Search For:

Displaying 1-50 out of 250 total
Bertrand Game Model for the Port Logistics Alliance
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liang Jing, Lu Jing, Li Jing
Issue Date:November 2010
pp. 218-221
There has been a furious price competition among port logistics enterprises in order to secure the cargo zealously. Therefore, how to prevent destructive price competition from draining all of the profits as well as which strategy should be applied have be...
Preparation and Radical Scavenging Activity of Nano-Fuller-Serine
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jing Zhang,Yuan Li,Jing Li,Yadong Zhang,Junwei Duan
Issue Date:May 2012
pp. 417-420
The fuller-serine was synthesized and then dissolved in the organic solvent and then the nanoparticle aqueous suspension of fuller-serine was prepared. The nanoparticle sizes and Zeta-potentials were obtained by TEM and a Zeta-patential instrument, respect...
Monitoring the Oriental Migratory Locust Plague Based on the LAI Retrieved from Remotely Sensed Data
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Jian Chen, Jing-Jing Li
Issue Date:December 2008
pp. 312-315
The oriental migratory locust plagues has became a serious problem during the last two decades. Remote sensing techniques can greatly facilitate monitoring locust population dynamics over a large geographic scale. In this paper, a model is presented to est...
An Efficient Relational Decision Tree Classification Algorithm
Found in: International Conference on Natural Computation
By Jing-Feng Guo, Jing Li, Wei-Feng Bian
Issue Date:August 2007
pp. 530-534
We present a general approach to speeding up a family of multi-relational data mining algorithms that using ID propagation to obtain the information needed for building decision tree classifier from relational database. Preliminary results of our experimen...
The Influence of Air Distribution on the Single-Phase Flow Field of Central Fuel Rich Swirl Burner
Found in: Asia-Pacific Power and Energy Engineering Conference
By Yong Liu, Zhengqi Li, Jing Li, Zhiyong Hu, Zhichao Chen, Yan Zhang, Shanping Shen
Issue Date:March 2011
pp. 1-7
Implementation of JXTA-based P2P System Access from Web Service
Found in: Power Electronics and Design, Asia-Pacific Conference on
By Jing Mei Li, Nan Ding, Jing Li, Peng Fei Yang, Guo Fang Yang, Hai Yang Guan, Sheng Nan Jin, Chao Yu Wang, Jun Feng Wang
Issue Date:May 2010
pp. 23-26
An heterogeneous distributed system using middleware to finish the visit to each other between P2P and Web Service system is brought forward, and the safety and veracity of visit the service must be ensured. The blue print of middleware is to adding the fu...
Research Based on CAD/CAE/CFD for Collaborative Design of Automotive Engines
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Shuai, Yang Jing, Li Bin, Li Bo
Issue Date:January 2011
pp. 1044-1047
This paper describes the idea of collaborative design process based on CAD/CAE/CFD for automotive engines design with a design process of a 4V105 diesel engine as an example. To establish collaborative design environment, the entire design of automobile en...
Research on Lifetime Grey Prediction of Electronic Equipment Based on Improved Genetic Algorithm
Found in: Advanced Computer Control, International Conference on
By Jing Li, Xiao-dong Mu, Shuai Zheng, Jing Mao
Issue Date:January 2009
pp. 493-496
Grey theory has been applied widely in the field of prediction and decision, but model precision is influenced extremely by sequence smooth degree, boundary condition and background value. Genetic algorithm has well effect in searching for best result beca...
Digital Image Watermarking Algorithm Based on Wavelet Transform and the NMF
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Jing Li,Bo Fu,Li Li,Yingwei Huang,Bo Li
Issue Date:August 2011
pp. 27-30
A kind of combination of wavelet transform and NMF of digital watermarking algorithm is proposed in this paper. First the original image is transformed by wavelet transform twice. We embed the watermark into the intermediate frequency sub-image by NMF. Com...
Comparative Analysis of Modularity in Biological Systems
Found in: Bioinformatics, 2009 Ohio Collaborative Conference
By Xin Li, Sinan Erten, Gurkan Bebek, Mehmet Koyutürk, Jing Li
Issue Date:June 2009
pp. 104-109
In systems biology, comparative analysis of molecular interactions across diverse species indicates that conservation and divergence of networks can be used to understand functional evolution from a systems perspective. A key characteristic of these networ...
Supporting an interactive classroom environment in a cross-cultural course
Found in: Frontiers in Education, Annual
By R. Anderson, Jiangfeng Chen, Luo Jie, Jing Li, Ning Li,N. Linnell,V. Razmov,F. Videon
Issue Date:October 2007
pp. F3D-1-F3D-6
This paper describes a novel offering of a US- based course in Computer Science at a Chinese university. A senior-level Algorithms course from the University of Washington was offered at Beihang University in Beijing, China through Tutored Video Instructio...
Variable-latency adder (VL-adder): new arithmetic circuit design practice to overcome NBTI
Found in: Low Power Electronics and Design, International Symposium on
By Yiran Chen, Hai Li, Jing Li, Cheng-Kok Koh
Issue Date:August 2007
pp. 195-200
Negative bias temperature instability (NBTI) has become a dominant reliability concern for nanoscale PMOS transistors. In this paper, we propose variable-latency adder (VL-adder) technique for NBTI tolerance. By detecting the circuit failure on-the-fly, th...
e-Science Practice for Wild Birds' Monitoring and Protection in Qinghai Lake Region
Found in: eScience, IEEE International Conference on
By Luo Ze,Yan Baoping,Zhou Yuanchun,Li Jian,Tang Mingjie,Zhang Haiming,Shao Jing,Li Shasha,Lei Fumin,Cui Peng,Li Tianxian,Kou Zheng,Hou Yuansheng,He Yubang,Xing Zhi
Issue Date:December 2011
pp. 355-362
This paper introduces the cyber infrastructure and e-Science application practices for wild birds' monitoring and protection in Qinghai Lake region. We have been building a cyber infrastructure to support the protection and research in this area since 2006...
Multi-relay Cooperative Mechanism with Q-Learning in Cognitive Radio Multimedia Sensor Networks
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Jun Peng,Junbo Li,Shuo Li,Jing Li
Issue Date:November 2011
pp. 1624-1629
Multimedia data transmission requires strict QoS in Wireless Multimedia Sensor Networks. However, the limited frequency spectrum and serious interference between users is a challenge in communication system. In this paper, with the introduction of cognitiv...
The Discussion of Spur Gear Library System Based on UG/Open
Found in: Digital Manufacturing and Automation, International Conference on
By Tao Jiang,Liang-jing Li,Rui-li Zhou,Jin-guo Li
Issue Date:August 2011
pp. 1266-1269
UGNX second development technology is used to create the cyLindrical spur gear 3d parametric model. then menu and interface designed by UG/Open API, MenuScript menu and UIStyler dialog and control procedures, thus build intuitive gear database man-machine ...
Study on Blind Equalization Algorithm Based on SOS
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Ju-min Zhao, Deng-ao Li, Hua-kui Wang, Li-yi Zhang, Jing Li
Issue Date:August 2007
pp. 680-683
This paper proposed a new blind equalization algorithm based on Cyclostationarity. Firstly analyzed the received signal processed by fractional sample, and then presented the novel algorithm based on second order statisticsSOSand MMSE criterion. The advant...
Efficient notification of meeting points for moving groups via independent safe regions
Found in: 2013 IEEE International Conference on Data Engineering (ICDE 2013)
By Jing Li,Man Lung Yiu,Nikos Mamoulis
Issue Date:April 2013
pp. 422-433
In applications like social networking services and online games, multiple moving users form a group and wish to be continuously notified with the best meeting point from their locations. To reduce the communication frequency of the application server, a p...
Active Linked Data for Human Centric Semantic Web of Things
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Yu Chenzhou,Wei Jia Shen,Wen Sun,Gang Hu,Jing Li,Lin Huao Xu,Xin Zhi Sun,Yue Pan
Issue Date:November 2012
pp. 9-16
With the popularity of Internet of Things, the next logical step will focus on the application layer on top of network connectivity, especially Web of Things. While most of the existing efforts on Web of Things are focused on device mash up and data collec...
Feature selections using AdaBoost: Application in gene-gene interaction detection
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Amin Assareh,L. Gwenn Volkert,Jing Li
Issue Date:October 2012
pp. 831-837
One of the main goals of genome wide association studies (GWAS) has been detecting the gene-gene interactions, also known as epistasis in a broad sense, underlying complex diseases. The ability of decision trees and their ensembles to capture interactions ...
Prediction of Trans-regulators of Recombination Hotspots in Mouse Genome
Found in: Bioinformatics and Biomedicine, IEEE International Conference on
By Min Wu,Chee-Keong Kwoh,Teresa M. Przytycka,Jing Li,Jie Zheng
Issue Date:November 2011
pp. 57-62
The regulatory mechanism of recombination is a fundamental problem in genomics, with wide applications in genome wide association studies, birth-defect diseases, molecular evolution, cancer research, etc. In mammalian genomes, recombination events cluster ...
Detecting Navel Orange Canker with Hyperspectral Imaging
Found in: Intelligent Computation Technology and Automation, International Conference on
By Lu Zhang,Muhua Liu,Jing Li,Long Xue
Issue Date:March 2011
pp. 106-109
Detection of navel orange canker by hyper spectral imaging technique was proposed in this work. Navel orange was adopted as the experimental object. The hyper spectral images of navel oranges were collected between 400 nm and 1000 nm wavelength. Principal ...
Model based clustering approach for identifying structural variation using next generation sequencing data
Found in: 2011 IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences (ICCABS)
By Yoon Soo Pyon,Matthew Hayes, Jing Li
Issue Date:February 2011
pp. 153-158
Structural variation (SV) has been reported to be associated with numerous diseases such as cancer. With the advent of next generation sequencing (NGS) technologies, various types of SV can be potentially identified. We propose a model based clustering app...
Ownership Structure, Executive Compensation and Earnings Management - An Empirical Research on China's Listed Firms
Found in: International Conference on E-Business and E-Government
By Long Jing,Li Yanxi,Chen Kejing
Issue Date:May 2010
pp. 1198-1201
This paper empirically studies the impacts of various corporate governance mechanisms on earnings management of listed Chinese firms from 2006 to 2008. We use eight variables to quantify various corporate governance mechanisms including ownership structure...
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
Found in: Bioinformatics and Biomedicine, IEEE International Conference on
By Yoon Soo Pyon, Jing Li
Issue Date:November 2009
pp. 136-141
A comprehensive understanding of cancer progression may shed light on genetic and molecular mechanisms of oncogenesis, and it may provide much needed information for effective diagnosis, prognosis, and optimal therapy. However, despite considerable effort ...
A Service-Based Framework for Pharmacogenomics Data Integration
Found in: E-Business Engineering, IEEE International Conference on
By Kun Wang, Xiaoying Bai, Jing Li, Cong Ding
Issue Date:October 2009
pp. 95-102
Data are central to pharmacogenomics research and practices. However, due to the heterogeneous problems in data formats, structures and semantics, it is hard to integrate the diversified data that grow explosively and analyze them comprehensively. As more ...
Energy-Efficient Coverage Hole Self-Repair in Mobile Sensor Networks
Found in: New Trends in Information and Service Science, International Conference on
By Riheng Wu, Jun He, Tiffany Jing Li, Hongchi Shi
Issue Date:July 2009
pp. 1297-1302
With the advancement of MEMS techniques, mobile sensors with low cost and high capability are being deployed widely to carry out all kinds of complicated, risky tasks in large scale networks, especially in the areas are inaccessible to the human. Mobile se...
Visualization and Functional Analysis of Genome-Wide Association Results
Found in: Bioinformatics, 2009 Ohio Collaborative Conference
By Kanchana Narayanan, Jing Li
Issue Date:June 2009
pp. 9-13
Genome-wide association studies (GWAS) provide a new and powerful approach to investigate the effect of inherited genetic variation on risks of complex diseases. With recent advances in genotyping technology, genome-wide association studies are now becomin...
Research on Mobile Learning Platform with Device Adapting Ability Based on Agent
Found in: Computer Science and Software Engineering, International Conference on
By Jianhua Wang, Jing Li
Issue Date:December 2008
pp. 933-936
Mobile learning means learners can access learning resources at anywhere and anytime with mobile devices; Because these devices operate in different ways and have different capabilities, so some learning resources may not be in a format that different mobi...
Visualized Monitoring of Virtual Business Process for SOA
Found in: E-Business Engineering, IEEE International Conference on
By Tiejun Ou, Wei Sun, Changjie Guo, Jing Li
Issue Date:October 2008
pp. 767-770
Business user oritented business process monitoring plays a key role for enterprises to improve business processes' visibility and responsiveness. Usually an end-to-end business process is implemented by heterogenous technologies and their combinations in ...
A Hierarchical Micro-mobility Management Model with QoS Capability
Found in: Parallel Processing Workshops, International Conference on
By Jing Li, Srinivas Sampalli
Issue Date:August 2004
pp. 38-45
The design of micro-mobility management protocols stands out as an important challenge in integrating wireless networks into the IP-based Internet, especially when such networks are deployed for real-time multimedia applications. We present a new hierarchi...
Multipoint Pade approximation using a rational block Lanczos algorithm
Found in: Computer-Aided Design, International Conference on
By T.V. Nguyen, Jing Li
Issue Date:November 1997
pp. 72
This paper presents a general rational block Lanczos algorithm for computing multipoint matrix Pade approximation of linear multiport networks, which model many important circuits in digital, analog, or mixed signal designs. This algorithm generalizes a no...
A Symmetric Image Encryption Scheme Using Chaotic Baker Map and Lorenz System
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Chong Fu,Wen-Jing Li,Zhao-Yu Meng,Tao Wang,Pei-Xuan Li
Issue Date:December 2013
pp. 724-728
Chaos-based image encryption techniques have recently been extensively studied due to their superior properties in efficiency. However, many of the proposed schemes suffer from known/chosen plaintext attacks as the key stream used in diffusion stage is usu...
The Algorithm of Color Petri Nets Transform into the Place/ Transition Nets and Its Implementation
Found in: 2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science
By Wen-Jing Li,Wen Yang,Shuang Li,Wei-Zhi Liao
Issue Date:October 2012
pp. 461-465
With the aim of solving the problems of the Petri nets to the place/transition nets automatic conversion and realization of Petri nets parallel control and running, the algorithm is proposed to transform Color Petri net systems transform into P/T nets. The...
Trust-Based and QoS Demand Clustering Analysis Customizable Cloud Workflow Scheduling Strategies
Found in: 2012 IEEE International Conference on Cluster Computing Workshops and Posters (CLUSTER WORKSHOPS)
By Wenjuan Li,Qifei Zhang,Jiyi Wu,Jing Li,Haili Zhao
Issue Date:September 2012
pp. 111-119
Due to the restrictions that most traditional scheduling strategies only care about users' QoS time or cost requirements, lack the effective analysis of users' real service demand and cannot guarantee scheduling security, this paper added trust intoworkflo...
The Construction of County Public Expenditure Performance Evaluation System in China
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Mei Li,Jing Li,Ling Zhang
Issue Date:August 2012
pp. 601-604
Research on county public expenditure performance evaluation system, not only create conditions for more effective, results-oriented performance budgeting reform, but also provide direction of enhancing the capacity of public services for the grass-roots g...
Study on the third-party audit in cloud storage service
Found in: Cloud and Service Computing, International Conference on
By Ling Li,Lin Xu,Jing Li,Changchun Zhang
Issue Date:December 2011
pp. 220-227
Cloud computing, emerging as a new scheme, makes adjustment for the utilization of available resources by using certain service mode. As one of the wide application services in cloud computing, cloud storage provides data storage and business access extern...
FSM4WSR: A Formal Model for Verifiable Web Service Runtime
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Zhuqing Li,Dianfu Ma,Yongwang Zhao,Jing Li,Qing Yang
Issue Date:December 2011
pp. 86-93
Web service runtime is an important infrastructure middleware for service-based applications. It processes exchanged messages according to web service protocols. Correct implementation of web service protocols is critical for ensuring the reliability of we...
Quasi Real-Time Evaluation System for Seismic Disaster Based on Internet of Things
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Zhikui Chen,Zhenyu Li,Jing Li,Jianyun Chen,Yang Liu
Issue Date:October 2011
pp. 520-524
In recent years, disastrous earthquake assault the human frequently. The evaluation and estimate of the loss and damage in seismic disaster is an important factor for earthquake emergence and post-earthquake reconstruction decision-making. This paper synth...
Fully Homomorphic Encryption Scheme Extended to Large Message Space
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Han Jing-Li,Yang Ming,Wang Zhao-Li
Issue Date:October 2011
pp. 533-536
Gentry's fully homomorphic encryption scheme can only applied to single bit message, since the recrypt algorithm for full size message is relatively complicated. Based on Gentry's fully homomorphic encryption scheme, we provides a improvement and present a...
An Efficient Attribute Based Encryption Scheme with Revocation for Outsourced Data Sharing Control
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Yang Ming,Liu Fan,Han Jing-Li,Wang Zhao-Li
Issue Date:October 2011
pp. 516-520
Cipher text-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. However, when CP-ABE is used to control outsourced data sharing, it confronts two obstacles. Firstly, the data own...
PerHPC: Design and Implement Personal High Performance Computing Platform Using Cloud Computing Technology
Found in: ChinaGrid, Annual Conference
By Hu Song,Jing Li,Ling Li,Weiwei Wang,Hongjun Yin,Bai Zhang,Weiqing Liu,Rui Zhou
Issue Date:August 2011
pp. 28-34
High performance computing (HPC) is widely applied in the academia and business community. Users can share high-performance clusters through a specified interface. But this approach cannot supply users with their private HPC platform, leading to bad isolat...
A New Kind of Hybrid Cache Coherence Protocol for Multiprocessor with D-Cache
Found in: International Conference on Future Computer Science and Education
By Jingmei Li,Pengfei Yang,Nan Ding,Haiyang Guan,Jianpei Zhang,Chaoguang Men,Yanxia Wu,Jing Li,Chaoyu Wang
Issue Date:August 2011
pp. 641-645
This paper introduces a new kind of hybrid Cache coherence protocol-MECSIF, which applicants for multiprocessor environment, based on hybrid cache line write strategy. Through the introduction of a small dictionary-D-Cache in system architecture, protocol ...
Model Checking of Adaptive Programs with Mode-extended Linear Temporal Logic
Found in: Engineering of Autonomic and Autonomous Systems, IEEE International Workshop on
By Yongwang Zhao, Dianfu Ma, Jing Li, Zhuqing Li
Issue Date:April 2011
pp. 40-48
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environments. By high complexity, adaptive progr...
Geospatial Web Service for Remote Sensing Data Visualization
Found in: Advanced Information Networking and Applications, International Conference on
By Chunyang Hu, Yongwang Zhao, Jing Li, Dianfu Ma, Xuan Li
Issue Date:March 2011
pp. 594-601
The widely used geospatial web services technology has provided a new means for geospatial data interoperability. Web Map Service (WMS) is a standardized geospatial web service from the Open Geospatial Consortium (OGC). WMSs can be used for requesting and ...
Energy Saving and Influencing Factors Analysis for a New Kind Coal Slime Drying System
Found in: Digital Manufacturing and Automation, International Conference on
By Jinfeng Mao, Jing Li, Jintian Li, Huiliang Lian, Fusheng Peng
Issue Date:December 2010
pp. 644-647
This paper introduces a new type of drying slime technology ——solar drying slurry technology, And analysis the effect of drying coal slime from the nature of the slime, dry air, drying equipment, according to the theoretical analysis of the impact of the f...
Client/Server Framework-Based Passenger Line Ticket System Using 2-D Barcode on Mobile Phone
Found in: International Conference on E-Business and E-Government
By Dong Li,Yuhao Wang,Linli Hu,Jing Li,Xuezhao Guo,Jiance Lin,Jie Liu
Issue Date:May 2010
pp. 97-100
Passenger line flow in China is so huge that current ticketing systems cannot be viewed optimistic. After pointing out the disadvantages of existing telephone and web network ticketing systems and further comparing barcode, two-dimensional barcode and RFID...
Face Pose Estimate Technology and Its Application in Video Invigilation
Found in: Education Technology and Computer Science, International Workshop on
By Xiaoping Li, Jing Li, Luyang Liu, Jianqiang Xu
Issue Date:March 2010
pp. 102-105
This article mentioned an integral projection algorithm basing on narrowing region, and this algorithm can focus face characters from video picture sequence, so it supplies precision guarantee for face pose estimate. This article realized face pose estimat...
Study on Access Control Model of Service-Oriented Computing
Found in: Computer Science-Technology and Applications, International Forum on
By Zhang Yongsheng, Liu Guangyu, Li Jing, Li Chengcheng
Issue Date:December 2009
pp. 239-242
To protect the services against illegal accessing, misusing and tempering is the essential problem in service oriented computing paradigm. SOC relies on the SOA, which is a way of reorganizing software applications and infrastructure into a set of interact...
Multimodal Query Suggestion and Searching for Video Search
Found in: Database and Expert Systems Applications, International Workshop on
By Lvsong Li, Jing Li
Issue Date:September 2009
pp. 274-278
In this paper, we propose a multimodal query suggestion method for video search engine which can leverage multimodal processing to improve the quality of search results. When users type general or ambiguous textual queries, our system provides keyword sugg...
Image Retrieval Based on Manifold Learning and Incorporate Clustering
Found in: Intelligent Systems, WRI Global Congress on
By Jianzhu Cui, Fuqiang Liu, Zhipeng Li, Jing Li
Issue Date:May 2009
pp. 544-548
This paper presents a novel unsupervised learning framework named Image Retrieval Based on Manifold Learning and Incorporate Clustering. The dimensionality of image descriptors used in image retrieval applications is quite high. Given a query image, our al...
 1  2 Next >>