same user’s preferences will change over time, which desire that the intelligent agents have evolvement function. In this paper, we propose a new...
Design of a New Web Database Security Model
Found in: Electronic Commerce and Security, International Symposium
By Zhu Yangqing, Yu Hui, Li Hua, Zeng Lianming
Issue Date:May 2009
pp. 292-295
This paper analyzed some shortcomings of old web database security and offered a new web database security model. Login module, audit module and program control modules were emphasized in the web database security model. Application of the web database sec...
Ajax Applied in Environment Monitoring System Based on WSN
Found in: Computer Science and Computational Technology, International Symposium on
By Wei Han, Kang-ling Fang, Xiao-hui Li, Liang Zhang
Issue Date:December 2008
pp. 608-611
This article puts forward a method to access the data and analyzed results from the monitoring system of environment based on WSN with the B/S mode. It resolves the problem of low speed of page refresh with Ajax. The experiment shows that the partial refre...
Gear Fault Monitoring Based on Order Tracking and Bi-spectrum under Running-Up Condition
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Hui Li
Issue Date:August 2007
pp. 379-383
This paper deals with the detection of gear crack faults in gearbox under non-stationary run-up of gear drives. In order to process the non-stationary vibration signals such as run-up or run-down vibration signals effectively, the order bi-spectrum techniq...
Data Hiding based Compression Mechanism for 3D Models
Found in: Data Compression Conference
By Hui Li, Parag Agarwal, Balakrishnan Prabhakaran
Issue Date:March 2007
pp. 391
Different compression methods [2] such as progressive meshes and single refinement mesh compression exist for mesh representation for 3D models and improving them is a challenge. This paper is a step in this direction, where we show that data hiding method...
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking
Found in: IEEE Transactions on Parallel and Distributed Systems
By Wenhai Sun,Bing Wang,Ning Cao,Ming Li,Wenjing Lou,Y. Thomas Hou,Hui Li
Issue Date:November 2014
pp. 3025-3035
With the growing popularity of cloud computing, huge amount of documents are outsourced to the cloud for reduced management cost and ease of access. Although encryption helps protecting user data confidentiality, it leaves the well-functioning yet practica...
Storing Shared Data on the Cloud via Security-Mediator
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Boyang Wang,Sherman S. M. Chow, Ming Li, Hui Li
Issue Date:July 2013
pp. 124-133
Nowadays, many organizations outsource data storage to the cloud such that a member (owner) of an organization can easily share data with other members (users). Due to the existence of security concerns in the cloud, both owners and users are suggested to ...
TCP Mobility Enhancement for Vertical Handovers
Found in: 2013 4th International Conference on Intelligent Systems, Modelling and Simulation (ISMS)
By Dagang Li,Hui Li
Issue Date:January 2013
pp. 433-438
TCP is not designed to be used in a wireless mobile environment. It lacks the capability to handle issues caused by handover, especially those between heterogeneous networks. In this paper a mobility enhancement is proposed for TCP to handle these mobility...
The Minimum System Design Based on DSP TMS320C6713
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Jian-Ming Hu,Jie Li,Guang-Hui Li
Issue Date:November 2012
pp. 193-195
This article describes the minimum based on TMS320C6713 DSP chip design, the system is mainly determined by the minimum hardware system board and peripheral interface circuit composed of two parts, the minimum hardware system board as the basis for develop...
Newton-Thiele Type Continued Fraction Defined on Trapezoidal Mesh in Image Inpainting
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Chunjing Li,Hui Li,Duanduan Ma
Issue Date:November 2012
pp. 288-292
Digital image in painting, which also called digital image reconstruction, namely, to repair lost data or damaged digital image local area according to the certain rule, to restore the image of integrity. The technology is an important research in many fie...
Automobile Anti-theft System Based on GSM and GPS Module
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Jian-Ming Hu,Jie Li,Guang-Hui Li
Issue Date:November 2012
pp. 199-201
In view of automobile anti-theft systems mostly used static real-time detection and alarm at present, in the paper we design an automobile anti-theft system based on GSM and GPS module. The system is developed based on the high speed mixed type single-chip...
An Algorithm of Image Reconstruction Based on Rational Interpolation with Rectangle-Hole Structure
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Chunjing Li,Duanduan Ma,Hui Li
Issue Date:November 2012
pp. 80-83
Digital image reconstruction is an important problem in Digital image application, the credibility of near damaged points is very important to image reconstruction. This paper presents a method for digital image reconstruction, which is built up by the num...
Design and Development of TTL-M-BUS Level Translator
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Yun-Tao Lei,Guang-Hui Li,Li-Qiang Wang
Issue Date:November 2012
pp. 182-184
BUS (meter bus) has been widely used in remote control system. The application is limited when communication with circuit composed of TTL device because of level differences. In the paper we research the issue of level switch and design functional circuit ...
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Boyang Wang,Baochun Li,Hui Li
Issue Date:June 2012
pp. 295-302
With cloud storage services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. However, public auditing for such shared data --- while preserving identity privacy --- remains to be an open challenge. In t...
Fine-grained Access Control and Revocation for Sharing Data on Clouds
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Shan-shan Tu,Shao-zhang Niu,Hui Li,Yun Xiao-ming,Meng-jiao Li
Issue Date:May 2012
pp. 2146-2155
With the current rapid increase of cloud computing, enterprises outsource their sensitive data for sharing in a cloud. The key problems of this approach include establishing access control for the encrypted data, and revoking the access rights from users w...
Vertical Profiles of Various Nitrogen Forms in Sediments of Dianchi Lake, China
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Ying Wang,Hui Li,Juhong Zhan,Sha Deng,Zhaoxin Li,Xuejun Pan
Issue Date:March 2012
pp. 831-835
Dianchi Lake is one of the three most seriously eutrophic lakes in China. In the present study, the nitrogen fractions and vertical profiles of various nitrogen forms in 11 sediment cores sampled in the Dianchi Lake were investigated. The results showed th...
Development and Application of Economic Evaluation Software for Seafloor Massive Sulfide Deposits
Found in: Digital Manufacturing and Automation, International Conference on
By Yan Li,Fangqi Xiao,Hui Li
Issue Date:August 2011
pp. 411-414
Seafloor massive sulfides have the potential to become a significant mineral resource because of ample contents of Au, Ag, Cu, Zn, and Pb. In this paper, economic evaluation software for seafloor massive sulfide deposits is developed. A project of seafloor...
Problems and Countermeasures for Disaster Reduction in China's Remote Rural Areas
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Ning Wang,Hongyu Huang,Yanzhang Wang,Hui Li,Liming Li
Issue Date:August 2011
pp. 78-81
In front of various disasters, the remote rural areas of China appear to be more vulnerable. Because of lacking sufficient attention, disaster reduction in these areas has become the short board of the disaster prevention and reduction system in china. The...
A service-oriented dynamic trust vector model for ad hoc networks
Found in: Software Maintenance and Reengineering, European Conference on
By Li Yu, Fei Xiong, Wei Cheng, Wei Wang, Hui Li
Issue Date:August 2011
pp. 620-624
In service oriented architecture, Quality of Service (QoS) is an important index for an interaction or a cooperation in network. Whereas, considering the particular properties of service, more attention needs to be paid to the transmission environment and ...
Finite Element Analysis of Acetabular Transverse Fracture Reconstruction Treated with Different Internal Fixation Methods
Found in: Optoelectronics and Image Processing, International Conference on
By Pei Baoqing, Mu Jiao, Li Hui, Li Deyu, Wang Yuhai
Issue Date:November 2010
pp. 557-560
This article established the pelvis models with aeolotropic material property, and made modeling and mechanical analysis of the acetabular transverse fracture models treated with different internal fixation methods. The mechanical indexes we interested in ...
Improved Techniques for Caches of Search Engines Results
Found in: Web Information Systems and Mining, International Conference on
By Hui Li, Cun-hua Li, Yun Hu, Shu Zhang, Xia Wang
Issue Date:October 2010
pp. 266-270
Result caching is an efficient technique for reducing the query processing load, hence it is commonly used in search engines. In this paper, we study query result caching and proposes a cache management policy for achieving higher hit ratios compared to tr...
Optimizing the Web Search Engines with Features and Caching
Found in: Web Information Systems and Mining, International Conference on
By Hui Li, Cun-hua Li, Shu Zhang, Yun Hu, Xia Wang
Issue Date:October 2010
pp. 193-197
Large web search engines have to answer thousands of queries per second with interactive response times under tight latency constraints. Query processing is a major cost factor in operating large web search engines. To keep up with this immense workload, a...
A robust timing and frequency synchronization algorithm for HF MIMO OFDM systems
Found in: Global Mobile Congress
By Fan Hui-li, Sun Jing-fang, Yang Ping, Li Ding-shan
Issue Date:October 2010
pp. 1-4
A time-frequency synchronization method using shift-orthogonal constant amplitude zero auto correlation (CAZAC) sequences constructing the synchronization preamble is designed for multiple-input multiple-output (MIMO) orthogonal frequency division multiple...
DRM system for multiple cascaded business operators
Found in: Multimedia and Expo, IEEE International Conference on
By Hui Li, Li Zhao, Changjie Wang, Fulong Ma
Issue Date:July 2010
pp. 1651-1654
DRM (Digital Rights Management) is a basic tool to protect digital content from unauthorized using, which is regarded as one of the most important mechanisms in content industry. In a basic scenario of DRM application, there are a couple of roles are invol...
Study of DEA Evaluation of Efficiency of Enterprise Knowledge Innovation Network
Found in: Electrical and Control Engineering, International Conference on
By Li Bai, Jing-xiao Zhang, Lan Luo, Hui Li
Issue Date:June 2010
pp. 4773-4778
At present, evaluating the efficiency of enterprise knowledge innovation network (EKIN) are not yet given the enough attention. Based on the existed results from experts, combined with social networking features. The paper performs evaluating efficiency of...
The Study of Human Resource Management Outsourcing from the View of Economic
Found in: International Conference on E-Business and E-Government
By Shufen Li,Hui Li
Issue Date:May 2010
pp. 1057-1060
The inevitability, advantages and risks of human resource management outsourcing are researched in the paper based on labor division theory, value chain theory, transaction cost theory and core competence theory from the view of economic. Three advices are...
Modeling and Simulation of Mini Autonomous Underwater Vehicles with Fins
Found in: Computer Modeling and Simulation, International Conference on
By Xiao Liang, Wei Li, Jianguo Lin, Linfang Su, Hui Li
Issue Date:January 2010
pp. 295-299
Because of small volume of the mini autonomous underwater vehicle, the ability to resist the wave and the current disturbance is not ideal enough. The present motion models ignore the effect of the external disturbance, and even ignore the fin effective an...
Model Identification for Autonomous Underwater Vehicles Based on Maximum Likelihood Relaxation Algorithm
Found in: Computer Modeling and Simulation, International Conference on
By Xiao Liang, Wei Li, Jianguo Lin, Linfang Su, Hui Li
Issue Date:January 2010
pp. 128-132
In order to obtain a precise mathematical model of an autonomous underwater vehicle (AUV), model identification based on maximum likelihood relaxation algorithm is proposed in this paper. With experiment data of zigzag motion, the hydrodynamic derivatives ...
Study of Protein Extraction Technics from Dictyoploca japonica Pupae
Found in: Environmental and Computer Science, International Conference on
By Yang Baoshan,Wang Hui,Li Jun,Qin Li
Issue Date:December 2009
pp. 57-61
In order to fully explore and comprehensive utilization the resource of Dictyoploca japonica, the pupa protein was extracted form pupa of Dictyoploca japonica by sodium hydroxide in this study. The pH of the solubility of protein had been determined. The b...
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks
Found in: Information Assurance and Security, International Symposium on
By Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang
Issue Date:August 2009
pp. 287-290
Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy p...
 1  2 Next >>