Search For:

Displaying 1-50 out of 111 total
The Variance of Nitrate Nitrogen in Groundwater of Intensive Agricultural Region in Daxing District from 2005 to 2011
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Peng Li,Cheng-Jun Zhang,Tong-Ke Zhao,Bao-Cun Liu,Xin-Rong Li,Jin-Feng Yang,Wen-Juan Li
Issue Date:May 2012
pp. 1854-1857
The groundwater sampling and nitrate nitrogen testing were carried out for 13 times from 2005 to 2011 in order to investigate the nitrate nitrogen dynamic change of groundwater in the intensive agricultural area of Daxing district and explore its control c...
Human Action Recognition from Boosted Pose Estimation
Found in: Digital Image Computing: Techniques and Applications
By Li Wang, Li Cheng, Tuan Hue Thi, Jian Zhang
Issue Date:December 2010
pp. 308-313
This paper presents a unified framework for recognizing human action in video using human pose estimation. Due to high variation of human appearance and noisy context background, accurate human pose analysis is hard to achieve and rarely employed for the t...
Finding Distinctive Shape Features for Automatic Hematoma Classification in Head CT Images from Traumatic Brain Injuries
Found in: 2013 IEEE 25th International Conference on Tools with Artificial Intelligence (ICTAI)
By Tianxia Gong,Nengli Lim,Li Cheng,Hwee Kuan Lee,Bolan Su,Chew Lim Tan,Shimiao Li,C.C. Tchoyoson Lim,Boon Chuan Pang,Cheng Kiang Lee
Issue Date:November 2013
pp. 242-249
Computer aided diagnosis (CAD) in medical imaging is of growing interest in recent years. Our proposed CAD system aims to enhance diagnosis and prognosis of traumatic brain injury (TBI) patients with hematomas. Hematoma caused by blood vessel rupture is th...
Circular histogram thresholding for color image segmentation
Found in: Document Analysis and Recognition, International Conference on
By Din-Chang Tseng, Yao-Fu Li, Cheng-Tan Tung
Issue Date:August 1995
pp. 673
A circular histogram thresholding for color image segmentation is proposed. A circular hue histogram is first constructed based on a UCS (I,H,S) color space. The histogram is automatically smoothed by a scale-space filter, then transformed into traditional...
Comparison of Inhibitory Effects of Nine Flavonoids on Prostaglandin E2 Production and COX-2 Expression in LPS-Stimulated RAW264.7 Macrophages
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Yirong Xu,Changlu Wang,Longyan Wu,Zhenjing Li,Mianhua Chen,Yurong Wang,Fengjuan Li,Cheng Luo
Issue Date:May 2012
pp. 981-984
Prostaglandin E2 (PGE2) has a crucial role in inflammation and is synthesized by cyclooxygenase-2 (COX-2), of which the expression is induced in inflammatory site by inflammatory stimuli like lipopolysaccharide (LPS). In the present study, nine flavonoids ...
Predicting Pareto Dominance in Multi-objective Optimization Using Pattern Recognition
Found in: Intelligent System Design and Engineering Application, International Conference on
By Guanqi Guo,Wu Li,Bo Yang,Wenbin Li,Cheng Yin
Issue Date:January 2012
pp. 456-459
A method of predicting Pareto dominance in multi-objective optimization using pattern recognition, and the framework of Pareto dominance classifier are proposed. A kind of Bayesian classifier is preliminarily implemented. It is used to predict Pareto domin...
CCD Infrared Image Segmentation Using Watershed Algorithm
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Cheng, Li Yan, Fan Shangchun
Issue Date:January 2011
pp. 680-683
In recent years, the watershed line has emerged as a primary tool of mathematical morphology for image segmentation, though the application of watershed algorithms to an image is often disappointing. Based on the mathematical morphology, this paper develop...
Human Action Recognition and Localization in Video Using Structured Learning of Local Space-Time Features
Found in: Advanced Video and Signal Based Surveillance, IEEE Conference on
By Tuan Hue Thi, Jian Zhang, Li Cheng, Li Wang, Shinichi Satoh
Issue Date:September 2010
pp. 204-211
This paper presents a unified framework for human actionclassification and localization in video using structuredlearning of local space-time features. Each human actionclass is represented by a set of its own compact set of localpatches. In our approach, ...
Weakly Supervised Action Recognition Using Implicit Shape Models
Found in: Pattern Recognition, International Conference on
By Tuan Hue Thi, Li Cheng, Jian Zhang, Li Wang, Shinichi Satoh
Issue Date:August 2010
pp. 3517-3520
In this paper, we present a robust framework for action recognition in video, that is able to perform competitively against the state-of-the-art methods, yet does not rely on sophisticated background subtraction preprocess to remove background features. In...
Human Body Articulation for Action Recognition in Video Sequences
Found in: Advanced Video and Signal Based Surveillance, IEEE Conference on
By Tuan Hue Thi, Sijun Lu, Jian Zhang, Li Cheng, Li Wang
Issue Date:September 2009
pp. 92-97
This paper presents a new technique for action recognition in video using human body part-based approach, combining both local feature description of each body part, and global graphical model structure of the human action. The human body is divided into e...
Efficient Occlusion Culling with Occupancy Proportion
Found in: Computer Science and Software Engineering, International Conference on
By Bo Li, Cheng Wang, Lijun Li
Issue Date:December 2008
pp. 1058-1061
Visibility culling is a fundamental problem in computer graphics. By combining object-space coherence with image-space coherence, this paper presents a novel algorithm for speeding up complex models rendering. The algorithm is based on the new concept of o...
The Segmentation of the Air Cargo Customers Based on Business Intelligence
Found in: Intelligent Computation Technology and Automation, International Conference on
By Hong Wang, Hong-yan Li, Cheng Li
Issue Date:October 2008
pp. 784-788
On the condition of limited resources, businesses should put the resources on those profitable customers. So it is necessary to carry out the customer segmentation, especially for the air cargo industry being in the fierce competition. Drawing on the theor...
An E-Learning System Model Based on Affective Computing
Found in: Cyberworlds, International Conference on
By Lan Li, Li Cheng, Kun-xi Qian
Issue Date:September 2008
pp. 45-50
The fact that emotion deficiency in e-Learning system will debase the study efficiency has attracted more and more attention of education technologists. Based on affective computing technology---- facial expression recognition and posture recognition, a ne...
Discriminative human action segmentation and recognition using semi-Markov model
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Qinfeng Shi, Li Wang, Li Cheng, Alex Smola
Issue Date:June 2008
pp. 1-8
Given an input video sequence of one person conducting a sequence of continuous actions, we consider the problem of jointly segmenting and recognizing actions. We propose a discriminative approach to this problem under a semi-Markov model framework, where ...
Variable-latency adder (VL-adder): new arithmetic circuit design practice to overcome NBTI
Found in: Low Power Electronics and Design, International Symposium on
By Yiran Chen, Hai Li, Jing Li, Cheng-Kok Koh
Issue Date:August 2007
pp. 195-200
Negative bias temperature instability (NBTI) has become a dominant reliability concern for nanoscale PMOS transistors. In this paper, we propose variable-latency adder (VL-adder) technique for NBTI tolerance. By detecting the circuit failure on-the-fly, th...
An Improved Migration Strategy of Mobile Agent
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jian-pei Zhang, Jun Ma, Jing Yang, Li-li Cheng
Issue Date:August 2007
pp. 577-581
Mobile agent migrates to several hosts for completing its task. Migration strategy is responsible for planning out an optimal migration path, which ensures mobile agent to accomplish its task correctly and efficiently. In this paper, the concept of migrati...
A Stable Hierarchical Peer-to-Peer Overlay for Scale Free Networks
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Wen-xiang Li, Cheng-cheng Guo
Issue Date:April 2009
pp. 692-695
To deal with problems such as load imbalance, topology mismatch and network instability for P2P systems, propose the method of implementing the functions of message routing and service index maintenance on different layers. Design algorithms for building c...
LASS: Local-Activity and Social-Similarity Based Data Forwarding in Mobile Social Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Zhong Li,Cheng Wang,Siqian Yang,Changjun Jiang,Xiangyang Li
Issue Date:February 2014
pp. 1
This paper aims to design an efficient data forwarding scheme based on local activity and social similarity for mobile social networks (MSNs). Various definitions of social similarity have been proposed as the criterion for relay selection, which results i...
A Diffusing Path Planning Mechanism for Marketing Information Propagation over Social Media
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Yung-Ming Li,Cheng-Yang Lai
Issue Date:January 2013
pp. 2863-2871
Social media are gaining importance as a component of marketing strategies. Many of them, such as social networking site, blogosphere, and micro-blogosphere, have been seeking business opportunities and establishing brand expression in recent years. Online...
Dynamic Modeling of Pressure Pipelines and Signal Reconstruction
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Yang Jun,Wang Yufang,Li Cheng
Issue Date:October 2011
pp. 78-81
In order to improve the dynamic pressure measurement's accuracy with pressure pipelines, the dynamic modeling of equal diameter pressure pipelines and signal reconstruction were studied. Through the theoretic analysis, dynamic calibration with SPG and para...
A Comprehensive Quality Evaluation System for Coordinate Transformation
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Hui Li, Cheng Zhong, Zhi Zhang
Issue Date:September 2010
pp. 15-20
Studies on quality evaluation of coordinate transformation have not yet to comprehensively investigate the simulation ability and reliability of a transformation. This paper presents a comprehensive quality evaluation system (QES) for coordinate transforma...
The Determination of Optimal Excess Air Coefficient Based on Data Mining in Power Plant
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jian-qiang Li, Cheng-lin Niu, Jun-jie Gu, Ji-zhen Liu
Issue Date:October 2008
pp. 384-388
Coal-fired boiler combustion system in power plant is a complex multi-input and multi-output plant with strong nonlinear and large time-delay. The determination of the optimal excess air coefficient is very important for economical analysis and operation o...
A Layout-Aware Test Methodology for Silicon Interposer in System-in-a-Package
Found in: 2013 22nd Asian Test Symposium (ATS)
By Katherine Shu-Min Li,Cheng-You Ho,Ruei-Ting Gu,Sying-Jyan Wang,Yingchieh Ho,Jiun-Jie Huang,Bo-Chuan Cheng,An-Ting Liu
Issue Date:November 2013
pp. 159-164
This paper presents a novel scheme for silicon interposer testing. Testing interpose is difficult due to the large number of nets to be tested and small number of test access ports. Previous methods can only achieve limited fault coverage for open faults. ...
Special session 4C: Hot topic 3D-IC design and test
Found in: 2013 IEEE 31st VLSI Test Symposium (VTS)
By Jin-Fu Li,Cheng-Wen Wu,Cheng-Wen Wu,Masahiro Aoyagi,Meng-Fan Marvin Chang,Ding-Ming Kwai
Issue Date:April 2013
pp. 1
Three-dimensional (3D) integration using through silicon via (TSV) is a promising approach to coping with the challenges faced by the current 2D technology. A TSV-based 3D IC is implemented by stacking multiple dies which are vertically connected by TSVs. ...
A Portable Feather-Weight Java-Based Graphic Library for Embedded Systems on Java Processor
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Pang-Chieh Wang, Chin-Yang Lin, Cheng-Liang Lin, Yi-Fang Li, Cheng-Kai Yang, Ting-Wei Hou
Issue Date:September 2009
pp. 998-1001
This research tries to improve the portability of Java AWT(Abstract Window Toolkit) for embedded systems. We want to have a new graphic library which is easier to port than current AWT and to shorten the porting time. The proposed graphic library consists ...
On 2D-Imaging Algorithm for Underwater Target in Near-Field
Found in: Image and Signal Processing, Congress on
By Ming-min Zhang, Guang-li Cheng, Guo-jun Xu, Cheng-yuan Liu
Issue Date:May 2008
pp. 791-795
In the imaging algorithms of Inverse Synthetic Aperture Sonar (ISAS), Range-Doppler Algorithm (RDA) and Polar Formation Algorithm (PFA) can be only suitable for far-field imaging. For obtaining near-field imaging, Computed Tomography Algorithm (CTA) is int...
Identifying the Combination of Genetic Factors that Determine Susceptibility to Cervical Cancer
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Jorng-Tzong Horng, Kai-Chih Hu, Li-Cheng Wu, Hsien-Da Huang, Horn-Cheng Lai, Ton-Yuen Chu
Issue Date:May 2004
pp. 325
Cervical cancer is common among women all over the world. Although infection with high-risk types of human papillomavirus (HPV) has been identified as the primary cause of cervical cancer, only some of those infected go on to develop cervical cancer. Obvio...
StereoPasting: Interactive Composition in Stereoscopic Images
Found in: IEEE Transactions on Visualization and Computer Graphics
By Ruo-Feng Tong, Yun Zhang, Ke-Li Cheng
Issue Date:August 2013
pp. 1375-1385
We propose
Performance of Coexisted WiFi and ZigBee Networks
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)
By Yue Tao, Xiang-Yang Li, Cheng Bo
Issue Date:July 2013
pp. 315-320
We proposed a method for precisely monitoring the impact of WiFi networks on Zigbee networks. We utilized the characteristic of Zigbee that when working in lower transmit power, the interference will be reflected on the packet payload as corrupted bytes. C...
Vegetation Extraction Based on the Visual Characteristics of Plants from Remote Sensing Image
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Chen Renxi,Li Cheng,Wang Chengfang
Issue Date:July 2013
pp. 243-247
In urban planning, the measure and mapping of the green vegetation play an important role. On high resolution remote sensing images, the vegetation can be extracted accurately without any priori knowledge by using the tone characteristics of the image itse...
The IG-Ferry Protocol to Support Efficient Controlled Replication in Vehicular Delay Tolerant Network
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Ing-Chau Chang,Chien-Hsun Li,Cheng-Fu Chou
Issue Date:September 2012
pp. 314-321
In the past, we have proposed an intersection graph (IG)-based vehicular ad hoc network (VANET) architecture for efficient unicast communication in the city urban. Thus, the source vehicle can leverage the proposed IG and IG bypass routing protocols to gre...
Cloud Computing for Agent-Based Urban Transportation Systems
Found in: IEEE Intelligent Systems
By ZhenJiang Li, Cheng Chen, Kai Wang
Issue Date:January 2011
pp. 73-79
<p>Agent-based traffic management systems can use the autonomy, mobility, and adaptability of mobile agents to deal with dynamic traffic environments. Cloud computing can help such systems cope with the large amounts of storage and computing resource...
Experimental Analysis of Acoustic Transmission Characteristics along the Periodic Simulated Drillstring
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Cheng, Ding Tianhuai
Issue Date:January 2011
pp. 104-107
Real-time data collection about the drilling process is an effective way of improving the drilling efficiency. Drill string acoustic telemetry is an alternative wireless transmission method to retrieve down hole data. A time-domain analysis algorithm for d...
Multiple-layer Quantum-behaved Particle Swarm Optimization and Toy Model for Protein Structure Prediction
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Li Cheng-yuan, Ding Yan-rui, Xu Wen-bo
Issue Date:August 2010
pp. 92-96
Protein structure prediction, known as an NP-complete problem, is one of the basic problems in computational biology. To get an efficiency approach of protein structure prediction with Toy model, a new algorithm structure based on quantum-behaved particle ...
Modified PCNN Model and Its Application to Mixed-Noise Removal
Found in: Innovative Computing and Communication and Asia-Pacific Conference on Information Technology and Ocean Engineering, International Conference on
By Kai He, Shao-Fa Li, Cheng Wang
Issue Date:January 2010
pp. 213-216
Pulse coupled neural networks (PCNN) model is a bionic system. It emulates the behavior of visual cortical neurons of cats and has been extensively applied in image processing. We proposed an adaptive mixed-noise removal algorithm, in this paper, based on ...
The Analysis and Design for Platform of Managerial Integration in Product Innovation
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Guo Mugeng, Li Cheng Biao
Issue Date:December 2009
pp. 413-416
The managerial integration is trend of development of management in product innovation. The platform of managerial integration is an important supporting technology in implementing managerial integration. Firstly, the concept of platform of managerial inte...
Research on Ecological Reconstruction of Subsided Land in Mining Area Based on Location Theory Taking Pingdingshan City as a Case
Found in: Environmental Science and Information Application Technology, International Conference on
By Liu Guiming, Li Cheng, Wang Hongzhi, Wu Liping
Issue Date:July 2009
pp. 293-296
The subsided land of mining area is not only the land and ecological environment damage caused by the exploit of mineral resources but the very important land resource to sustainable development of the Resource-based cities. A view is put forward that the ...
Trust Similarity Measure in Trust Model for P2P Networks
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai
Issue Date:December 2008
pp. 107-112
Trust and reputation have become important research topics in P2P networks. Traditional researches can hardly adaptable to each separate peer's needs and preferences which are common concern in trust and reputation system. This paper proposes two methods o...
Isolation, Identification and Degradation Characterization of p-Chlorophenol Degrading Strain
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Zhaoxia Li, Cheng Ding, Jinglong Yan, Chunmin Huang
Issue Date:December 2008
pp. 293-297
A bacterium(strain ycsd03) capable of growing with p-chlorophenol(p-CP) as sole carbon and energy sources was isolated from rhizosphere soil in phragmites wetland by using the enrichment culture contaminated with p-CP concentration gradient of 20, 40, 80, ...
Energy Loss Analysis Based on Fuzzy Association Rule Mining in Power Plant
Found in: Computational Intelligence and Design, International Symposium on
By Jian-qiang Li, Cheng-lin Niu, Jun-jie Gu, Ji-zhen Liu
Issue Date:October 2008
pp. 186-189
The rational determination of operation optimization values is very important to economical analysis and operation optimization in power plant. Based on the correlation of operation data, the economical analysis and operation optimization based on data min...
The Application of Data Mining in Electric Short-Term Load Forecasting
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jian-qiang Li, Cheng-lin Niu, Ji-zhen Liu, Jun-jie Gu
Issue Date:October 2008
pp. 519-522
Load forecasting is very important for electrical companies since it permits the system operator, the planning, the distribution and the control of the electrical energy supplied to customers. Electric load is affected by many uncertain factors, so many fa...
A Fair Channel Scheduling Algorithm in Optical Burst-Switched Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Ching-Fang Hsu, Li-Cheng Yang, Ke-Kuan Hsu
Issue Date:March 2008
pp. 78-83
Among various signaling protocols designed for OBS networks, the most popular one is Just-Enough-Time (JET) protocol. JET can utilize the network capacity efficiently and reduce end-to-end transmission delay effectively. However, it may suffer from an intr...
Design of a Certifying Compiler Supporting Proof of Program Safety
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Yiyun Chen, Lin Ge, Baojian Hua, Zhaopeng Li, Cheng Liu
Issue Date:June 2007
pp. 127-138
Safety is an important property of high-assurance software, and one of the hot research topics on it is the verification method for software to meet its safety policies. In our previous work, we designed a pointer logic system and proposed a framework for ...
Forestry Scene Geometry Estimation Via Statistical Learning
Found in: Computer Vision and Pattern Recognition Workshop
By Li Cheng, Terry Caelli
Issue Date:July 2004
pp. 103
In the context of a forest inventory application, given preprocessing of the 2D airborne images of a forest plot, we focus on estimating the parameters which control the 3D geometry of trees, in order to generate a virtual forest. The major contribution of...
Impact of Data Compression on Energy Consumption of Wireless-Networked Handheld Devices
Found in: Distributed Computing Systems, International Conference on
By Rong Xu, Zhiyuan Li, Cheng Wang, Peifeng Ni
Issue Date:May 2003
pp. 302
We investigate the use of data compression to reduce the battery consumed by handheld devices when downloading data from proxy servers over a wireless LAN. To make a careful trade-off between the communication energy and the overhead to perform decompressi...
Discovering Influential Nodes for Viral Marketing
Found in: Hawaii International Conference on System Sciences
By Yung-Ming Li, Cheng-Yang Lai, Chia-Hao Lin
Issue Date:January 2009
pp. 1-10
High cost and uncertainty are problems of marketing. Influential online product reviews are more powerful than firm's advertisements. The key of viral marketing is to discover the viruses for efficiently spreading product impressions. In this paper, a mode...
Software Sensor Based on Aspect Recombination for Avionics System
Found in: Information Science and Engineering, International Conference on
By Gang Li, Cheng-Lie Du, Cui-Ye Song, Xiao-Bin Cai
Issue Date:December 2009
pp. 3851-3853
The major approaches to monitor the software environment is software sensor. This paper proposed a kind of software sensor, which is based on environment-aware. Considering the efficiency of the sensor monitoring, we made the identification of concern poin...
Efficient Hand Pose Estimation from a Single Depth Image
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Chi Xu,Li Cheng
Issue Date:December 2013
pp. 3456-3462
We tackle the practical problem of hand pose estimation from a single noisy depth image. A dedicated three-step pipeline is proposed: Initial estimation step provides an initial estimation of the hand in-plane orientation and 3D location, Candidate generat...
Experimental Study of Paddy Field Used for Farming and Aquiculture
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Da-Wen Ma,Ya-Bin Tang,Ji-Hong Duan,Chong Yi,Xian-Li Cheng,Xun-Wei Wang,Ren-Xiang Ding
Issue Date:January 2013
pp. 733-735
The technology of raising the aquatic products in the paddy field is to promote the natural resources proliferation, to protect the natural rice paddy field productivity, to restore the ecology of the paddy fields, to ensure safety and quality rice product...
EVT-based Risk Measurement of Ownership-Thematic Investment in China
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Xuchao Li,Chengli Zheng
Issue Date:August 2012
pp. 186-190
To model Chinese ownership-thematic investment, EVT (Extreme Value Theory) is applied in this paper with examples of three typical stock indexes. To characterize the distribution of the selected indexes, POT (Peaks Over Threshold) model is utilized to fit ...
 1  2 Next >>