Search For:

Displaying 1-31 out of 31 total
Transfer Learning across Networks for Collective Classification
Found in: 2013 IEEE International Conference on Data Mining (ICDM)
By Meng Fang,Jie Yin,Xingquan Zhu
Issue Date:December 2013
pp. 161-170
This paper addresses the problem of transferring useful knowledge from a source network to predict node labels in a newly formed target network. While existing transfer learning research has primarily focused on vector-based data, in which the instances ar...
 
Using Social Media to Enhance Emergency Situation Awareness
Found in: IEEE Intelligent Systems
By Jie Yin,Andrew Lampert,Mark Cameron,Bella Robinson,Robert Power
Issue Date:November 2012
pp. 52-59
The described system uses natural language processing and data mining techniques to extract situation awareness information from Twitter messages generated during various disasters and crises.
 
Study on Algorithm for Soft Computing Coal-Fired Calorific Value of Utility Boiler
Found in: Intelligent System Design and Engineering Application, International Conference on
By Jusheng Ge,Peihong Wang,Jie Yin
Issue Date:January 2012
pp. 533-536
On-line monitoring coal-fired calorific value of utility boiler is the foundation of performance monitoring and optimization of power plant unit. Based on the thermal balance of utility boiler unit, a novel soft computing algorithm was proposed to on-line ...
 
Optimizing the Excess Air Ratio of Coal-Fired Boiler
Found in: Intelligent System Design and Engineering Application, International Conference on
By Yuanshu Zhang,Peihong Wang,Jie Yin
Issue Date:January 2012
pp. 426-429
This paper investigates on optimization problem of excess air ratio of coal-fired boiler by using the following three-step strategy. Firstly, the net efficiency of boiler (NEB) and the Cost of Boiler Heat Production (CBHP) are both taken as the objective f...
 
Provenance System for Livestock Supplied to Hong Kong Based on RFID Technology
Found in: Computational and Information Sciences, International Conference on
By Jie Yin,Zhi Nan Chen,Qing Lu,Jun Li,Yan Wu
Issue Date:October 2011
pp. 707-709
The export process of livestock supplied to Hong Kong includes breeding of livestock, supervision from government, inspection and transportation, customs clearance, slaughtering, cutting into pieces and then selling in the supermarket. In the whole process...
 
Tracking Mobile Users in Wireless Networks via Semi-Supervised Colocalization
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jeffrey Junfeng Pan,Sinno Jialin Pan,Jie Yin,Lionel M. Ni,Qiang Yang
Issue Date:March 2012
pp. 587-600
Recent years have witnessed the growing popularity of sensor and sensor-network technologies, supporting important practical applications. One of the fundamental issues is how to accurately locate a user with few labeled data in a wireless sensor network, ...
 
An Asynchronous Checkpoint-Based Redundant Multithreading Architecture
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Jie Yin, Jianhui Jiang
Issue Date:December 2010
pp. 243-244
Existing redundant multithreading (RMT) detects faults by comparing the result of each instruction between the master and slave threads, which can lead to huge comparison and communication overhead. To address this problem, the checkpoint-based RMT (like R...
 
The Research about Sensor-Less Anti-pinch System for Automotive Electric Window
Found in: Computational and Information Sciences, International Conference on
By Yunfeng Qiu, Jie Yin, Yi Wang, Qiao Liu
Issue Date:December 2010
pp. 808-811
In order to effectively reduce the hidden trouble of electric window on automobile, many cars now use the electric windows anti-pinch systems. It adds anti-pinch circuit based on the window control module. PIC18F258 micro controller samples and process the...
 
SMILE: A Similarity-Based Approach for Multiple Instance Learning
Found in: Data Mining, IEEE International Conference on
By Yanshan Xiao, Bo Liu, Longbing Cao, Jie Yin, Xindong Wu
Issue Date:December 2010
pp. 589-598
Multiple instance learning (MIL) is a generalization of supervised learning which attempts to learn useful information from bags of instances. In MIL, the true labels of the instances in positive bags are not always available for training. This leads to a ...
 
Exploiting Local Data Uncertainty to Boost Global Outlier Detection
Found in: Data Mining, IEEE International Conference on
By Bo Liu, Jie Yin, Yanshan Xiao, Longbing Cao, Philip S. Yu
Issue Date:December 2010
pp. 304-313
This paper presents a novel hybrid approach to outlier detection by incorporating local data uncertainty into the construction of a global classifier. To deal with local data uncertainty, we introduce a confidence value to each data example in the training...
 
A General Fuzzy Modeling Approach to Detection Decision Fusion
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Li Bicheng, Huang Jie, Yin Hujun
Issue Date:December 2009
pp. 495-501
A general fuzzy modeling approach to detection decision fusion is considered where local false and miss probabilities, priori probabilities, and cost functions are fuzzy numbers with trapezoidal memberships. A Bayesian approach is used to design the optimu...
 
Two Efficient Combination Rules for Conflicting Belief Functions
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Li Bicheng, Huang Jie, Yin Hujun
Issue Date:November 2009
pp. 421-426
According to the framework of Dempster-Shafer evidence theory, information fusion relies on the use of a combination rule allowing the belief functions for the different propositions to be combined. Dempster’s rule of combination is a basic rule of combina...
 
A Scheduling Method for Service Chain in Equipment Grid
Found in: Services, IEEE Congress on
By Yuexuan Wang, Jie Yin, Meizhi Hu
Issue Date:July 2009
pp. 38-45
Equipment grid aims to facilitate easy access to expensive scientific instruments by grid services and consists of the following three components: service pool alliance, service pool, and geographically distributed physical instruments. When users submit e...
 
Clustering Distributed Time Series in Sensor Networks
Found in: Data Mining, IEEE International Conference on
By Jie Yin, Mohamed Medhat Gaber
Issue Date:December 2008
pp. 678-687
Event detection is a critical task in sensor networks, especially for environmental monitoring applications. Traditional solutions to event detection are based on analyzing one-shot data points, which might incur a high false alarm rate because sensor data...
 
A New Method for Test Suite Reduction
Found in: Young Computer Scientists, International Conference for
By Rui Zhang, Jianhui Jiang, Jie Yin, Ang Jin, Jungang Lou, Ying Wu
Issue Date:November 2008
pp. 1211-1216
Test suite reduction is to find a subset of the test suite containing a minimal number of test cases that can satisfy all test requirements. Test suite reduction techniques attempt to remove redundant test cases. Existed minimal set selection methods canno...
 
Predictive Admission Control Algorithm for Advance Reservation in Equipment Grid
Found in: Services Computing, IEEE International Conference on
By Jie Yin, Yuexuan Wang, Meizhi Hu, Cheng Wu
Issue Date:July 2008
pp. 49-56
Experiments submitted to equipment grid have quality of service (QoS) requirements, and advance reservation is used to satisfy such requirements. Due to the dynamic behaviors and fluctuations of resources in equipment grid, some previously accepted advance...
 
Learning Adaptive Temporal Radio Maps for Signal-Strength-Based Location Estimation
Found in: IEEE Transactions on Mobile Computing
By Jie Yin, Qiang Yang, Lionel M. Ni
Issue Date:July 2008
pp. 869-883
In wireless networks, a client's locations can be estimated using the signals received from various signal transmitters. Static fingerprint-based techniques are commonly used for location estimation, in which a radio map is built by calibrating signal-stre...
 
Sensor-Based Abnormal Human-Activity Detection
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
Issue Date:August 2008
pp. 1082-1090
With the availability of affordable sensors and sensor networks, sensor-based human activity recognition has attracted much attention in artificial intelligence and ubiquitous computing. In this paper, we present a novel two-phase approach for detecting ab...
 
Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Jie Yin, Junwei Cao, Yuexuan Wang, Lianchen Liu, Cheng Wu
Issue Date:May 2007
pp. 426-436
While a grid represents a computing infrastructure for cross domain sharing of computational resources, the cyberinfrastructure, proposed by the US NSF Blue - Ribbon advisory panel, is expected to revolutionizing science and engineering by including more c...
 
Extracting Actionable Knowledge from Decision Trees
Found in: IEEE Transactions on Knowledge and Data Engineering
By Qiang Yang, Jie Yin, Charles Ling, Rong Pan
Issue Date:January 2007
pp. 43-56
Most data mining algorithms and tools stop at discovered customer models, producing distribution information on customer profiles. Such techniques, when applied to industrial problems such as customer relationship management (CRM), are useful in pointing o...
 
Power-Efficient Access-Point Selection for Indoor Location Estimation
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yiqiang Chen, Qiang Yang, Jie Yin, Xiaoyong Chai
Issue Date:July 2006
pp. 877-888
An important goal of indoor location estimation systems is to increase the estimation accuracy while reducing the power consumption. In this paper, we present a novel algorithm known as CaDet for power-efficient location estimation by intelligently selecti...
 
Integrating Hidden Markov Models and Spectral Analysis for Sensory Time Series Clustering
Found in: Data Mining, IEEE International Conference on
By Jie Yin, Qiang Yang
Issue Date:November 2005
pp. 506-513
We present a novel approach for clustering sequences of multi-dimensional trajectory data obtained from a sensor network. The sensory time-series data present new challenges to data mining, including uneven sequence lengths, multi-dimensionality and high l...
 
Adaptive Temporal Radio Maps for Indoor Location Estimation
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Jie Yin, Qiang Yang, Lionel Ni
Issue Date:March 2005
pp. 85-94
In this paper, we present a novel method to adapt the temporal radio maps for indoor location estimation by off-setting the variational environmental factors using data mining techniques and reference points. Environmental variations, which cause the signa...
 
Postprocessing Decision Trees to Extract Actionable Knowledge
Found in: Data Mining, IEEE International Conference on
By Qiang Yang, Jie Yin, Charles X. Ling, Tielin Chen
Issue Date:November 2003
pp. 685
Most data mining algorithms and tools stop at discovered customer models, producing distribution information on customer profiles. Such techniques, when applied to industrial problems such as customer relationship management (CRM), are useful in pointing o...
 
Classifying microblogs for disasters
Found in: Proceedings of the 18th Australasian Document Computing Symposium (ADCS '13)
By Cecile Paris, Jie Yin, Sarvnaz Karimi
Issue Date:December 2013
pp. 26-33
Monitoring social media in critical disaster situations can potentially assist emergency and media personnel to deal with events as they unfold, and focus their resources where they are most needed. We address the issue of filtering massive amounts of Twit...
     
Active exploration: simultaneous sampling and labeling for large graphs
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Meng Fang, Jie Yin, Xingquan Zhu
Issue Date:October 2013
pp. 829-834
Modern information networks, such as social networks, are often characterized with large sizes and dynamic changing structures. To analyze these networks, existing solutions commonly rely on graph sampling techniques to reduce network sizes, and then carry...
     
ESA: emergency situation awareness via microbloggers
Found in: Proceedings of the 21st ACM international conference on Information and knowledge management (CIKM '12)
By Bella Robinson, Jie Yin, Mark Cameron, Sarvnaz Karimi
Issue Date:October 2012
pp. 2701-2703
During a disastrous event, such as an earthquake or river flooding, information on what happened, who was affected and how, where help is needed, and how to aid people who were affected, is crucial. While communication is important in such times of crisis,...
     
Activity recognition via user-trace segmentation
Found in: ACM Transactions on Sensor Networks (TOSN)
By Dou Shen, Jie Yin, Qiang Yang, Ze-Nian Li
Issue Date:August 2008
pp. 1-34
A major issue of activity recognition in sensor networks is automatically recognizing a user's high-level goals accurately from low-level sensor data. Traditionally, solutions to this problem involve the use of a location-based sensor model that predicts t...
     
Query enrichment for web-query classification
Found in: ACM Transactions on Information Systems (TOIS)
By Dou Shen, Jeffrey Junfeng Pan, Jian-Tao Sun, Jie Yin, Kangheng Wu, Qiang Yang, Rong Pan
Issue Date:July 2006
pp. 320-352
Web-search queries are typically short and ambiguous. To classify these queries into certain target categories is a difficult but important problem. In this article, we present a new technique called query enrichment, which takes a short query and maps it ...
     
Operating Rules Classification System of Water Supply Reservoir Based on LCS
Found in: International Workshop on Knowledge Discovery and Data Mining
By Xiao-lin Wang, Zheng-jie Yin
Issue Date:January 2008
pp. 100-107
Genetic algorithm-based learning classifier system (LCS) is a massively parallel, message-passing and rule-based machine learning system. But its potential self-adaptive learning capability has not been paid enough attention in reservoir operation research...
 
Artificial Immune Recognition System as a New Classifier for Reservoir Operating Rules Extraction
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Xiao-lin Wang, Zheng-jie Yin
Issue Date:November 2007
pp. 149-153
In this paper artificial immune recognition system (AIRS) is employed as an emerging technique of data mining to extract the water reservoir operating rules with a case of water supply reservoir, and aiming to explore the impact of learning performances of...
 
 1