Search For:

Displaying 1-27 out of 27 total
Sleep Scheduling for Critical Event Monitoring in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Peng Guo,Tao Jiang,Qian Zhang,Kui Zhang
Issue Date:February 2012
pp. 345-352
In this paper, we focus on critical event monitoring in wireless sensor networks (WSNs), where only a small number of packets need to be transmitted most of the time. When a critical event occurs, an alarm message should be broadcast to the entire network ...
Requirement and Design Analysis for the Post-Trauma Mobile Psychology Service
Found in: Services Science, Management and Engineering, IITA International Conference on
By Yang Ji, Nan Lin, Fan Zhang, Yangyi Wen, Kui Zhang, ZhuoHong Zhu, Chunlei Fan, Hao Wang, Kun Yu
Issue Date:July 2009
pp. 270-273
In 2008, a serious earthquake struck Sichuan province. Tens of thousands of people in disaster areas have suffered injuries both in physical and mental aspects. Thus, a Post-Trauma Mobile Service (PTMS) is launched and implemented in Sichuan province, whic...
Post-Trauma Mobile Service: A Case Study of Psychological Counseling Service with Mobile Internet Technology
Found in: New Trends in Information and Service Science, International Conference on
By Fan Zhang, Yang Ji, Kui Zhang, Zhuohong Zhu, Hao Wang, Ning Liu
Issue Date:July 2009
pp. 1140-1144
The 5.12 Wenchuan Earthquakes has not only caused great loss of lives and properties of people in disastrous area, but also has brought profound psychological trauma to the victims. A Post-Trauma Mobile Service (PTMS) is developed and implemented in Sichua...
Carried Load Measurement Based on Gait Analysis and Human Kinetics
Found in: Image and Signal Processing, Congress on
By Kui Zhang, Hong Zhang, Ning Yao, Robert J. Sclabassi, Mingui Sun
Issue Date:May 2008
pp. 104-107
As a means of biometric identification, gait analysis has attracted much attention in both research and industry. Most methods focus on human posture identification, tracking and medicine treatment assistant. Few methods, however, investigate the relations...
Investigating Novel Immune-Inspired Multi-agent Systems for Anomaly Detection
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Haidong Fu, Xiguo Yuan, Kui Zhang, Xiaolong Zhang, Qi Xie
Issue Date:December 2007
pp. 466-472
Due to the biological immune system applied to the field of computer security, immunological scientists have made much development for anomaly detection systems. However, there are still a number of significant hurdles to prevent it from solving real-world...
Design and Implementation of a Comprehensive Information System for Detection of Urban Active Faults
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Li-zhen Lu,Han-Kui Zhang,Xian-Li Sha,Hong-Hai Wu
Issue Date:May 2012
pp. 1311-1314
This paper presents a practical comprehensive information system for detecting urban active faults using WebGIS, data fusion, the Spatial Database Engine (SDE), network and RAID5, and other technologies. This system is designed to provide data and a platfo...
Study on Treatment of Nylon 66 Chemical Wastewater by Active Carbon Film Filler Contact Oxidation Process
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Haicheng Liu, Jian Liu, Kui Zhang, Lejun Shi
Issue Date:February 2011
pp. 2229-2231
Experiments were conducted to examine the effects of nylon 66 chemical wastewater treatment by active carbon film filler contact oxidation process. The results showed that the formation of biofilm was relatively rapid on the surface of active carbon film f...
Reliability Analysis of Shield Cutter Based on Stochastic Finite Element Method
Found in: Electrical and Control Engineering, International Conference on
By Qing Tan, Kai Wang, Yimin Xia, Kui Zhang
Issue Date:June 2010
pp. 2914-2916
This paper combined the finite element method with theory of reliability design and applied the PDS module of ANSYS to establishing 3D parameterized model of shield cutter. What's more, it compiled the APDL command flow and obtained the reliability documen...
Establishment and Dynamic Analysis of Vibration Model of TBM Disc Cutter in the Rolling Direction
Found in: Electrical and Control Engineering, International Conference on
By Kui Zhang, Yi-min Xia, Qing Tan, Zhi-jun Xu
Issue Date:June 2010
pp. 919-921
On the basis of reasonably simplifying the structure of disc cutter, the rolling force is used as the vibration source and based on equivalent stiffness method, the method to establish a general vibration differential equation of rolling rock in the rollin...
A Novel Anomaly Detection Algorithm
Found in: Computer and Communications Security, International Conference on
By Kui Zhang
Issue Date:December 2009
pp. 14-16
A novel anomaly detection algorithm is proposed and based on the danger model. The danger model is built on a sensitive tissue (ST) which consists of a population of sensitive cells (SCs) that are abstracted from computer system, and such cells are very se...
Study on Commercial Bank Credit Risk Based on Information Asymmetry
Found in: Business Intelligence and Financial Engineering, International Conference on
By Chenghua Shi, Kui Zhang
Issue Date:July 2009
pp. 758-761
Credit risk is the main risk faced by the banking industry, so a lot of work has been done to reduce the losses caused by credit risk. The existing of information asymmetry is the root cause of commercial bank credit risk and is certainly a major cause. Cr...
A Temporal-domain Error Concealment Algorithm Effective in Motion Boundary Improvement
Found in: Computer Engineering and Technology, International Conference on
By De Fang Zhao, Sheng Rong Gong, Shu Kui Zhang
Issue Date:January 2009
pp. 252-255
In order to ease the motion boundary in temporal-domain algorithms, the paper propose to utilize the luminance of macro-block(MB) around the lost MB, to obtain a more precise and dense motion vectors, the rational function be used in motion vector interpol...
Combining Domain-Driven Approach with Requirement Assets for Networked Software Requirements Elicitation
Found in: International Conference on Semantic Computing
By Wei Liu, Ke-Qing He, Kui Zhang, Jian Wang
Issue Date:August 2008
pp. 354-361
Networked software(NS) is a service-oriented software application that is accessed via human-network interaction equipments. Owing to the characteristics(such as uncertainty, incompleteness, and evolution) of NS requirements, the requirements engineering f...
Prediction of Protein Function Using Protein-Protein Interaction Data
Found in: Computational Systems Bioinformatics Conference, International IEEE Computer Society
By Minghua Deng, Kui Zhang, Shipra Mehta, Ting Chen, Fengzhu Sun
Issue Date:August 2002
pp. 197
Assigning functions to novel proteins is one of the most important problems in the post-genomic era. Several approaches have been applied to this problem, including analyzing gene expression patterns, phylogenetic profiles, protein fusions and protein-prot...
A Methodology for Testing Intrusion Detection Systems
Found in: IEEE Transactions on Software Engineering
By Nicholas J. Puketza, Kui Zhang, Mandy Chung, Biswanath Mukherjee, Ronald A. Olsson
Issue Date:October 1996
pp. 719-729
<p><b>Abstract</b>—Intrusion Detection Systems (IDSs) attempt to identify unauthorized use, misuse, and abuse of computer systems. In response to the growth in the use and development of IDSs, we have developed a methodology for testing I...
Video coding using affine motion compensated prediction
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Kui Zhang, M. Bober, J. Kittler
Issue Date:May 1996
pp. 1978-1981
The aim in variable block size and object based video coding is to motion compensate as large regions as possible. Whereas the translational motion model is adequate to motion compensate small regions even if the image sequence involves complex motion, it ...
Distributed Topological Convex Hull Estimation of Event Region in Wireless Sensor Networks without Location Information
Found in: IEEE Transactions on Parallel and Distributed Systems
By Peng Guo,Jiannong Cao,Kui Zhang
Issue Date:March 2014
pp. 1
In critical event (e.g., fire or gas) monitoring applications of wireless sensor networks (WSNs), convex hull of the event region is an efficient tool in handling the usual tasks like event report, routes reconstruction and human motion planning. Existing ...
Design of Multivariable Self-Tuning PID Controllers via Quasi-diagonal Recurrent Wavelet Neural Network
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Kui Zhang, Xinyan An
Issue Date:August 2010
pp. 95-99
Multivariable PID controllers have recently emerged as a kind of convenient yet very powerful control technique for solving coupling nonlinear system. This article describes a new method for design of multivariable PID based on Quasi-Diagonal Recurrent Wav...
Using background memory for efficient video coding
Found in: Image Processing, International Conference on
By Kui Zhang, Josef Kittler
Issue Date:October 1998
pp. 944
In the majority of video conference applications, the camera position is fixed. The composition of the background of the scene is usually stationary. When the subject moves in the scene, some parts of the background may be occluded and some other parts of ...
Motion based image segmentation for video coding
Found in: Image Processing, International Conference on
By Kui Zhang, M. Bober, J. Kittler
Issue Date:October 1995
pp. 3476
A robust and stable scene segmentation is a prerequisite for the object based coding. Various approaches to this complex task have been proposed, including segmentation of optic flow, grey-level based segmentation or simple division of the scene into movin...
A navigation system based on a sensor network without exit and locations
Found in: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys '09)
By Kui Zhang, Peng Guo, Qian Zhang, Tao Jiang
Issue Date:November 2009
pp. 311-312
In the paper, we design a navigation system based on sensor network to guide a robot to walk out of event region. The navigation system does not require any exit or locations.
Query expansion using explicit semantic analysis
Found in: Proceedings of the 4th International Conference on Internet Multimedia Computing and Service (ICIMCS '12)
By Bo Meng, Jing Luo, Kui Zhang, Maofu Liu, Xinhui Tu
Issue Date:September 2012
pp. 123-126
Query expansion is a technique utilized within information retrieval to solve word mismatch between queries and document. In previous method, expansion words are usually selected by counting word co-occurrences in the documents. However, word co-occurrence...
Fast alarm broadcasting in critical event monitoring using wireless sensor networks
Found in: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys '10)
By Kui Zhang, Nirvana Meratnia, Paul Havinga, Peng Guo
Issue Date:November 2010
pp. 379-380
In mission-critical applications such as battlefield reconnaissance or industrial safety and security, a large number of sensor nodes are deployed in a large area to detect and report event related information to the end-users. When a critical event in the...
Dynamic programming algorithms for haplotype block partitioning: applications to human chromosome 21 haplotype data
Found in: Proceedings of the seventh annual international conference on Computational molecular biology (RECOMB '03)
By Fengzhu Sun, Kui Zhang, Michael S. Waterman, Ting Chen
Issue Date:April 2003
pp. 332-340
Recent studies have shown that the human genome has a haplotype block structure such that it can be divided into discrete blocks of limited haplotype diversity. Patil et al. [6] and Zhang et al. [12] developed algorithms to partition haplotypes into blocks...
Application of RBF Neural Network in Trajectory Planning of Robot
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Xiao-yue Wang, Zhong-kui Zhang, Bin Zhou
Issue Date:November 2009
pp. 493-496
Trajectory planning of robot is to control the Robot in order to accurately follow the target track. And the target trajectory is always high-order and nonlinear. But RBF neural network can be achieved from the input to the output of arbitrary nonlinear ma...
Research of RBF Neural Networks Algorithm to Fault Diagnosis of Rotary Machinery
Found in: Computer-Aided Software Engineering, International Workshop on
By Xiao-yue Wang, Zhong-kui Zhang
Issue Date:July 2009
pp. 331-334
In order to overcome the problems of slow rate of convergence, falling easily into local minimum, instability learning performance caused by initial value in BP algorithm, a new diagnosis method based on RBF neural networks was proposed. And the diagnosis ...
Optimization of Parameters of the Chemic Kinetic Model by Improved Genetic Algorithms
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Rui-feng Han, Yu-li Yang, Yong-kui Zhang
Issue Date:January 2009
pp. 211-214
Detailed kinetic model is one of the most important basic research items that the chemic synthesis techniques will have been commercialized from laboratory. A great breakthrough has been made in the detailed mechanistic kinetics of the chemic synthesis, bu...