Search For:

Displaying 1-47 out of 47 total
Design of Fuzzy Controller with Self-Regulation Factor and Integral Aspect of Self-Adjusting Link
Found in: Networking and Digital Society, International Conference on
By Tie-jun Dong, Jun-da Hu, Wen bin Zou
Issue Date:May 2009
pp. 100-102
The paper presents a fuzzy control method with self-regulation factors and integral parameter self-tuning link for the problem of poor dynamic accuracy existed in traditional fuzzy control. This method adds optimization of adjustment factors and a self-ada...
Experiences-Based Intelligence Simulation in ECG Recognition
Found in: Computational Intelligence for Modelling, Control and Automation, International Conference on
By Jun Dong, Jia-wei Zhang
Issue Date:December 2008
pp. 796-801
The intelligence of human being includes three aspects, i.e. mathematics computing, logic computing and imagery thinking. There exists extraordinary unequal understanding between abstract thinking and imagery thinking while too less result on imagery think...
The Creation Process of Chinese Calligraphy and Emulation of Imagery Thinking
Found in: IEEE Intelligent Systems
By Jun Dong, Miao Xu, Xian-jun Zhang, Yan-qing Gao, Yun-he Pan
Issue Date:November 2008
pp. 56-62
Chinese calligraphy is both an art form and the embodiment of imagery thinking. The process of calligraphy involves studying tablets or documents, remembering the contents, and creating new artwork with calligraphic images from memory. All these steps are ...
A Digital Watermarking Algorithm Based on Image Segmentation and DFT
Found in: Information Science and Engineering, International Conference on
By Xiao Jun Kang, Li Jun Dong, Yun Wang
Issue Date:December 2009
pp. 1511-1514
This paper presents a watermarking algorithm based on image segmentation, in order to improve the security of the watermark, take the DFT algorithm to deal with the watermark process, also analyze the robustness of the algorithm we taken though the experim...
Chinese Cardiovascular Disease Database (CCDD) and Its Management Tool
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Jia-wei Zhang, Li-ping Wang, Xia Liu, Hong-hai Zhu, Jun Dong
Issue Date:June 2010
pp. 66-72
Standard Electrocardiogram (ECG) database is prepared for testing the performance of automatic detection and classification algorithms. At present, there are three mainstream standard databases used by computer-aided ECG diagnosis researchers: MIT-BIH arrh...
A Remote Diagnosis Service Platform for Wearable ECG Monitors
Found in: IEEE Intelligent Systems
By Jun Dong,Jia-wei Zhang,Hong-hai Zhu,Li-ping Wang,Xia Liu,Zhen-jiang Li
Issue Date:November 2012
pp. 36-43
To provide real-time monitoring of cardiovascular patients' electrocardiogram data, the authors evaluate existing ECG monitors and diagnosis systems, and present a patient-location-independent and continuous ECG monitoring and diagnosis system.
A New Hybrid HS-DY Conjugate Gradient Method
Found in: Computational Sciences and Optimization, International Joint Conference on
By Junli Dong, Baocong Jiao, Lanping Chen
Issue Date:April 2011
pp. 94-98
Conjugate gradient method is one of the most useful methods for solving unconstrained optimization problem. In this paper, we propose a hybrid conjugate gradient method for unconstrained optimization based on the Hestenes-Stiefel and Dai-Yuan conjugate gra...
Flying Control System Architecture of Informationization for Pervasive Computing
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Lin Jinyong, Zhang Jun, Dong Wenjie, Gao Xiaoying, Qi Chuntang
Issue Date:September 2010
pp. 348-351
The paper involves one kind of mobile autonomous running system for pervasive computing. The developing requirements about aircraft flying control system of informationization were firstly analyzed, then the architecture on aircraft flying control system o...
Design of Simulation Software for Mission Change Real-Time Control Based on Pervasive Computing
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Zhang Jun, Dong Wenjie, Zhang Chunxia, Zhou Chunmei, Lin Jinyong, Li Shuangxi
Issue Date:September 2010
pp. 432-435
In pervasive computing, the computer is no longer a single computing device, but an information device with the embedded processor, memory, communication module and various sensors together. Combining with the pervasive computing and flight maneuvering cha...
A New Hybrid PRP-DY Conjugate Gradient Method
Found in: Computational Sciences and Optimization, International Joint Conference on
By Junli Dong, Baocong Jiao
Issue Date:May 2010
pp. 70-74
Conjugate gradient method is one of the most useful methods for solving unconstrained optimization problem. In this paper, we propose a hybrid conjugate gradient method for unconstrained optimization based on the Polak-Ribiere-Polyak and Dai-Yuan conjugate...
A Novel Visual Programming Method Designed for Error Rate Reduction
Found in: Computer Science and Computational Technology, International Symposium on
By Shen Xiajiong, Wang Ge, Gu Jun, Dong Xinfa
Issue Date:December 2008
pp. 280-283
Utilize the programming environment at present, it’s effortless for us to design intuitionistic visual program. It only implements the visualization of programming ending. The process of programming is not fully visualization and it’s not visual programmin...
Coordination Research on Key Parameters in Generation Competition Based on Dynamic Simulation
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Lin Xiao, Jun Dong, Jing Zhang
Issue Date:November 2008
pp. 269-274
Power generation adequacy is critical for the reliability of electricity supply service, and therefore its investment draws much attention. This paper builds a dynamic simulation model to solve the setting of two key parameters, the energy price cap and th...
Composite Evaluation of Replacing Small Generation Units with Large Ones in the Electricity Sector in China
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Jun Dong, Jing Zhang
Issue Date:November 2008
pp. 195-201
This paper applies two methods to evaluate the economic effects of the policy of
Externality Identification and Quantification of Transmission Construction Projects
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Jun Dong, Jing Zhang
Issue Date:November 2008
pp. 120-125
This paper provides the evaluation method and model of the externality of the transmission projects, and identifies both negative and positive externalities, as well as makes quantitative and qualitative analysis of externality. In order to quantify the im...
Decomposition of Energy and CO2 Emission of China between 1980 and 2005
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Xiaoli Liu, Yongxiu He, Jun Dong
Issue Date:November 2008
pp. 275-280
In 2005, China’s energy consumption amounted to 2233 million tons coal equivalent (MtCE), and the CO2 emission was 5322.69 million tons, making China the world’s second largest consumer of energy products and source of CO2 emissions behind only the United ...
An Image Steganographic Scheme Based on Support Vector Regression
Found in: Intelligent Systems Design and Applications, International Conference on
By Hsien-Chu Wu, Kuo-Ching Liu, Jun-Dong Chang, Ching-Hui Huang
Issue Date:November 2008
pp. 519-524
This paper presents a novel image steganographic method that utilizes support vector regression (SVR) to predict the embedded pixel value such that secret data is also embedded into the pixel-value difference between the predicted pixel value and the origi...
Understanding BitTorrent Download Performance
Found in: International Conference on Networking
By Dongliang Guan, Jiangtao Wang, Yue Zhang, Jun Dong
Issue Date:April 2008
pp. 330-335
We conducted in this paper an experimental study on BitTorrent (BT) download performance. Although BT has been widely deployed, many important features about it are not clear yet. For example, what parameter configuration is Optimal for its download perfor...
Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Meng-Hsiun Tsai, Fang-Yu Hsu, Jun-Dong Chang, Hsien-Chu Wu
Issue Date:November 2007
pp. 493-496
This paper presents a digital watermarking technology for guaranteeing the database integrity. The proposed scheme based on the fragile watermarking technique, exploits trained support vector regression (SVR) predicting function to distribute the digital w...
Development of Bio Signal Measurement System for Vehicles
Found in: Convergence Information Technology, International Conference on
By In cheol Jeong,Suk hwan Jun,Dong hee Lee,Hyung ro Yoon
Issue Date:November 2007
pp. 1091-1096
This study intends to research and develop unrestricted measuring system and user interface in a new form to effectively collect individual bio information of car users ­ driver and passenger ­ with the systems previously researched and developed as basic ...
FPGA Based Design of Elliptic Curve Cryptography Coprocessor
Found in: International Conference on Natural Computation
By You-Bo Wang, Xiang-Jun Dong, Zhi-Guang Tian
Issue Date:August 2007
pp. 185-189
Elliptic curve cryptography plays a crucial role in networking and communication security. FPGA based architecture of elliptic curve cryptography coprocessor is proposed in this paper. The coprocessor is consisted of elements operation over binary finite f...
Wearable ECG Recognition and Monitor
Found in: Computer-Based Medical Systems, IEEE Symposium on
By Jun Dong, Miao Xu, Hong-hai Zhu, Wei-feng Lu
Issue Date:June 2005
pp. 413-418
ECG(Electrocardiogram) recognition and monitor are inevitable to trace and determine heart diseases. As self-health being focused on and social medical grade being progressed, ECG monitors with features such as portable/wearable, wireless, use-friendly, lo...
Low Power VLSI Architecture of Viterbi Scorer for HMM-based Isolated Word Recognition
Found in: Quality Electronic Design, International Symposium on
By Bok-Gue Park, Koon-Shik Cho, Jun-Dong Cho
Issue Date:March 2002
pp. 235
The HMM-based algorithms have been successfully applied to speech recognition since HMM provides a robust modeling capability of various speech signals and maintains high recognition accuracy. Viterbi Scoring that searches the best matching word by compari...
Surface Slicing Algorithm for Rapid Prototyping and Machining
Found in: Geometric Modeling and Processing
By Cha-Soo Jun, Dong-Soo Kim, JiSeon Hwang, Tien-Chien Chang
Issue Date:April 2000
pp. 373
Presented in this paper is an algorithm to obtain the intersections of a free-form surface with a series of parallel planes. When sectioning the surface with parallel planes, the change of the topology of the intersection curves is caused by characteristic...
A Time Synchronization Method for NTP
Found in: Real-Time Computing Systems and Applications, International Workshop on
By Sun-Mi Jun, Dong-Hui Yu, Young-Ho Kim, Soon-Yong Seong
Issue Date:December 1999
pp. 466
This paper introduces an implementation of a clock synchronization method for NTP(Network Time Protocol). NTP is widely used and an effective application protocol in maintaining time synchronization over the network. But the performance of NTP depends on O...
A High Speed and Low Power Phase-Frequency Detector and Charge - pump
Found in: Asia and South Pacific Design Automation Conference
By Won - Hyo Lee, Jun - Dong Cho, Sung - Dae Lee
Issue Date:January 1999
pp. 269
In this paper, we introduce a high-speed and low power Phase-Frequency Detector (PFD) that is designed using modified TSPC (True Single-Phase Clock) positive edge triggered D flip-flop. This PFD has a simpler structure with using only 19 transistors. The o...
Fast Approximation Algorithms on Maxcut, k-Coloring, and k-Color Ordering for VLSI Applications
Found in: IEEE Transactions on Computers
By Jun-Dong Cho, Salil Raje, Majid Sarrafzadeh
Issue Date:November 1998
pp. 1253-1266
<p><b>Abstract</b>—There are a number of VLSI problems that have a common structure. We investigate such a structure that leads to a unified approach for three independent VLSI layout problems: partitioning, placement, and via minimizatio...
An Optimum Pin Redistribution for Multichip Modules
Found in: Multi-Chip Module Conference, IEEE
By Jun Dong Cho
Issue Date:February 1996
pp. 0111
Abstract: We introduce an optimum algorithm for the pin redistribution problem which arises in Multi-Chip Modules. The problem is to redistribute the pins in chip layer to the pin redistribution layers, using a minimum number of layers. The proposed algori...
Convergence analysis of sign-sign LMS algorithm for adaptive filters with correlated Gaussian data
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Byung-Eul Jun, Dong-Jo Park, Yong-Woon Kim
Issue Date:May 1995
pp. 1380-1383
This paper presents a statistical behavior analysis of a sign-sign least mean square algorithm, which is obtained by clipping both the reference input signal and the estimation error, for adaptive filters with correlated Gaussian data. The study focuses on...
Research on the Method of Warfare Simulation Data Analysis Based on BP Neural Network and RoughSet
Found in: 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)
By Heng Jun,Dong Yan-Hong,Wang Jin-Shu,Yan Peng
Issue Date:November 2013
pp. 531-536
In this paper, we introduce the design and experiments of project for Integrated and Agent Retrieval System to classify domain digital resource of diseases and diagnoses. According to the domain ontology of disease and diagnoses, the modelling, constructin...
Study on Engine Fault Diagnosis Based on the Abnormal Sound Analysis in Transformation Domain
Found in: 2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)
By Li Jun,Dong Xingwen,Song Yaji,Song Nuan
Issue Date:June 2013
pp. 1272-1275
Engine fault diagnosis based on abnormal sound signal analysis is a non-contact fault diagnosis methods, It has advantages that judge fault fastly and accuratly, convenient operation, high degree of automation. Based on this background. This paper research...
Research on the Pricing of Convertible Bonds Based on Completely Disassembled Method
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Zhang Dai-Jun,Dong Dian-Hua,Zou Qun-Si,Shi Zhen-Hai
Issue Date:August 2012
pp. 164-167
on the basis of the domestic and foreign research achievements, especially analytical formula of the pricing of servicing convertible bonds with soft restriction of redemption and credit risk deduced by ZHOU Qiyuan (2008), combining with the actual situati...
Study on Incentive Mechanism Model of Tacit Knowledge Sharing in Enterprises
Found in: International Conference on E-Business and E-Government
By Cui Guang-bin,Li Yi-Jun,Dong Liang
Issue Date:May 2010
pp. 1944-1947
Tacit knowledge exists in knowledge workers in enterprises. To enable full sharing, reasonable knowledge sharing incentive and restraint mechanisms should be designed to accelerate spontaneous behaviors of employees so that it can improve the ability of in...
A Method for Domain Conception Clustering with the Guidance of Domain Ontology
Found in: Intelligent Computation Technology and Automation, International Conference on
By Jun Dong, Suoping Wang, Fanlun Xiong
Issue Date:May 2010
pp. 151-155
Domain concept clustering is an important component in the fields of information organization and domain ontology construction. However, some limitations exist in traditional concept clustering for certain domain concept clustering. For example, the disord...
Improved Algorithm and Simulation of the Provision Refrigerating Unit
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By HE Zhi-bin, ZHANG Jun-dong, SUN Yu-qing, ZENG Hong, GAN Hui-bing
Issue Date:September 2007
pp. 803-808
The dynamic model of reciprocating provision cooling plant is presented, and the algorithm of the model is amended, through the method of quoting an unknown variable, which is enthalpy of the refrigerant at the compressor outlet. Dynamic simulation of the ...
Real time rectification using differentially encoded lookup table
Found in: Proceedings of the 5th International Confernece on Ubiquitous Information Management and Communication (ICUIMC '11)
By Deuk Hyun Park, Hyoung Seok Ko, Jae Gon Kim, Jun Dong Cho
Issue Date:February 2011
pp. 1-4
In this paper, we propose a new real time rectification technique based on the compressed lookup table. To compress the lookup table we adopt a differential encoding. As a result, we successfully constructed the rectification with obtaining the compression...
Area-efficient and reusable VLSI architecture of decision feedback equalizer for QAM modern
Found in: Proceedings of the conference on Asia South Pacific Design Automation Conference (ASP-DAC '01)
By Byung Wook Kim, Hyeongseok Yu, Hyun Cheol Park, Jea Woo Kim, Jun-Dong Cho, Ki Won Lee, Yeon Gon Cho
Issue Date:January 2001
pp. 404-408
In this paper, an area efficient VLSI architecture of decision feedback equalizer is derived accommodating 64/256 QAM modulators. This architecture is implemented efficiently in reusable VLSI structure using EDA tool due to its regular structure. The main ...
Maximizing memory data reuse for lower power motion estimation
Found in: Proceedings of the 10th Great Lakes Symposium on VLSI (GLSVLSI '00)
By Bo-Sung Kim, Jun-Dong Cho
Issue Date:March 2000
pp. 133-138
This paper presents a new VLSI architecture of the Motion Estimation in MPEG-2. Previously, a number of full search block matching algorithms (BMA) and architectures using systolic array have been proposed for motion estimation. However, the architectures ...
A min-cost flow based min-cost rectilinear Steiner distance-preserving tree construction
Found in: Proceedings of the 1997 international symposium on Physical design (ISPD '97)
By Jun-Dong Cho
Issue Date:April 1997
pp. 82-87
In many garbage collected systems, the mutator performs a write barrier for every pointer update. Using generational garbage collectors, we study in depth three code placement options for remembered-set write barriers: inlined, out-of-line, and partially i...
A buffer distribution algorithm for high-speed clock routing
Found in: Proceedings of the 30th international on Design automation conference (DAC '93)
By Jun Dong Cho, Majid Sarrafzadeh
Issue Date:June 1993
pp. 537-543
A new gridless router accelerated by Content Addressable Memory (CAM) is presented. A gridless version of the line-expansion algorithm is implemented, which always finds a path if one exists. The router runs in linear time by means of the CAM-based acceler...
UMC Model for Prediction of Seismic Liquefaction of Sand Soil
Found in: Database Technology and Applications, International Workshop on
By Long-jun Dong, Jin-chun Xue
Issue Date:April 2009
pp. 355-358
Based on optimized forecast method of unascertained classifying, a unascertained measurement classifying model (UMC) to seismic liquefaction of sand soil is established, the principles of the unascertained measurement classifying theory are applied to pred...
The Influence of Various Loads to Node Voltage in Power System
Found in: Intelligent System Design and Engineering Application, International Conference on
By Jun-dong Duan, Jian Liang
Issue Date:October 2010
pp. 669-672
Node voltage is affected by changing loads. The active power-voltage curve and reactive power-voltage curve have some limitations in analyzing the effects of node voltage to the loads. In this thesis, the Thevenin's equivalent circuit is adopted to make ma...
A Distributed Online Test System Based on Bluetooth Technology
Found in: Software Engineering, World Congress on
By Jian-jun Dong, Heng-cheng Xu
Issue Date:December 2010
pp. 15-17
This paper discussed a distributed testing system of the Aeronautical special-devices based on Bluetooth communication technology, designed the Bluetooth data communication system which between PC and data acquisition device of the monolithic processor. Th...
Mining Positive and Negative Association Rules in Multi-database Based on Minimum Interestingness
Found in: Intelligent Computation Technology and Automation, International Conference on
By Shi-ju Shang, Xiang-jun Dong, Jie Li, Yuan-yuan Zhao
Issue Date:October 2008
pp. 791-794
With the increasing development and application of information and communication technologies, multi-database mining is becoming more and more important. Association rules mining is the major topic in multi-database. According to Piatetsky-Shapiro’s argume...
Support Vector Machine for Classification of Hyperspectral Remote Sensing Imagery
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Chen-guang Dai, Xiao-bo Huang, Guang-jun Dong
Issue Date:August 2007
pp. 77-80
As one of the popular and advanced statistical learning algorithms, Support Vector Machine (SVM) has been the new hot study area of pattern recognition and machine learning in recent years. SVM has such advantages as suitableness to high dimensional data, ...
GPS/Cellular Network Hybrid Positioning Method Based on Two Scatter Model
Found in: Computer Science and Electronics Engineering, International Conference on
By Wei-yi Zhang,Xiu-wan Chen,Jia-huan Wan,Jun-dong Zhang
Issue Date:March 2012
pp. 98-103
Cellular network has low accuracy and GPS in complex environment has insufficient information, aiming at the irresistible detects in respective positioning system, present combined positioning method based on the GPS and cellular network, to improve the av...
River Water Turbidity Forecasting Based on Phase Space Reconstruction and Support Vector Regression
Found in: Intelligent Computation Technology and Automation, International Conference on
By Jun-dong Wang, Pei-yan Li, Yong-ming Zhang, Wei-gui Qi
Issue Date:May 2010
pp. 217-220
Due to the nonlinear and nonstationary of river water turbidity, a novel hybrid forecasting model based on phase space reconstruction and support vector regression (PSR-SVR) is proposed. Firstly, the embedding dimension is chosen by using the false nearest...
Wormhole Routing and its Chip Design
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Rong Zeng, Xiang-jun Dong, Ming-fa Zhu
Issue Date:June 1996
pp. 553
The wormhole routing is a key technique in the design of Dawning 1000 which is the first MPP system made in China. In this paper, the wormhole routing is introduced, and an algorithm based on wormhole routing, a chip architecture and its logic design are a...