Search For:

Displaying 1-50 out of 344 total
The Optimization Model of Setting the Curb Parking Facilities
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Wang Shu-chun, Chen Jun, Zhang Hui
Issue Date:December 2008
pp. 416-421
To meet the demand of urban parking and decrease the parking cost, the study of a location model about the curb parking facilities and the off-street parking facilities by analyzing the matching relationship is necessary. It surely can improve the overall ...
 
Keyword Combination Extraction in Text Categorization Based on Ant Colony Optimization
Found in: Soft Computing and Pattern Recognition, International Conference of
By Zi-jun Yu, Wei-gang Wu, Jing Xiao, Jun Zhang, Rui-Zhang Huang, Ou Liu
Issue Date:December 2009
pp. 430-435
Due to the increasing number of documents in digital form, the automated text categorization (TC) has become more and more promising in the last ten years. A TC system can automatically assign a document with the most suitable category, but the reason for ...
 
A New GPS Dynamic Filter Algorithm Based on Stationary Wavelet Transformation
Found in: Future Computer and Communication, International Conference on
By Li Hong-lian, Zhang Wei-li, Zhang Jun, Zhang Lei, Jiang Qiang
Issue Date:June 2009
pp. 270-272
Through analyzing the properties of vehicle GPS navigation system signal’s observation gross error and random noise, this paper presents a new dynamic filter algorithm, which based on stationary wavelet transformation (SWT). Firstly, the algorithm decompos...
 
A Studying on Proactive and Reactive Counterproductive Work Behavior
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Yong-Jun Zhang,Bo Wan,Jun Zhao,Mohsin Bashir
Issue Date:November 2011
pp. 150-153
As a bad behavior, CWB has attract many researches attention. However, we know little about whether CWB is employees' compulsive action or intentional behavior. This paper put forwards some propositions about proactive and reactive CWB. Proactive CWB is pr...
 
A Novel Signal-Processing Strategy Based on Bark Wavelet Transform for Cochlear Implants
Found in: Complexity and Data Mining, International Workshop on
By Yan Shen,Zhi Tao,Ji-Hua Gu,Xiao-Jun Zhang,Jun-Jie Zhu
Issue Date:September 2011
pp. 10-13
Cochlear implant is one of the most promising medical applications aiming to utmost restore deaf patients hearing. How to improve voice quality by using effectively algorithms has become a bottleneck. In our research, a new speech signal processing scheme ...
 
Study on the High-Temperature Warning of Asphalt Pavement
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Guo Ping, Wu De-Jun, Huang Jun, Zhang Juan
Issue Date:October 2010
pp. 481-486
According to the results of dynamic stability and the softening point of bituminous test, the most adverse temperature which would produce high-temperature rutting of asphalt pavement were obtained. At the same time through the acquisition temperature data...
 
Integrating functional verification and performance analysis for network protocols using CP-nets
Found in: Computers and Communications, IEEE Symposium on
By Jing Liu, Xinming Ye, Jun Zhang, Jun Li, Yi Sun
Issue Date:June 2010
pp. 963-965
Adopting two independent models for functional verification and performance analysis respectively could not guarantee the performance models satisfying the functionality correctness. In this paper, a colored Petri nets (CP-nets) based method is proposed to...
 
SMBR: A novel NAT traversal mechanism for structured Peer-to-Peer communications
Found in: Computers and Communications, IEEE Symposium on
By Pinggai Yang, Jun Li, Jun Zhang, Hai Jiang, Yi Sun, Eryk Dutkiewicz
Issue Date:June 2010
pp. 535-539
In recent years, structured P2P communications is being widely used for its features of self-organization as well as good scalability and flexibility. To make sure that every node can participate in such a network whether it is behind a NAT or not, we must...
 
The Creation Process of Chinese Calligraphy and Emulation of Imagery Thinking
Found in: IEEE Intelligent Systems
By Jun Dong, Miao Xu, Xian-jun Zhang, Yan-qing Gao, Yun-he Pan
Issue Date:November 2008
pp. 56-62
Chinese calligraphy is both an art form and the embodiment of imagery thinking. The process of calligraphy involves studying tablets or documents, remembering the contents, and creating new artwork with calligraphic images from memory. All these steps are ...
 
Reproducing kernel Banach spaces for machine learning
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Haizhang Zhang, Yuesheng Xu, Jun Zhang
Issue Date:June 2009
pp. 3520-3527
Reproducing kernel Hilbert space (RKHS) methods have become powerful tools in machine learning. However, their kernels, which measure similarity of inputs, are required to be symmetric, constraining certain applications in practice. Furthermore, the celebr...
 
Performance Analysis of an Energy Efficient MAC Protocol for Sensor Networks
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Jun Zhang, Farid Naït-Abdesselam, Brahim Bensaou
Issue Date:May 2008
pp. 254-259
In this paper we derive a qualitative model for O-MAC, an energy efficient MAC protocol designed for sensor networks. Through this model we study how each parameter, such as packet sending rate, node density and end-to-end hop lengths, affects the performa...
 
A Wireless Unicast Retransmission Mechanism with Network Coding
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Jun Zhang,Rui Zhang,Guoliang Ding,Bofeng Zhang
Issue Date:October 2012
pp. 70-75
Network coding has become an important technology to solve the problem that the traditional retransmission methods are inefficient. This paper is directed against two important issues on the wireless retransmission: when to retransmit and how to retransmit...
 
Internet Traffic Classification Using Constrained Clustering
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Wang,Yang Xiang,Jun Zhang,Wanlei Zhou,Guiyi Wei,Laurence T. Yang
Issue Date:November 2014
pp. 2932-2943
Statistics-based Internet traffic classification using machine learning techniques has attracted extensive research interest lately, because of the increasing ineffectiveness of traditional port-based and payload-based approaches. In particular, unsupervis...
 
Differential coexpression analysis in gene modules level and its application to type 2 diabetes
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Lin Yuan,Wen Sha,Jun Zhang,Chun-Hou Zheng,Jun-Feng Xia
Issue Date:December 2013
pp. 193-196
More and more studies have shown many complex diseases are contributed jointly by alterations of numerous genes. In this paper, we propose a gene differential coexpression analysis algorithm in the level of gene sets and apply the algorithm to a publicly a...
   
Accelerating Harris Algorithm with GPU for Corner Detection
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Shuhua Luo,Jun Zhang
Issue Date:July 2013
pp. 149-153
Harris algorithm is a corner detection method based on gray scale, which detects corner points by calculating the gradient changes of pixels in horizontal and vertical direction. Due to the usage of Gaussian filtering, Harris algorithm performs well on asp...
 
Optimizing Data Allocation for Loops on Embedded Systems with Scratch-Pad Memory
Found in: 2012 IEEE 18th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2012)
By Jun Zhang,Tan Deng,Qiuyan Gao,Qingfeng Zhuge,Edwin H.-M. Sha
Issue Date:August 2012
pp. 184-191
Scratch Pad Memory (SPM), a software-controlled on-chip memory, is popular in embedded systems due to its many benefits. To efficiently manage SPM, many different data allocation algorithms are proposed. However, most of them cannot achieve optimal results...
 
SVD-Based Factorization Technique for Dual Privacy Protection Data Mining
Found in: Computational and Information Sciences, International Conference on
By Jie Tang,Jun Zhang,Xinyu Geng,Bo Peng
Issue Date:October 2011
pp. 357-360
Singular value decomposition (SVD) method is a very important matrix decomposition method in linear algebra. It is widely used in signal processing, statistics, data compression and other fields. The paper introduces a SVD method to reduce dimension of ori...
 
Effect of Preparation Conditions of Activated Carbon from Corn Cob by Chemical Activation with Microwave Energy
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Li Jiang, Fei Ma, Ai Jun Gu, Li Jun Zhang
Issue Date:February 2011
pp. 1169-1172
The conditions for the preparation of activated carbon(AC) from corn cob(CC) treated with NaHCO3 using microwave radiation were optimized through response surface methodology (RSM) and central composite design (CCD). The effects of the radiation power, rad...
 
Construction of a Trusted SaaS Platform
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Chaoliang Zhong, Jun Zhang, Yingju Xia, Hao Yu
Issue Date:June 2010
pp. 244-251
As a part of Cloud computing, Software as a Service(SaaS) enables users to cut their costs by outsourcing software as a service on-demand, in which both computation and storage are handled on server-side. However, data must be decrypted into memory when pe...
 
An automatic segmentation technique for color images based on SOFM neural network
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Jun Zhang, Jinglu Hu
Issue Date:June 2009
pp. 3528-3533
In this paper, an automatic segmentation method based on self-organizing feature map (SOFM) neural network (NN) is presented for color images. First, a binary tree clustering procedure is used to cluster the colors in an image. In each node of the tree, a ...
 
The Traffic-Flow Detection Based on Pseudo-Random Coded Radar
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Jun Zhang
Issue Date:April 2009
pp. 630-632
A new traffic flow detection system based on pseudo-random coded (PRC) cw radar is studied and developed in this paper. The proposed system can measure the speed of vehicles at a high resolution. The speed can be measured by the Doppler principle, and in t...
 
Interactive Control of Large-Crowd Navigation in Virtual Environments Using Vector Fields
Found in: IEEE Computer Graphics and Applications
By Xiaogang Jin, Jiayi Xu, Charlie C.L. Wang, Shengsheng Huang, Jun Zhang
Issue Date:November 2008
pp. 37-46
Providing interactive control is a hot topic in crowd-navigation research. Here, the authors propose a simple but effective way for authoring a crowd scene. With their governing tool, users can easily drive the flow of crowds by sketching velocities on anc...
 
Hiding a Logo Watermark into the Multiwavelet Domain Using Neural Networks
Found in: Tools with Artificial Intelligence, IEEE International Conference on
By Jun Zhang, Nengchao Wang, Feng Xiong
Issue Date:November 2002
pp. 477
This paper proposes a novel watermarking scheme for an image, in which a logo watermark is embedded into the multiwavelet domain of the image using neural networks. The multiwavelet domain provides us with a multiresolution representation of the image like...
 
Clinic effect of tongguan capsule for coronary heart disease : A meta-analysis
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Guang Yang,Jianfeng Zhuo,Jiang Li,Jun Zhang,Minzhou Zhang
Issue Date:October 2012
pp. 392-395
Objective: To systematically evaluate the therapeutic efficacy of tongguan capsule (TGC) on the patients with coronary heart disease (CHD). Method: Literatures associated with randomized controlled trials (RCT) or quasi-RCT of TGC in treating patients with...
 
SHAWK: Platform for Secure Integration of Heterogeneous Advanced Wireless Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jiannong Cao,Chisheng Zhang,Jun Zhang,Yueming Deng,Xin Xiao,Miao Xiong,Jie Zhou,Yang Zou,Gang Yao,Wei Feng,Liang Yang,Yao Yu
Issue Date:March 2012
pp. 13-18
With the popularity of different wireless access technologies for Internet access, the integration of heterogeneous wireless networks is foreseen in the near future. Solutions for secured Internet access in such scenario become an urgent requirement. In th...
 
Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed
Found in: Advanced Information Networking and Applications, International Conference on
By Jie Zhou,Jiannong Cao,Jun Zhang,Chisheng Zhang,Yao Yu
Issue Date:March 2012
pp. 59-66
The wormhole attack is a severe attack in Wireless Mesh Networks (WMNs). It involves two or more wormhole endpoints colluding to capture traffic from one place in the network and replay it to another faraway place through a secret tunnel, so as to distort ...
 
Dynamic Pick Method of Web Service Selection Algorithms Based on Use Mode in Self-adaptive Web Service Composition
Found in: Service Sciences, International Joint Conference on
By Li Guohong, Na Jun, Zhang Bin, Dong Pengxiang, Zhang Yuesong
Issue Date:May 2011
pp. 22-26
To solve the contradiction between self-adaptive efficiency and optimization effect existing in the execution of current self-adaptive Web service composition, this paper proposes a dynamic pick method of Web service selection algorithms based on use mode....
 
Optimal Load Distribution Strategy for Multiple Chiller Water Units Based on Adaptive Genetic Algorithms
Found in: Intelligent Systems, WRI Global Congress on
By Zhang Jun, Zhang Kan-yu
Issue Date:December 2010
pp. 5-8
For the complexity, constraint, nonlinearity, modeling difficulty of the multiple chiller water units, an approach using adaptive genetic algorithm method to solve the optimal chiller load distribution and to improve the deficiencies of conventional method...
 
An Estimation of Distribution Algorithm Based Portfolio Selection Approach
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Rui-tian Xu, Jun Zhang, Ou Liu, Rui-zhang Huang
Issue Date:November 2010
pp. 305-313
A portfolio selection problem is about finding an optimal scheme to allocate a fixed amount of capital to a set of available assets. The optimal scheme is very helpful for investors in making decisions. However, finding the optimal scheme is difficult and ...
 
The Application Research of Coupled Chaos Stream Cipher for Pervasive Computing
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Dong Wenjie, Zhang Jun, Zhang Chunxia, Zhou Chunmei, Lin Jinyong
Issue Date:September 2010
pp. 1103-1106
The security of some special pervasive computing systems is very important, but generally speaking, the system resource of pervasive computing device is limited, so a cipher algorithm which possesses high security and low computational complexity is needed...
 
HyperService: Linking and Exploring Services on the Web
Found in: Web Services, IEEE International Conference on
By Chenting Zhao, Chun'e Ma, Jing Zhang, Jun Zhang, Li Yi, Xinsheng Mao
Issue Date:July 2010
pp. 17-24
Web is becoming a programmable platform, with countless services blooming everyday in various forms like Feeds, REST APIs and Widgets, etc. Although the existing technologies, such as Mashups, have reduced the challenges to build new applications by compos...
 
Towards a More Effective Mashup Using Mashable Service Model
Found in: Services, IEEE Congress on
By Chun'e Ma, Jing Zhang, Chenting Zhao, Yuan Ni, Jun Zhang, Li Yi, Xinsheng Mao
Issue Date:July 2010
pp. 566-573
Web is becoming a programmable platform and Mashup is emerging as a brand-new service composition paradigm. However, one of the biggest blocking issues with the universal adoption of Mashup is lack of a well-designed inventory of mashable services for user...
 
Study on Fault Diagnosis Model of Condensate and Feed Water System Based Information Fusion
Found in: Electrical and Control Engineering, International Conference on
By Jie Ma, Yusheng Zhang, Lifeng Guo, Jun Zhang
Issue Date:June 2010
pp. 2092-2096
Based on the analysis of condensate and feed water system, a fault knowledge repository is established considering operation experience. The D-S inference of Information Fusion theory has the ability of dealing with uncertain information and Artificial Neu...
 
Application of Homogeneous Markov Chain in Quantitative Analysis of Teaching Achievement Indicators in Physical Education
Found in: Education Technology and Computer Science, International Workshop on
By Xia Zhang, Jun Zhang
Issue Date:March 2010
pp. 530-532
Markov chain is a statistical analysis method which is based on probability theory and uses random mathematical models to analyze the quantitative relationship in the course of development and changes of objects. This paper explores the application of Mark...
 
A Numerical Study of Pulsatile Flow Through a Hollow Fiber Cartridge: Growth Factor-Receptor Binding and Dissociation Analysis
Found in: Bioinformatics, Systems Biology and Intelligent Computing, International Joint Conference on
By Changjiang Zhang,Wensheng Shen,Bing Zhao,Michael Fannon,Kimberly Forsten-Williams,Jun Zhang
Issue Date:August 2009
pp. 435-441
This paper presents a numerical solution to describe growth factor-receptor binding under flow through hollow fibers of a bioreactor. The multi-physics of fluid flow, the kinetics of fibroblast growth factor (FGF-2) binding to its receptor (FGFR) and hepar...
 
Optimization of Intelligent Compactness Control Rule of Vibratory Roller Based on Genetic Algorithm Method
Found in: Networked Computing and Advanced Information Management, International Conference on
By Yi Zhang, Jun Zhang, XingZu Shu, Lei Guo, Yong Shi, XinBo Liu
Issue Date:August 2009
pp. 1943-1947
Compactness is the key index to determine the work quality of vibratory roller, the intelligent control of compactness was the key and difficult technology for roller. In order to improve the compaction effect and the intelligence of automatic control of r...
 
A Solving Model of Network Resource
Found in: Networked Computing and Advanced Information Management, International Conference on
By Jian-hua Wang, Jun Zhang, Wei-dong Ji, Long Zhang
Issue Date:August 2009
pp. 39-43
A kind of network model is presented in this paper it analyzes the optimized problem of network resources based on this model, and converts the computer network resources problem into shape transformed process of computing multi-dimension flexible cyberspa...
 
Analyses on Wheel-Rail Contact Using Finite Element Method during Passing through Curved Track
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Ping Sun, Jian Zhang, Jun Zhang
Issue Date:April 2009
pp. 728-731
The three-dimensional elastic frictional finite element model of the wheel/rail interaction is put forward to investigate effect of the curve radius and superelevation on the contact stress and contact force of the rail. The interaction between left and ri...
 
An Energy-Balanced Relaying Communication Protocol Based on Power and Distance Cooperation
Found in: Embedded Software and Systems, Second International Conference on
By Shaoyan Huang, Jianping Xing, Dejing Zhang, Xiling Luo, Jun Zhang
Issue Date:July 2008
pp. 87-92
Wireless sensor networks (WSNs) composed of a large number of cheap microsensor nodes with limited battery power and highly correlated collected data is intelligent and autonomous system for measure and management. To reduce the redundant data among the no...
 
An Ant Colony System Algorithm for the Multicast Routing Problem
Found in: International Conference on Natural Computation
By Yuan Zhang, Huachun Cai, Ying Lin, Jing Xiao, Jun Zhang
Issue Date:August 2007
pp. 756-760
With the rapid development in network services, multicast has recently became a hot spot in communication technology. The multicast routing is the key to multicast implementation. A modified ant colony system is presented in this paper to do the single-ori...
 
DDGrid: Harness the Full Power of Supercomputing Systems
Found in: Grid and Cooperative Computing Workshops, International Conference on
By Wenju Zhang, Xuefeng Du, Fanyuan Ma, Jun Zhang, Jianhua Shen
Issue Date:October 2006
pp. 1-4
This paper discusses the design and implementation of Drug Discovery Grid (DDGrid) in details. The purpose of the drug discovery grid is to set up a grid environment with aggregated compute and data resources to provide the drug virtual screening services ...
 
Surface microcosmic phenomena induced by pulsed flashovers
Found in: International Symposium on Electrical Insulating Materials
By Wen-Bin Zhao, Guan-Jun Zhang, Gui-Bo Qin, Kui Ma, Zhang Yan
Issue Date:June 2005
pp. 324-327 Vol. 2
The surface conditions of solids strongly affect the related surface and interfacial phenomena, which implied the difference between its surface and bulk. In this paper, under the pulsed excitation, the pattern and ingredient on surface of two kinds of sem...
 
Geographic Information Integration and Publishing Based on GML and SVG
Found in: Computer and Information Technology, International Conference on
By Jun Zhang, Jihong Guan, Jianhua Zhang, Junpeng Chen
Issue Date:September 2004
pp. 764-769
The complexity and richness of spatial data models and geographic information systems (GIS) together with the popularity of WWW have led to an increasing number of heterogeneous and autonomous geo-referenced information sources that spread over the Interne...
 
Video Watermark Technique in Motion Vector
Found in: Graphics, Patterns and Images, SIBGRAPI Conference on
By Jun Zhang, Jiegu Li, Ling Zhang
Issue Date:October 2001
pp. 179
In this paper, we propose a video watermarking technique to hide copyright information in MPEG motion vector. In this method, watermark is embedded in larger value motion vectors, and specially in the less phase angle changed component. Then, the motion ve...
 
A Mobility Management Based on Proxy MIPv6 and MPLS in Aeronautical Telecommunications Network
Found in: Information Science and Engineering, International Conference on
By Liang Zhao, Jun Zhang, Xuejun Zhang, Qingbo Li
Issue Date:December 2009
pp. 2452-2455
Recently, Mobile IPv6 (MIPv6) has been chosen as the core of mobility management mechanism for Aeronautical environment. Considering the fact that Aircraft is travelling at high speeds and connected by a wide range of wireless networking technologies, it i...
 
Adaptive Database Schema Design for Multi-Tenant Data Management
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jiacai Ni, Guoliang Li, Lijun Wang, Jianhua Feng, Jun Zhang, Lei Li
Issue Date:September 2014
pp. 1-1
Multi-tenant data management is a major application of Software as a Service (SaaS). For example, many companies want to outsource their data to a third party that hosts a multi-tenant database system to provide data management services. The multi-tenant d...
 
Traffic Identification in Semi-known Network Environment
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Xiao Chen,Jun Zhang,Yang Xiang,Wanlei Zhou
Issue Date:December 2013
pp. 572-579
Network traffic classification has attracted more and more attentions from both academia and industry. It has been widely adopted in network management and security, such as QoS measurements. Due to rapid emergence of new applications in current network en...
 
What We Use to Predict a Mobile-Phone Users' Status in Campus?
Found in: 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE)
By Fei Sun,Jun Zhang,Lai Tu,Benxiong Huang
Issue Date:December 2013
pp. 1238-1241
Mobile phones are quickly becoming the primary source for social and behavioral sensing and data collection. A great deal of research effort in academia and industry is put into mining this data for higher level sense-making, such as understanding user con...
 
Network Topology Discovery Based on SNMP
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Li Jun,Zhang Xuefeng,Shen Weihong,Zou Qilin
Issue Date:December 2013
pp. 194-199
This paper proposes a network topology discovery algorithm and detailed implementation process. The paper introduces several kinds of centralized discovery technologies for network topology, and puts forwards a network topology discovery improvement algori...
 
Optimizing Vaccine Distribution for Different Age Groups of Population Using DE Algorithm
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Xiao-Min Hu,Jun Zhang
Issue Date:December 2013
pp. 21-25
Vaccination is one of the most promising methods to control the epidemic spread by protecting the most vulnerable population and reducing the number of susceptible population who are exposed to the virus. However, the vaccine doses are usually limited and ...
 
 1  2 Next >>