Search For:

Displaying 1-16 out of 16 total
Study of Balanced Stability on the Hybrid Magnetic Levitation Ball System
Found in: Electrical and Control Engineering, International Conference on
By Jiang Dong, Yang Jia-xiang, Jiang Di, Ma Ling-ling
Issue Date:June 2010
pp. 2009-2012
The balanced stability of magnetic levitation ball directly influences its applied effect. It is needed to study the balanced stability of magnetic levitation ball. The magnetic levitation ball system model has been built in this paper, the systematic dyna...
 
Tunnel-Based IPv6 Transition
Found in: IEEE Internet Computing
By Yong Cui,Jiang Dong,Peng Wu,Jianping Wu,Chris Metz,Yiu L. Lee,Alain Durand
Issue Date:March 2013
pp. 62-68
IPv6 transition presents many challenges to the Internet community, and various solutions have been proposed, including dual stack, tunneling, and translation. Tunneling supports "like-to-like" IP connectivity across an "unlike" network...
 
Design of Fault Diagnosis Instrument for Speed Control System Based on Virtual Instrument
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Di Chang-an, Jiang Dong-dong, Kong De-ren
Issue Date:October 2010
pp. 337-340
The operating status of the Electronic Speed Controller and the engine of the cannon needed to be evaluated and checked in ordinary maintenance, examination and repair. A useful fault diagnosis system for Electronic Speed Controller was designed by LabVIEW...
 
The Research of Intrusion Detection Model Based on Clustering Analysis
Found in: Computer and Communications Security, International Conference on
By Li Bo, Jiang Dong-Dong
Issue Date:December 2009
pp. 24-27
Through the research and analysis of the intrusion detection techniques and data mining, this paper presents a intrusion detection model which is based on cluster analysis K-means algorithm.
 
A Compression Framework for Personal Image Used in Mobile RFID System
Found in: Young Computer Scientists, International Conference for
By Wei Jiang, Dong Xiang
Issue Date:November 2008
pp. 769-774
Radio Frequency Identification (RFID), a novel automatic identification technology, has been widely used in modern society. To improve the security of RFID card, a novel idea of inserting personal image to the card and restoring it rapidly on the mobile de...
 
Utilize Signal Traces from Others? A Crowdsourcing Perspective of Energy Saving in Cellular Data Communication
Found in: IEEE Transactions on Mobile Computing
By Zhonghong Ou,Shichao Dong,Jiang Dong,Antti Yla-Jaaski,Pan Hui,Ren Wang,Alexander Min,Jun Wu
Issue Date:April 2014
pp. 1
With the tremendous growth in wireless network deployment and increasing use of mobile devices, e.g., smartphones and tablets, improving energy efficiency in such devices, especially with communication driven workloads, is critical to providing a satisfact...
 
A Research on BIT Single-Fault Threshold Value Setting Approach Based on ROC
Found in: Communications and Intelligence Information Security, International Conference on
By Xiaojie Zhang, Daozhen Wang, Tongmin Jiang, Dong Wang, Xiaofeng Wang
Issue Date:October 2010
pp. 36-39
In order to solve the problem that setting the double threshold value hypothesis question under the single breakdown in the BIT, to decrease BIT's false alarm rate, and improve BIT’s testability. Researches were done on the subject’s quota relations betwee...
 
The Correlation Analysis of S and T Policy and Innovation of Hi-tech Enterprises
Found in: Intelligent Computation Technology and Automation, International Conference on
By Jiang Dong, Li Ting, Duan Huifang, Zhang Zhiwei, Li Zhixiang
Issue Date:May 2010
pp. 743-746
S&T policy is an important force to promote innovation and development of high-tech enterprises and an important support to enhance the power and vitality of high-tech enterprises. In this paper, the existing S&T policies will be hackled and those ...
 
Methane Recovery and Energy Generation in Spent Wash Wastewater Treatment
Found in: Environmental Science and Information Application Technology, International Conference on
By Wei-hua Yang, Li Wei, Sheng-nan Zhao, Jiang Dong
Issue Date:July 2009
pp. 304-307
The wastewater from distillation process has high organic content, which has to be treated to bring down the levels of COD and BOD to prescribed standards of environmental authorities. In this study, the organic wastewater from distillery also known as spe...
 
System Model for the Large Sale Petrochemical Complex
Found in: Information and Computing Science, International Conference on
By Yong Jiang, Dong-mei Yang, Yu Dai, Dan-dan Wang, Ning Lin
Issue Date:May 2009
pp. 7-10
The article take the computer as the auxiliary means, the use linear plan theory to the large-scale petroleum chemical industry combination unit system establishment mathematical simulation model, simulates the entire wrap petroleum chemical industry insta...
 
Research of Security Analysis of ARBAC Policy Based on Intelligence Planning
Found in: Computational Intelligence and Security, International Conference on
By Qiang Liu, Yun-Fei Jiang, Dong-Ning Rao, Xin-Du Chen
Issue Date:December 2008
pp. 257-262
Aimed at those access control system which support role hierarchy and static mutual exclusion roles (SMER), an intelligent method from intelligent planning, named Graphplan,
 
A Wavelet Based Algorithm for Multi-Focus Micro-Image Fusion
Found in: Image and Graphics, International Conference on
By Zhi-guo Jiang, Dong-bing Han, Jin Chen, Xiao-kuan Zhou
Issue Date:December 2004
pp. 176-179
In this paper, extending depth of focus from microscopy images is investigated by using multi-focus image fusion techniques. The principle of image fusion based on depth of focus is analyzed, and comparisons of different spatial domain fusion methods are g...
 
Embedding UML and Type Theory to Formalize the Process of Requirement Engineering
Found in: Technology of Object-Oriented Languages, International Conference on
By Hui Jiang, Dong Lin, Xiren Xie
Issue Date:November 2000
pp. 32
Nowadays, the main reason for failures of large-scale systems development is that the requirement analysis stage could not produce complete, understandable, unambiguous, traceable and testable system requirements documents. To conquer this problem, from th...
 
Agent Class Methodology: A New Kind of Autonomous Object Generation Methodology
Found in: Technology of Object-Oriented Languages, International Conference on
By Hui Jiang, Dong Lin, Xiren Xie
Issue Date:September 1999
pp. 245
In this paper, we present a class-based object-oriented programming methodology - the Agent Class Methodology (ACM), a new kind of autonomous object generation methodology. The ACM specifies how to construct general-purpose agents that can be used to const...
 
Characterize energy impact of concurrent network-intensive applications on mobile platforms
Found in: Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture (MobiArch '13)
By Antti Ylä-Jääski, Jiang Dong, Jukka K. Nurminen, Ren Wang, Shichao Dong, Zhonghong Ou
Issue Date:October 2013
pp. 23-28
The cellular network bandwidth increases significantly in the past few years, stimulated by many popular network-intensive applications, such as video streaming and cloud storage usages. Meanwhile, more and more users enjoy the multitasking feature of mobi...
     
Fuzzy Discrete Particle Swarm Optimization for Solving Traveling Salesman Problem
Found in: Computer and Information Technology, International Conference on
By Wei Pang, Kang-ping Wang, Chun-guang Zhou, Long-jiang Dong
Issue Date:September 2004
pp. 796-800
Particle Swarm Optimization, as a novel evolutionary computing technique, has succeeded in many continuous problems, but research on discrete problems especially combinatorial optimization problem has been done little [4,5]. In this paper, a modified Parti...
 
 1