Search For:

Displaying 1-50 out of 336 total
A Pilot-scale Experimental Research on Nutrient Matter Removal in a Modified SBR
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Jun Li,Li-min Wang,Xue-bin Li,Jiong-hui Li
Issue Date:May 2012
pp. 1169-1171
A novel modified sequencing batch reactor was proposed to treat municipal wastewater. The modified SBR had a special structure consisting of 4 tanks with different anaerobic/anoxic/aerobic function. A pilot-scale modified SBR process was researched to trea...
 
A Full-Distributed Architecture for PoC Application in Data Packet Voice Communication
Found in: Computer and Information Technology, International Conference on
By Qi Wang,Hai Jiang,Albert K. Wong,Jun Li,Zhongcheng Li
Issue Date:September 2011
pp. 231-237
Push-to-Talk over Cellular (PoC) is a
 
Develop a Model Involving Common Features of M-learning Based on an Interactive Model
Found in: Intelligent Systems, WRI Global Congress on
By Zhuo Jun, Li Fubin, Chen Liangliang
Issue Date:May 2009
pp. 351-355
Mobile learning is a kind of educational mode, basing on the combination of the emergency of distance education using mobile as well as the blooming of Internet. Anderson had developed an interactive model for m-learning in 2004, on account of which, Wei J...
 
Complex Network Characteristic of Power System Based on Energy Information in the Steady Transition Process
Found in: Asia-Pacific Power and Energy Engineering Conference
By Li-min Liu, Jun-yong Liu, You-bo Liu, Jun Li
Issue Date:March 2011
pp. 1-5
NA
 
Bilingual Phrase Extraction from N-Best Alignments
Found in: Innovative Computing ,Information and Control, International Conference on
By Yong-Zeng Xue, Sheng Li, Tie-Jun Zhao, Mu-Yun Yang, Jun Li
Issue Date:September 2006
pp. 410-414
Improved approach of phrase extraction was proposed for phrase-based statistical machine translation. The effectiveness was investigated when using n-best alignments instead of one-best for phrase extraction. Bilingual phrase pairs were extracted in the pr...
 
A Bag-of-Feature Model for Video Semantic Annotation
Found in: Image and Graphics, International Conference on
By Youdong Ding,Jianfei Zhang,Jun Li,Xiaocheng Wei
Issue Date:August 2011
pp. 696-701
Multimedia data of huge amount gets involved into people's daily life, bringing us a very important issue of efficiently managing video collections. Semantic content based on video retrieval is most effective for finding information and actual application....
 
Integrating functional verification and performance analysis for network protocols using CP-nets
Found in: Computers and Communications, IEEE Symposium on
By Jing Liu, Xinming Ye, Jun Zhang, Jun Li, Yi Sun
Issue Date:June 2010
pp. 963-965
Adopting two independent models for functional verification and performance analysis respectively could not guarantee the performance models satisfying the functionality correctness. In this paper, a colored Petri nets (CP-nets) based method is proposed to...
 
SMBR: A novel NAT traversal mechanism for structured Peer-to-Peer communications
Found in: Computers and Communications, IEEE Symposium on
By Pinggai Yang, Jun Li, Jun Zhang, Hai Jiang, Yi Sun, Eryk Dutkiewicz
Issue Date:June 2010
pp. 535-539
In recent years, structured P2P communications is being widely used for its features of self-organization as well as good scalability and flexibility. To make sure that every node can participate in such a network whether it is behind a NAT or not, we must...
 
CPLD-Based Implementation of Computer Bus RAM
Found in: Challenges in Environmental Science and Computer Engineering
By Yang Jun, Ding Jun, Li Na, Guo Yixiong
Issue Date:March 2010
pp. 71-74
Along with the rapid application of large-scale integrated circuit and computer system is growing by geometric series, the boundary between hardware and software has blurred. EDA, a novel technology arisen in recent years has been challenged with the tradi...
 
FPGA Implementation of SHA-224/256 Algorithm Oriented Digital Signature
Found in: Challenges in Environmental Science and Computer Engineering
By Yang Jun, Ding Jun, Li Na, Guo Yixiong
Issue Date:March 2010
pp. 63-66
This paper uses the similarity between SHA-224 and SHA-256 algorithms to design the SHA-224/256 IP core oriented Digital Signature. The IP core uses parallel structure and pipeline technology to simplify the hardware design and improve the speed by 26%. Fi...
 
FPGA-Based Design and Implementation of Reduced AES Algorithm
Found in: Challenges in Environmental Science and Computer Engineering
By Yang Jun, Ding Jun, Li Na, Guo Yixiong
Issue Date:March 2010
pp. 67-70
This paper introduces the principle of AES algorithm and the detailed description and implementation on FPGA. This system aims at reduced hardware structure. Compared with the pipeline structure, it has less hardware resources and high cost-effective. And ...
 
A Research and Design of Decimal Floating Multiplier Based on FPGA
Found in: International Workshop on Knowledge Discovery and Data Mining
By Guo Yixiong, Ding Jun, Li Na, Yang Jun
Issue Date:January 2010
pp. 314-319
This article is based on the new standard, uses the FPGA device opening[1][2], adopts FPGA technique of EDA to build 64 bits decimal floating multiplier model. And in this article, we mainly use DPD codec and BCD new codec and Signed-Digit radix-5 to proce...
 
A Design and Implementation of High-Speed 3DES Algorithm System
Found in: Future Information Technology and Management Engineering, International Seminar on
By Yang Jun, Li Na, Ding Jun
Issue Date:December 2009
pp. 175-178
This paper introduces the principle of 3DES encryption algorithm and the detailed description of the algorithm design and implementation on FPGA. For the improvement of the S-box, it uses a single S-box to replace the original eight S-boxes. This will not ...
 
A High-performance Pseudo-random Number Generator Based on FPGA
Found in: Wireless Networks and Information Systems, International Conference on
By Ding Jun, Li Na, Guo Yixiong, Yang Jun
Issue Date:December 2009
pp. 290-293
This article mainly describes a way of designing an efficient pseudo-random number generator. Combining that the cellular automaton has many characteristics, such as simple rules of the component units, the local connectivity of units, the high degree of p...
 
VCR Functionalities with Adaptive Rate Adjustment in Streaming Media Server
Found in: Computer and Information Technology, International Conference on
By Zhou Jun, Li Jun, Zhu Ming
Issue Date:October 2009
pp. 150-155
Due to the decoding dependency of MPEG coded frames, lots ofdependent frames are transmitted at Video Cassette Recording (VCR)operations, thus more computation resource, hard disk and networkbandwidth are consumed on streaming meida server, and higherdecod...
 
Parameter Estimation of Logit Route Choice Model with Unified Parameter
Found in: Intelligent Computation Technology and Automation, International Conference on
By Ouyang Jun, Li Jun, Cai Min
Issue Date:October 2009
pp. 148-151
The cumulative function relationship between route choice probability and route impedance is derived from the original logit model by utilizing the relative impedance instead of the absolute impedance of the model. The well-known least squares method, whic...
 
VBR MPEG Video Traffic Dynamic Prediction Based on the Modeling and Forecast of Time Series
Found in: Networked Computing and Advanced Information Management, International Conference on
By Jun Dai, Jun Li
Issue Date:August 2009
pp. 1752-1757
The variable-bit-rate traffic characteristic brings a large complication to the utilization of network resources, especially bandwidth. To solve this problem, this paper proposes a dynamic prediction scheme of MPEG video traffic. We first advance an initia...
 
Data Driven for Gray Relational Analysis of Recognizing Oil-bearing Characteristics in Reservoir
Found in: Intelligent Systems, WRI Global Congress on
By Xiang Jun, Guo Hai-xiang, Zhu Ke-jun, Li Lan-lan, Ding Chan
Issue Date:May 2009
pp. 408-413
The paper proposed a method of data driven gray relational analysis for recognizing oil-bearing characteristics in reservoir. The method follows the objective process from data to information and from information to recognition. Firstly, reduce attributes ...
 
Illumination Invariant Face Recognition Based on Neural Network Ensemble
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu, Shi-Fu Chen
Issue Date:November 2004
pp. 486-490
An illumination invariant face recognition method based on neural network ensemble architecture is proposed. Given a face image with an arbitrary illumination direction, it can complete recognition in a uniform way with high performance without knowing or ...
 
Application-layer bandwidth allocation algorithm for service differentiation in hybrid content distribution network
Found in: Computers and Communications, IEEE Symposium on
By Hai Jiang, Haibin Zhai, Albert K. Wong, Jun Li, Yi Sun, Zhongcheng Li
Issue Date:June 2010
pp. 387-392
Hybrid content distribution network (HCDN) makes use of the highly complementary advantages of conventional CDN (content distribution network) and pure P2P (peer-to-peer). In HCDN, clients can concurrently retrieve content from both CDN and P2P networks. I...
 
A Replica Placement Algorithm for Hybrid CDN-P2P Architecture
Found in: Parallel and Distributed Systems, International Conference on
By Hai Jiang, Zhan Wang, Albert K. Wong, Jun Li, Zhongcheng Li
Issue Date:December 2009
pp. 758-763
The Hybrid CDN-P2P architecture, or HCDN, which combines the complementary advantages of CDN and P2P networks, has been proposed to reduce the deployment cost and to improve the quality of service in file sharing and video streaming applications. A replica...
 
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Found in: Security and Privacy, IEEE Symposium on
By Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li
Issue Date:May 2004
pp. 115
Tracing attack packets to their sources, known as IP traceback, is an important step to counter distributed denial-of-service (DDoS) attacks. In this paper, we propose a novel packet logging based (i.e., hash-based) traceback scheme that requires an order ...
 
Scheduled PSM for Minimizing Energy in Wireless LANs
Found in: Network Protocols, IEEE International Conference on
By Yong He, Ruixi Yuan, Xiaojun Ma, Jun Li, Charles Wang
Issue Date:October 2007
pp. 154-163
Power conservation is a general concern for mobile computing and communication. In this paper, we investigate the performance of the current 802.11 power saving mechanism (unscheduled PSM) and demonstrate that background network traffic can have a signific...
 
A Fast Handover Solution for SIP-based Mobility
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Wang Miao, Zhang Yu-Jun, Li Jun
Issue Date:June 2006
pp. 315-320
No summary available.
 
Exploiting Global Causality in Testing of Distributed and Component-Based Applications
Found in: Software Maintenance, IEEE International Conference on
By Jun Li, Keith Moore
Issue Date:September 2004
pp. 527
<p>A new approach to testing component-based applications is presented, which exploits the practice in component-based systems of generating stub/skeleton modules and using these stubs/skeletons to construct a global perspective of end-to-end causali...
   
Monitoring and Characterization of Component-Based Systems with Global Causality Capture
Found in: Distributed Computing Systems, International Conference on
By Jun Li
Issue Date:May 2003
pp. 422
Current software development techniques and tools lack the capability to characterize function call chains in multithreaded and distributed applications built upon component technologies like CORBA, COM and J2EE. The root cause is that causal linkage infor...
 
How P2P live streaming systems scale quickly under a flash crowd?
Found in: IEEE International Performance Computing and Communications Conference
By Haibo Wu,Hai Jiang,Jing Liu,Yi Sun,Jun Li,Zhongcheng Li
Issue Date:November 2011
pp. 1-8
Peer-to-Peer (P2P) technology has been widely adopted by various live streaming systems recently, due to its better scalability and lower costs compared with the client-server architecture. However, P2P live streaming systems are still challenged by the fl...
 
A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network
Found in: Communication Software and Networks, International Conference on
By Guodong Li, Zhen Chen, Anan Luo, Yibo Xue, Jun Li, Chuang Lin
Issue Date:February 2010
pp. 536-540
In order to provide the service differentiation for various network applications, and guarantee delay and bandwidth requirement, packet scheduling is considered as a hot research topic and a crucial module in network device. In high speed network, it is ha...
 
A New Research Field: Intelligent Knowledge Management
Found in: Business Intelligence and Financial Engineering, International Conference on
By Lingling Zhang, Jun Li, Aihua Li, Peng Zhang, Guangli Nie, Yong Shi
Issue Date:July 2009
pp. 450-454
Knowledge or hidden patterns discovered by data mining from large-scale databases has great novelty, which is often unable to be gained from the experts. Given large-scale databases, this paper proposes foundations of intelligent knowledge management. It e...
 
Stability Analysis of Discrete Hopfield Neural Networks with Weighted Function Matrix and Delay
Found in: Information and Computing Science, International Conference on
By Jiali Mao, Jun Li, Mingdong Li, Xianhua Zeng
Issue Date:May 2009
pp. 35-38
In this paper, discrete Hopfield neural networks with weight function matrix(DHNNWFM) and discrete Hopfield neural networks with weight function matrix and delay(DHNNWFMD) are introduced. And the stability properties of DHNNWFMD that weight function matrix...
 
Performance Evaluation of Content Distribution in Hybrid CDN-P2P Network
Found in: Future Generation Communication and Networking
By Hai Jiang, Jun Li, Zhongcheng Li, Xiangyu Bai
Issue Date:December 2008
pp. 188-193
Hybrid content distribution network (HCDN), integrating complementary advantages of CDN and P2P, is used to improve efficiency of large-scale content distribution. In this paper, to achieve in-depth understanding of HCDN’s effectiveness, we carry out a det...
 
Camera based mixed-lingual card reader for mobile device
Found in: Document Analysis and Recognition, International Conference on
By Xi-Ping Luo, Li-Xin Zhen, Gang Peng, Jun Li, Bai-Hua Xiao
Issue Date:September 2005
pp. 665-669
With the availability of high-resolution cameras and increased computation power, it becomes possible to implement OCR applications such as business card reader in the mobile device. In this paper we introduced the design and implementation of a mixed-ling...
 
Vehicle Cycle Environmental Impacts Assessment of a China Passenger Car
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Shuhua Li,Nannan Li,Ying Gao,Jun Li
Issue Date:May 2012
pp. 1889-1892
In this paper, the vehicle cycle environment impacts of a mid-size passenger car in China is performed, with a special focus on the primary energy consumption and greenhouse gas (GHG) emissions. The vehicle cycle analysis results show that the energy consu...
 
LiveS Cube: An Experiment for Mobile Social Network
Found in: Networking and Distributed Computing, International Conference on
By Yu-qian Li,Yang Liu,Zhi-fang Liu,Chao Liu,Zhao-Nan Li,Fu-ye Han,Jun Li,Ming Xu,Xin Guan,Zhen Chen
Issue Date:September 2011
pp. 311-315
No summary available.
 
Rural Distribution Network Fault Location Algorithm Based on Fault Complaint Information
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Yan, Li Jun, Li Wencai, Zhang Dening
Issue Date:January 2011
pp. 199-202
The present situation of rural distribution network fault location is analyzed. The characteristics of fault calling information of distribution network were discussed. On this basis the rural distribution network fault location algorithms theory based on ...
 
Non-rigid Registration in 3D Implicit Vector Space
Found in: Shape Modeling and Applications, International Conference on
By Zhi-Quan Cheng, Wei Jiang, Gang Dang, Ralph R. Martin, Jun Li, Honghua Li, Yin Chen, Yanzhen Wang, Bao Li, Kai Xu, Shiyao Jin
Issue Date:June 2010
pp. 37-46
We present an implicit approach for pair-wise non-rigid registration of moving and deforming objects. Shapes of interest are implicitly embedded in the 3D implicit vector space. In this implicit embedding space, registration is performed using a global-to-...
 
Research on Factors Influencing Knowledge Transfer and Managerial Mechanisms in the Community of Practice
Found in: Power Electronics and Intelligent Transportation System, Workshop on
By Zhihong Li, Jun Li, Minxia Li
Issue Date:August 2008
pp. 556-560
Increasingly, the ability to transfer knowledge in an organization is viewed as basis for competitive advantage. One promising method used to facilitate knowledge transfer is the creation of Community of Practice (CoP) in an organization. The purpose of th...
 
The New Numerical Integration Algorithm Based on Neural Network
Found in: International Conference on Natural Computation
By Li ying Xu, Li jun Li
Issue Date:August 2007
pp. 325-328
The numerical integration is an important computing method in science and engineering. An algorithm of neural network based on cosine and sine basis functions is proposed. It uses the output of neural network to approximate to the integrand by training the...
 
Empirical Study on the Evolution of PlanetLab
Found in: International Conference on Networking
By Li Tang, Yin Chen, Fei Li, Hui Zhang, Jun Li
Issue Date:April 2007
pp. 64
PlanetLab is a globally distributed overlay platform that has been increasingly used by researchers to deploy and assess planetary-scale network services. This paper analyzes some particular advantages of PlanetLab, and then investigates its evolution proc...
 
A Knowledge Management Platform for Optimization-based Data Mining
Found in: Data Mining Workshops, International Conference on
By Xingsen Li, Yong Shi, Ying Liu, Jun Li, Aihua Li
Issue Date:December 2006
pp. 833-837
Multiple criteria linear programming (MCLP) approach to data mining has been used in many fields. But users need to understand well with math and technology in its working process. This prevents it from wide applications. Studied on standards of data minin...
 
End-to-End Delay Behavior in the Internet
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Li Tang, Hui Zhang, Jun Li, Yanda Li
Issue Date:September 2006
pp. 373-382
While delay-critical applications typified by online multimedia communication are growing rapidly, the end-to-end (E2E) delay behavior in the Internet remains poorly understood. This paper proposes a stochastic process model, in which E2E delay alternation...
 
Fusion: Managing Healthcare Records at Cloud Scale
Found in: Computer
By Sujoy Basu,Alan H. Karp,Jun Li,James Pruyne,Jerry Rolia,Sharad Singhal,Jaap Suermondt,Ram Swaminathan
Issue Date:November 2012
pp. 42-49
An experimental open, cloud-based platform for large-scale, low-cost delivery of healthcare applications enables broader use of patient-centric management of electronic health records and facilitates the secure and seamless sharing of EHRs among stakeholde...
 
Governance Framework for IT Transformation Projects in Outsourcing
Found in: 2012 Annual SRII Global Conference (SRII)
By Sujoy Basu,Sharad Singhal,Jun Li,Bryan Stephenson,Wen Yao
Issue Date:July 2012
pp. 201-210
In the IT Outsourcing industry, a complex transition and transformation process is required for on-boarding large enterprise customers. The process begins after the customer signs a contract, and ends when steady-state operation is attained by the service ...
 
ArA: Adaptive resource allocation for cloud computing environments under bursty workloads
Found in: IEEE International Performance Computing and Communications Conference
By Jianzhe Tai,Juemin Zhang,Jun Li,Waleed Meleis,Ningfang Mi
Issue Date:November 2011
pp. 1-8
Cloud computing nowadays becomes quite popular among a community of cloud users by offering a variety of resources. However, burstiness in user demands often dramatically degrades the application performance. In order to satisfy peak user demands and meet ...
 
The Performance of Greedy Geographic Forwarding in Unmanned Aeronautical Ad-Hoc Networks
Found in: Communication Networks and Services Research, Annual Conference on
By Rostam Shirani, Marc St-Hilaire, Thomas Kunz, Yifeng Zhou, Jun Li, Louise Lamont
Issue Date:May 2011
pp. 161-166
The availability of accurate location information (for airborne purposes) in unmanned aeronautical ad-hoc networks (UAANETs) makes it possible to deploy geographic routing mechanisms as the main communication protocol in such networks. However, the perform...
 
An Adaptive Indoor Location Detection Method Using Hybrid of Radio Signal and Image Sensors
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Wei Zhou, Xiaojun Ma, Jun Li
Issue Date:December 2010
pp. 505-509
Ubiquitous computing technology has brought great attentions in recent years since it promises a simple operation to an ever increasing comprehensive digital world. For a networked home supporting advanced applications, ubiquitous media access becomes a mu...
 
Research on Improved Hybrid Particle Swarm Optimization for Vehicle Routing Problem with Time Windows
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Zhengchu Wang, Jun Li, Jian Fan, Chun Fan
Issue Date:October 2010
pp. 179-183
Vehicle routing problem with time window (VRPTW) is a very important combinatorial optimization and nonlinear programming problem and it has important practical value in the field of transportation, distribution and logistics. Traditional intelligent optim...
 
Framework Design for Intelligent Business Process-Oriented Knowledge-Sharing Platform
Found in: Business Intelligence and Financial Engineering, International Conference on
By Lingling Zhang, Jun Li, Caiyu Zhang, Yong You, Yong Shi
Issue Date:August 2010
pp. 122-125
Business process-oriented knowledge-sharing platform is a subsystem of knowledge management information systems. In this paper, based on business process-oriented knowledge management theory, we present a knowledge-sharing platform model at a technical lev...
 
A k-coordinated decentralized replica placement algorithm for the ring-based CDN-P2P architecture
Found in: Computers and Communications, IEEE Symposium on
By Zhan Wang, Hai Jiang, Yi Sun, Jun Li, Jing Liu, Eryk Dutkiewicz
Issue Date:June 2010
pp. 811-816
Content distribution networks (CDNs) improve the performance of content delivery by replicating the popular content on surrogate servers deployed at the edge of the Internet. The CDN-P2P architecture, which combines the complementary advantages of both CDN...
 
Enhanced floor control protocol for PoC application in data packet voice communication
Found in: Computers and Communications, IEEE Symposium on
By Hai Jiang, Albert K. Wong, Vincent W. Luk, Xiyu Duan, Jun Li, Chenguang Ma
Issue Date:June 2010
pp. 834-839
Push-to-Talk over Cellular (PoC) is a one-to-one or one-to-many Push-To-Talk (PTT) service designed to work over the cellular network. In the PTT, a participant may speak as soon as he/she has obtained the permission through pushing a “talk” button. The ty...
 
 1  2 Next >>