Search For:

Displaying 1-50 out of 227 total
A Multipath Routing Algorithm Based on OSPF Routing Protocol
Found in: 2012 Eighth International Conference on Semantics, Knowledge and Grids (SKG)
By Li Lan,Li Li,Chen Jianya
Issue Date:October 2012
pp. 269-272
Currently, the Internet has become an significant part of the global communication infrastructure. With more and more new services emerging, the current IP network may not satisfy the user demands in the future. At present, most routing scheme typically ro...
An Optical Affine Transform Based on MEMS Optical Cross-Connect
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Tian Fengchun, Li Xian li, Chen Jian jun, Li Peng, Li Can
Issue Date:September 2010
pp. 588-593
The two-dimensional optical affine transform is studied in this paper. Conventional optical affine transform is implemented by dove prisms, mirrors, and zoom lens,with the shortage of experimental adjustment difficulties, low accuracy, poor flexibility and...
A New Method to Compute Chinese Text Concept
Found in: Education Technology and Computer Science, International Workshop on
By Feng Yang, Luo Sen-Lin, Pan Li-Min, Liu Li-Li, Chen Kai-Jiang
Issue Date:March 2010
pp. 59-62
a new method to compute Chinese text concept is proposed in this paper. In this method, we construct sentence vectors from the text by extracting and quantifying some syntax and semantic features such as concept elements, dependent relations and correlativ...
Design of Microsecond Level and High Current Pulse Driver Systems for Quantum Cascade Lasers
Found in: Electrical and Control Engineering, International Conference on
By Lei Li, Chen Chen, Hai Yu, Chengjun Dong, Yiding Wang
Issue Date:June 2010
pp. 3587-3589
This paper presents a microsecond, high current pulse generator to drive quantum cascade lasesrs. The driver systems consist of pulse generator; power amplifier; fast switches and constant current supply circuits. The pulse width and pulse repetition rate ...
Research and Application on Application-Oriented Event-Based Middleware of WSNs
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Qingfeng Li, Chen Li, Jifang Shi
Issue Date:April 2010
pp. 498-501
As an emerging technology, Wirless Sensor Networks have attracted wide attention. But the development of its application system demands solutions provided by the appropriate middlewares. Addressing the current demand in WSNs appplication system and to meet...
Toward Perception-Based Image Retrieval
Found in: Content-Based Access of Image and Video Libraries, IEEE Workshop on
By Edward Y. Chang, Beitao Li, Chen Li
Issue Date:June 2000
pp. 101
Since a content-based image retrieval (CBIR) system services people, its image characterization and similarity measure must closely follow perceptual characteristics. In this study, we enumerate a few psychological and physiological invariants and show how...
Application of System Dynamics to Strategic Project Management
Found in: Information Science and Engineering, International Conference on
By Lei Li, Chen Zhang, Hong-min Li
Issue Date:December 2009
pp. 4774-4777
This paper discusses the two approaches to project management: operational project management and strategic project management, where alignment of the management at the two levels is of great concern. As is generally accepted, traditional project managemen...
A Latency-Hiding Algorithm for ABMS on Parallel/Distributed Computing Environment
Found in: 2012 ACM/IEEE/SCS 26th Workshop on Principles of Advanced and Distributed Simulation (PADS)
By Li-li Chen,Jian-xin Huang,Jing Zhang
Issue Date:July 2012
pp. 187-189
A latency-hiding algorithm for the parallelization of large scale agent-based model simulations (ABMS) on parallel/distributed computing platform is proposed. The key idea of this algorithm is using redundant computations to hide communication latencies. A...
Preparation and Property Analysis of Hydrophobic Zinc Oxide Films
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Chen, Li Min
Issue Date:January 2011
pp. 910-913
In this research, zinc oxide films were prepared on glass substrates by hydrothermal synthesis and metal-organic chemical vapor deposition (MOCVD) respectively. A nanostructured layer of flurocarbon compounds with low surface energy was formed on the films...
Constructed Landscaping Combination Constructed Wetlands System Used for Sewage Treatment
Found in: Digital Manufacturing and Automation, International Conference on
By Yong-hua Chen, Xiao-fu Wu, Ming-li Chen, Jing Yao, Ke-lin Li, Zhong-cheng Wang, Dian Lei
Issue Date:December 2010
pp. 430-433
We constructed a combinant landscape constructed wetland for sewage treatment based on landscape plants in this study. The results are summerized as follows: the system uses model as: A(biological pretreatment pond)-B(biochemistry pond)- C(subsurface flow ...
A Systematic Method Based on Haplotype Analysis: Application to Risk Alleles and Genes Mining for RA
Found in: International Conference on Natural Computation
By Rui-jie Zhang, Yong-shuai Jian, Gui-you Liu, Zhen Wang, Xia Li, Zhi-qiang Chen, Jin Li, Chen Huang
Issue Date:October 2008
pp. 39-43
In this study, we developed a systematic method to find risk alleles and relative gene for Rheumatoid Arthritis (RA). The method consists of three steps: 1) genome-wide case-control association studying based on haplotypes; 2) genome-wide association mappi...
Biomarker Identification by Knowledge-Driven Multi-Level ICA and Motif Analysis
Found in: Machine Learning and Applications, Fourth International Conference on
By Li Chen, Chen Wang, Ie-Ming Shih, Tian-Li Wang, Zhen Zhang, Yue Wang, Robert Clarke, Eric Hoffman, Jianhua Xuan
Issue Date:December 2007
pp. 560-566
Many statistical methods often fail to identify biologically meaningful biomarkers related to a specific disease under study from expression data alone. In this paper, we develop a novel strategy, namely knowledge-driven multi-level independent component a...
Mining Process Models from Event Logs in Distributed Bioinformatics Workflows
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Jianchuan Xing, Zhishu Li, Yanhong Cheng, Feng Yin, Baolin Li, Li Chen
Issue Date:November 2007
pp. 8-12
Designing a workflow is a complicated process, and there are discrepancies between the actual workflow processes and the ideal processes. So we have researched how to discover workflow models, and we have applied the techniques to distributed bioinformatic...
Implementation and Research on EHW-based Digital Chip Using Handel-C Language
Found in: International Conference on Natural Computation
By Qian-sheng Fang, Yi Yang, Wan-li Chen, Li-jun Wang
Issue Date:August 2007
pp. 624-628
When conventional Electronic Design Automation (EDA) technology is used to design digital chip, there are many stubborn difficulties such as being unable to automatically repair if hardware malfunctions, being lack of adaptation etc. However, Evolvable Har...
Research on the orientation of Tianjin's logistics industry in economic circle around Bo Sea
Found in: International Conference on Services Systems and Services Management
By Wan Jie, Li Li, Chen Jingwu
Issue Date:June 2005
pp. 411-416 Vol. 1
The logistics industry has been growing from strength to strength since China started implementing a market economy. China's logistics industry is still at a nascent stage. But it is fortunate that China have started to reform its old circulation system an...
Generating explicit communication from shared-memory program references
Found in: SC Conference
By Li, Chen
Issue Date:November 1990
pp. 865-876
The authors address the problem of data distribution and communication synthesis in generating parallel programs targeted for massively parallel distributed-memory machines. The source programs can be sequential, functional, or parallel programs based on a...
A Preliminary Study on GMM Weight Transformation for Emotional Speaker Recognition
Found in: 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction (ACII)
By Li Chen, Yingchun Yang
Issue Date:September 2013
pp. 31-36
The performance of speaker recognition system degrades when the emotional states are inconsistent during the enrollment and evaluation stage. Emotional GMM model synthesis, such as NEGT (Neutral-Emotional GMM mean Transformation), is one way to reduce this...
Design of Rich Client Web Architecture Based on HTML5
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Li-Li Chen,Zheng-Long Liu
Issue Date:August 2012
pp. 1009-1012
HTML5 is a great development of Web standard in nearly more than 10 years. It provides a powerful support for RIA(Applications of Rich Internet).Based on a comparison with other rich client technologies, a rich client Web architecture based on HTML5 is pro...
A Survey on Methods of Automatic Protocol Reverse Engineering
Found in: Computational Intelligence and Security, International Conference on
By XiangDong Li,Li Chen
Issue Date:December 2011
pp. 685-689
Protocol reverse engineering is necessary for many security applications, and has been an important and active research topic. This paper makes a survey on automatic protocol reverse engineering, especially on the goals, methods, tools and their achievemen...
A Well-Balanced Time Warp System on Multi-Core Environments
Found in: Parallel and Distributed Simulation, Workshop on
By Li-li Chen,Ya-shuai Lu,Yi-ping Yao,Shao-liang Peng,Ling-da Wu
Issue Date:June 2011
pp. 1-9
The current trend in processor architecture design is the integration of multiple cores on a single processor. This trend has shifted the burden of improving program execution speed from chip manufacturers to software developers. Thus, in the software doma...
Augmenting Chinese Online Video Recommendations by Using Virtual Ratings Predicted by Review Sentiment Classification
Found in: Data Mining Workshops, International Conference on
By Weishi Zhang, Guiguang Ding, Li Chen, Chunping Li
Issue Date:December 2010
pp. 1143-1150
In this paper we aim to resolve the recommendation problem by using the virtual ratings in online environments when user rating information is not available. As a matter of fact, in most of current websites especially the Chinese video-sharing ones, the tr...
Poor-quality Groundwater Exploitation and Utilization
Found in: Challenges in Environmental Science and Computer Engineering
By Ye Chun-he, Zhao Gui-lan, Xing Li-ting, Liu Li, Chen Shi-lei
Issue Date:March 2010
pp. 424-426
Social and economic sustainable development is restricted by shortage of water resources in northern China, environmental geological problems which induced by groundwater over-extraction. In this essay, an assessment method of groundwater allowable withdra...
Dynamic Characteristics Identification of Magnetic Rheological Damper Based on Neural Network
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By En-li Chen, Chun-di Si, Ming-ming Yan, Bing-yu Ma
Issue Date:November 2009
pp. 525-529
Magnetic rheological (MR) damper, as today's new semi-active control device, is widely used in vibration control engineering. However, in most control methods the controller's dynamic characteristics need to be known in advance. Because of highly nonlinear...
Implementation of Web-Based Fault Diagnosis Using Improved Fuzzy Petri Nets
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Li Chen, Hongyu Tan, Shujiang Li
Issue Date:August 2009
pp. 460-464
According to the current application and maintenance situation of numerical control equipment (NCE), a novel remote fault diagnosis expert system is designed to prevent fault occurrence and quicken the recovering process by online real-time monitoring the ...
Surface Inspection System of Steel Strip Based on Machine Vision
Found in: Database Technology and Applications, International Workshop on
By Bo Tang, Jian-yi Kong, Xing-dong Wang, Li Chen
Issue Date:April 2009
pp. 359-362
The traditional surface quality inspection of steel strip is carried by human inspectors, which is far from satisfactory because of its low productivity, low reliability and poor economy. It is a promising way to inspect surface quality of steel strip base...
An Intrusion Detection Method Based on Outlier Ensemble Detection
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Bin Huang, Wen-fang Li, De-li Chen, Liang Shi
Issue Date:April 2009
pp. 600-603
In this paper, we try to bring the concept of Ensemble into Outlier Detection. Two Outlier mining algorithms are ensembled: one based on similar coefficient sum and the other based on Kernel Density. An anomaly detection approach based on Voting Mechanism ...
A Multi-Party Contract Signing Protocol and its Formal Analysis in Strand Space Model
Found in: Education Technology and Computer Science, International Workshop on
By Xiangdong Li, Zhenyu Wang, Li Chen, Qingxian Wang
Issue Date:March 2009
pp. 556-559
Difficulties in designing multi-party contract signing (MPCS) protocols include providing concise and efficient protocols and at the same time keeping the protocols fair and abuse-free. This paper proposed an optimistic MPCS protocol. The number of rounds ...
Modeling and Simulation of Pre-compressed Multilayered Corrugated Board during Impact
Found in: Computer Modeling and Simulation, International Conference on
By Li Chen, ShengLing Xiao, YaoXiang Li, ShiZhou You
Issue Date:February 2009
pp. 143-146
This paper studied the physical properties of multilayered corrugated board, fully considering the air-flow of flute influence on its properties. Built up the theoretical model of pre-compressed multilayered corrugated board. Used MATLAB/simulink software ...
The Allocation Models Study on Materials Distribution Center under the Least Cost and the Shortest Time
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Wang Li Li, Chen Yunxiang
Issue Date:December 2008
pp. 53-56
Distribution center is a bridge connecting providers and clients. It plays an important role in logistics system. This paper put forward the least cost and the shortest time allocation models of materials distribution center. The integrated measure allocat...
Analysis on Cyclic Multi-party Fair Exchange Protocols
Found in: Computer Science and Software Engineering, International Conference on
By Xiangdong Li, Qingxian Wang, Li Chen
Issue Date:December 2008
pp. 601-604
A multi-party fair exchange protocol allows several parties to exchange commodities in such a way that everyone gives an item away if and only if it receives an expected item in return. In this paper, we review an important cyclic multi-party fair exchange...
Automatic Implementation of Multi-partitioning Using Global Tiling
Found in: Parallel and Distributed Systems, International Conference on
By Lei Liu, Dingfei Zhang, Hengjie Li, Li Chen
Issue Date:December 2008
pp. 673-680
Strategies for partitioning an application’s data and computation play fundamental role in determining the efficiency of parallelization. This paper describes a sophisticated strategy for partitioning data and computation known as multi-partitioning, which...
Study on The Nonlinear Strategy of Inertia Weight in Particle Swarm Optimization
Found in: International Conference on Natural Computation
By Guo-Rong Cai, Shui-Li Chen, Shao-Zi Li, Wen-Zhong Guo
Issue Date:October 2008
pp. 683-687
Particle Swarm Optimization (PSO) as an efficient and powerful problem-solving strategy has been widely used, but the appropriate adjustment of its inertia weight usually requires a lot of time and labor. In this paper, a nonlinear variation strategy to in...
Research on Quantum Neural Networks and Its Convergence Property
Found in: International Conference on Natural Computation
By Li-liang Ding, Li Chen
Issue Date:October 2008
pp. 296-300
The training algorithm and the structure of quantum neural networks (QNN) that based on multilevel activation function are presented in this paper. Aiming at the influence of the activation function of output layer and the phenomenon of error saturation in...
Actuation Design of Two-Dimensional Self-Reconfigurable Robots
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Ming-Chiuan Shiu, Hou-Tsan Lee, Feng-Li Lian, Li-Chen Fu
Issue Date:June 2008
pp. 451-456
Self-reconfigurable robots have the ability to change the shape of multiple cooperative modules in the different working environment. One of the main difficulties in building the self-reconfigurable robots is the mechanical complexity and necessary number ...
Based on Forward Reference Object Transaction Identification Algorithm on Web Mining
Found in: Advanced Language Processing and Web Information Technology, International Conference on
By Li Chen, Zhishu Li, Shenggen Ju
Issue Date:August 2007
pp. 469-473
This paper puts forward a new transaction identification algorithm (TIFRO) in web mining, which is based on forward reference object. Firstly, TIFRO uses the maximal forward reference algorithm (MFR) to get the forward reference path, and then join a final...
Hohhot Plains Sustainable Utilization Evaluation of Groundwater
Found in: Digital Manufacturing and Automation, International Conference on
By Jiang Chen, ZongYu Chen, Li Chen
Issue Date:December 2010
pp. 802-804
Hohhot area as excessive exploitation of groundwater, the water level declining gradually, if not change this state of irrational exploitation may result in depletion of groundwater resources, groundwater drainage, land subsidence and other serious problem...
Computing Discrete Minimal Surfaces Using a Nonlinear Spring Model
Found in: Computing in Science and Engineering
By Yongquan Jiang, Li Chen, Qishu Chen, Qiang Peng, Jim X. Chen
Issue Date:November 2010
pp. 74-79
<p>A new algorithm can derive one or more minimal surfaces from an initial arbitrary surface with a fixed boundary.</p>
A Comprehensive Model for Evaluation of Carbon Footprint and Greenhouse Gages Emission in Household Biogas Plants
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Jie Zhou,Shubiao Wu,Wanqin Zhang,Changle Pang,Baozhi Wang,Renjie Dong,Li Chen
Issue Date:July 2012
pp. 30-35
Based on Life Cycle Assessment and other related methods, this paper introduced a comprehensive model for the evaluation of the carbon footprint and greenhouse gases emission in household biogas plants including nearly all the processes of the household bi...
PET: Probabilistic Estimating Tree for Large-Scale RFID Estimation
Found in: Distributed Computing Systems, International Conference on
By Yuanqing Zheng, Mo Li, Chen Qian
Issue Date:June 2011
pp. 37-46
Estimating the number of RFID tags in the region of interest is an important task in many RFID applications. In this paper we propose a novel approach for efficiently estimating the approximate number of RFID tags. Compared with existing approaches, the pr...
PAR: Partition-Annotate-Recommend Paradigm for Improved Accessibility in Digital Libraries
Found in: Management of e-Commerce and e-Government, International Conference on
By Qing Li, Chen Zhang, Jia Wang, Lili Zhao
Issue Date:October 2010
pp. 3-9
While navigation within complex information spaces is uneasy for all users, it is extremely difficult for visually impaired users who can not simply searching and browsing digital contents with a mouse. These users have to listen line by line using a scree...
Research on Cost Control of Sewage Treatment Engineering Based on Project Financing
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Li Chen-yang, Chen Hong-guang, Lv Fu-cai
Issue Date:December 2009
pp. 160-165
In this paper, through the analysis of the current development of Chinese sewage treatment industry, the BOT model is applied to operate the sewage treatment engineering. Because the sewage treatment engineering is a public infrastructure, it relies on the...
Data Association Algorithm for Passive Sensor System
Found in: Education Technology and Computer Science, International Workshop on
By Chen Hui, Liu Chao-rong, Li Chen
Issue Date:March 2009
pp. 970-974
This paper mainly study angle-measurement based data association algorithm to overcome the existing problems in the applications of traditional association approaches forbearing-only target locating and tracking system. By deeply analyzing different data a...
Research and Design on Personalized DL Based on J2EE
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Kang Haiyan, Li Chen
Issue Date:December 2008
pp. 527-531
From the angle of natural language processing, this paper analyses the architecture and core technologies of personalized digital library. It introduces matching strategy of document content representation and topic search. This matching strategy is a expa...
PSMP: A Fast Self-Healing and Self-Organizing Pervasive Service Management Protocol for Smart Home Environments
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Chun-Feng Liao, Ya-Wen Jong, Li-Chen Fu
Issue Date:December 2008
pp. 574-579
Current trends suggest that the smart home systems should be adaptive and robust. Many service-oriented architectures and discovery protocols for the smart home environments have been proposed to support on-line re-composition of home services in reaction ...
A Web Mining Based Measurement and Monitoring Model of Urban Mass Panic in Emergency Management
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Minglu Li, An Chen
Issue Date:October 2008
pp. 366-370
It is very important to discover the mass panic when city is in emergency. A traditional approach is to do a survey among urban mass, which would cost much time and money. In our opinion, a more suitable and effective approach is to do web-based investigat...
Efficient Identity Authentication Protocol and Its Formal Analysis
Found in: Computational Intelligence and Security Workshops, International Conference on
By Li Chen, Guixiang Zhang, Xiangdong Li
Issue Date:December 2007
pp. 712-716
The paper proposes an efficient identity authentication protocol for mobile commerce based on token. The proposed protocol needs fewer messages to authenticate identities of mobile users called as important entities in the foremost time, as well as session...
A Novel MAC Protocol for Wireless Ad Hoc Networks with Power Control
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Li Zhitang, Fan Jun, Nie Wei, Wang Li, Chen Yuan
Issue Date:April 2007
pp. 347-352
Issues such as the hidden and exposed terminal problems and limited traffic carrying capability still remain unsolved in wireless ad hoc networks. In this paper, we present a novel MAC protocol employing power control. Our design mainly focuses on alleviat...
Multi-stage beamforming codebook for 60GHz WPAN
Found in: Software Maintenance and Reengineering, European Conference on
By Li Chen, Ying Yang, Xiaohui Chen, Weidong Wang
Issue Date:August 2011
pp. 361-365
Beamforming(BF) based on codebook is regarded as an attractive solution to resolve the poor link budget of millimeter-wave 60GHz wireless communication. Because the number of the elements of antenna array in 60GHz increases, the beam patterns generated are...
Cell coverage analysis of existing network and advanced testbed network
Found in: Software Maintenance and Reengineering, European Conference on
By Xiaohang Chen, Li Chen, Bin Wang, Xin Zhang, Lijun Zhao, Peng Dong, Jia Kong
Issue Date:August 2011
pp. 864-869
This paper focuses on the cell coverage analysis of the existing network and the advanced testbed network, which is established by China Mobile Communication Corporation (CMCC) for simulation and testing. Since the cell coverage in testbed network is diffe...
The Factors Influencing the Contribution of Continuing Education toward Workforces' Professional Development and Human Capital Investment
Found in: Genetic and Evolutionary Computing, International Conference on
By Wen Ling-Yu, Chen Li-Chen
Issue Date:December 2010
pp. 477-480
Continuing education has become a way with which organization invests employees as human capital, and individual secures personal career and enhance professional development. Working people choose to return schools for either getting advanced degrees or en...
 1  2 Next >>