Search For:

Displaying 1-47 out of 47 total
An Efficient Real-Coded Genetic Algorithm for Numerical Optimization Problems
Found in: International Conference on Natural Computation
By Jianwu Li, Yao Lu
Issue Date:August 2007
pp. 760-764
This paper proposes an improved real-coded genetic algorithm(RCGA) with a new crossover operator and a new mutation operator. The crossover operator is designed, based on the evolutionary direction provided by two parents, the fitness ratio of two parents,...
A novel algorithm SF for mining attack scenarios model
Found in: E-Business Engineering, IEEE International Conference on
By Wang Li, Li Zhi-tang, Lei Jie, Li Yao
Issue Date:October 2006
pp. 55-61
Large volume of security data can overwhelm security managers and keep them from performing effective analysis and initiating timely response. Therefore, it is important to develop an advanced alert correlation system to reduce alert redundancy, intelligen...
A Novel Fuzzy Anomaly Detection Algorithm Based on Artificial Immune System
Found in: High Performance Computing and Grid in Asia Pacific Region, International Conference on
By Li Zhi-tang, Li Yao, Wang Li
Issue Date:December 2005
pp. 479-486
More and more intrusion detection systems were developed, but most of these systems have very poor accuracy. To overcome this problem, a self-adaptive anomaly detection system was developed using fuzzy detection anomaly algorithm with negative selection of...
Research on Benefits Distribution Model for Maintenance Partnerships of the Multi-core-Type MPN
Found in: Computing, Control and Industrial Engineering, International Conference on
By Shuili Yang, Taofen Li, Yao Yao
Issue Date:June 2010
pp. 158-161
In order to ensure the stable and sustainable growth of Mass Customization enterprises and modular production networks, a good partnership should be maintained, and a reasonable benefits distribution should be drawn up. Through studying the multi-core-type...
The Receiver Operational Characteristic for Binary Classification with Multiple Indices and Its Application to the Neuroimaging Study of Alzheimer's Disease
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Xia Wu, Juan Li,Napatkamon Ayutyanont,Hillary Protas,William Jagust,Adam Fleisher,Eric Reiman, Li Yao, Kewei Chen
Issue Date:January 2013
pp. 173-180
Given a single index, the receiver operational characteristic (ROC) curve analysis is routinely utilized for characterizing performances in distinguishing two conditions/groups in terms of sensitivity and specificity. Given the availability of multiple dat...
Contextual Hypergraph Modeling for Salient Object Detection
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Xi Li,Yao Li,Chunhua Shen,Anthony Dick,Anton Van Den Hengel
Issue Date:December 2013
pp. 3328-3335
Salient object detection aims to locate objects that capture human attention within images. Previous approaches often pose this as a problem of image contrast analysis. In this work, we model an image as a hyper graph that utilizes a set of hyper edges to ...
Evaluating the Valuable Rules from Different Experience Using Multiparty Argument Games
Found in: 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Li Yao,Junyi Xu,Jinyang Li,Xuetian Qi
Issue Date:December 2012
pp. 258-265
This paper proposes a dialectical analysis model for multiparty argument games to evaluate rules mined from different past experience, called Arena. This model transforms the multiparty argument games into two-party argument games using the ideas from the ...
Lossless and Content-Based Hidden Transmission for Biometric Verificaion
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Yinghua Lu, Xiaolu Li, Miao Qi, Jinsong Li, Yao Fu, Jun Kong
Issue Date:December 2008
pp. 462-466
This paper presents a novel lossless and content-based hidden transmission method of biometric images to improve the security and secrecy of biometric verification. Chaos is used to encrypt the watermark. The secret keys which called biokey are generated f...
The Value-Exploration of the Clinical Breast Diagnosis by Using Thermal Tomography
Found in: International Conference on Natural Computation
By Hao Zhang, Kai-Yang Li, Sheng-Rong Sun, Ying-Wen Wan, Xiao-li Yao, Xian-Lin Zhang
Issue Date:October 2008
pp. 138-142
In this paper, a thermal tomography method, which can deduce the temperature distribution of the inner heat source from the surface thermal map, is applied to the clinical breast diagnosis. With the comparison to the conventional mammography and ultrasound...
Exploration of Event-Evoked Oscillatory Activities during a Cognitive Task
Found in: International Conference on Natural Computation
By Qiang Zhang, Hua Li, Yan Zhao, Xinlu Liu, Hua Shu, Li Yao, Xiao-Jie Zhao
Issue Date:October 2008
pp. 37-41
Event related potential (ERP) is a kind of cognitive electroencephalogram (EEG) signal, which are directly related with cognitive task and average across EEG. However, the plentiful oscillatory activities evoked by various stimuli as well modulated by diff...
An Exploratory Study of Web Services on the Internet
Found in: Web Services, IEEE International Conference on
By Yan Li, Yao Liu, Liangjie Zhang, Ge Li, Bing Xie, Jiasu Sun
Issue Date:July 2007
pp. 380-387
Web services technology has received much attention in the last few years, and a lot of research efforts have been devoted to utilizing services on the Internet to fulfill consumers' requirements. However, little research has been done on the current statu...
A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS
Found in: Networking, Architecture, and Storage, International Conference on
By Ma Xiaojing, Li Zhitang, Li Yao, Zhang Jiping
Issue Date:July 2007
pp. 265-266
An efficient multicast key management in large dynamic group with preplanned eviction is MARKS in which one member's join or preplanned leave has no side effect on other members. The goal of this work is to expel a malicious receiver in MARKS scalablely. A...
A Fuzzy Anomaly Detection Algorithm for IPv6
Found in: Semantics, Knowledge and Grid, International Conference on
By Li Yao, Li ZhiTang, Liu Shuyu
Issue Date:November 2006
pp. 67
To accomplish the anomaly detection based on IPv6, genetic algo-rithm can used as a efficacious rules generation technology. We developed a fuzzy anomaly detection model for IPv6, using fuzzy detection anomaly algorithm with negative selection inspired by ...
An Image Hiding Method Based on Correlation Analysis and Image Fusion
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Liu Bin, Li Zhitang, Li Yao
Issue Date:December 2005
pp. 1049-1051
A multiple image hiding method for one secret image is proposed in this paper. First, different bit planes of a secret image are hided into different bit planes of those different open images by the technique of bit plane analysis. Second, employing image ...
A Modified LS Conjugate Gradient Method and Its Global Convergence
Found in: Computational Sciences and Optimization, International Joint Conference on
By Can Li, Yao Long
Issue Date:April 2011
pp. 502-505
In this paper, we propose a modified Liu-Storey conjugate gradient method for solving unconstrained optimization problem. The presented method possesses the sufficient descent property independent of the line search used. Under the suitable conditions, we ...
The Reading/Writing SD Card System Based on FPGA
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Zhenlin Lu, Jingjiao Li, Yao Zhang
Issue Date:September 2010
pp. 419-422
the application based on FPGA chip are more and more popular especially for speech processing and image processing. At the same time, the application needs more memory except for on-chip memory to store additional data. To meet the requirements of external...
Image Classification by Labeled Data in Similar Topics
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Di Wu, Li Yao, Wenjun Zhang
Issue Date:December 2008
pp. 387-393
One of the most difficulties in image classification is theshort availability of labeled images. However, in manycases, we can find a large amount of auxiliary labeled imagesto help the target classification. The auxiliary imagesare in similar topics of th...
Estimation Illumination Chromaticity
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Li Yao
Issue Date:December 2008
pp. 756-760
Color constancy is important for pattern recognition and image understanding. Based on simplified BRDF model, we use voting method to detect the high light areas. Then the pixels in the high light areas are projected to the inverse-Intensity space. In the ...
Availability analysis of DNSSEC resolution and validation service
Found in: 2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)
By Yong Wang, Xiaochun Yun, Gang Xiong, Zhen Li, Yao Yao
Issue Date:August 2012
pp. 35-42
Availability of DNSSEC resolution and validation service against man-in-the-middle attacks are analysed in this paper, and possible vulnerabilities are introduced and classified. Experiments show DNSSEC client is vulnerable because the attacks are always s...
Web Service Discovery Using Lexical and Semantic Query Expansion
Found in: 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
By Shang-Pin Ma, Chia-Hsueh Li, Yao-Yu Tsai, Ci-Wei Lan
Issue Date:September 2013
pp. 423-428
Web service discovery is the process of locating web services to satisfy the requirements of service requesters, and as such, plays an important role to realize business-to-business interoperability. Today, many service discovery mechanisms are available, ...
Using Seasonal Time Series Analysis to Predict China's Demand of Electricity
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Wei Li-Yao,Yu Feng-Mao
Issue Date:June 2013
pp. 76-79
Time series analysis is to explain correlation and the main features of the data in chronological order by using appropriate statistical models. Since the past electricity generated sequence in China shows a strong seasonal variations and several values fo...
Dialectic Analysis Model: An Approach to Assist Decision-Making Based on Dialectic Thinking
Found in: Intelligent System Design and Engineering Application, International Conference on
By Li Yao,Xuetian Qi,Jinping Yuan
Issue Date:January 2012
pp. 235-242
This paper proposes a Dialectic Analysis Model for Multilateral Argument Games in the open environments, called DAM-MAG, based on dialectic semantics, in terms of the new concept of defensible argument. The DAM-MAG introduces the notion of defensible argum...
Multi-party Dialogue Games for Distributed Argumentation System
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Jinping Yuan,Li Yao,Zhiyong Hao,Fang Liu,Tangming Yuan
Issue Date:August 2011
pp. 329-332
This paper concerns a distributed argumentation system where different agents are equipped with argumentative knowledge base (henceforth referred as KB) within which conflict arguments are represented using attacking relations. This paper proposes the noti...
Exemplar-Based Object Removal in Video Using GMM
Found in: Multimedia and Signal Processing, International Conference on
By Aijuan Xia, Yan Gui, Li Yao, Lizhuang Ma, Xiao Lin
Issue Date:May 2011
pp. 366-370
This paper presents an exemplar-based video inpainting mechanism that restores the area of the removal object, and this mechanism can be further employed to extract the background of videos. The region to be inpainted in video is still in background and mo...
Experimental Study of Solar Photovoltaic/Thermal (PV/T) System Based on Flat Plate Heat Pipe
Found in: Asia-Pacific Power and Energy Engineering Conference
By Zhen Hua Quan, Ning Jun Li, Yao Hua Zhao
Issue Date:March 2011
pp. 1-4
Implementing the Compiler of UDLC
Found in: Grid and Cloud Computing, International Conference on
By Caihua Hu, RuiSheng Zhang, TongMing Wei, RuiPeng Wei, ShuPing Li, Yao Cheng
Issue Date:November 2010
pp. 383-387
The increasing complexity of chemical problems often requiring multiple chemical software work together to complete. Most chemical software uses different script languages to describe jobs, chemists have to consume lots of time to learn them before work. U...
An Integrated Approach to Worm Detection and Automatic Signature Generation
Found in: Computational Intelligence and Security, International Conference on
By Li Yao, Yu Liu, Yuqing Zhang
Issue Date:December 2009
pp. 371-375
Modern worms spread so quickly on the Internet that traditional methods which entail human labor to generate signatures might not be fast enough to contain their spreading. It’ s necessary to automate the processes of both worm detection and signature gene...
Technology Research on Energy-Saving Transform of Existing Residential Buildings in Han Dan City
Found in: Computational Intelligence and Natural Computing, International Conference on
By Wang Chang-long, Li Yao
Issue Date:June 2009
pp. 490-494
According to the climate characteristics of Handan, the existing residential building in Handan is studied and present characteristics of the existing residential building are analyzed in order to improve residential environment and condition, reduce energ...
Study of the GM(1,1) Model and Improved Model of the Trend Term of Micromechanical Gyroscope Drift
Found in: Computational Sciences and Optimization, International Joint Conference on
By Xuelian Li, Yao Sun, Hongwei Mo, Kejun Wang
Issue Date:April 2009
pp. 221-223
To improve measure precise of micro inertial integrated navigation system, modified GM(1,1) using exponential smooth is proposed to depict nonstationary random drift signal of micromechanical gyroscope under zero input condition. The model is compared with...
System Design and Application of Real Time Inspection for Software Malicious Actions
Found in: Information Science and Engieering, International Symposium on
By Shaobo Li, Yao Hu
Issue Date:December 2008
pp. 88-92
In view of the analysis of hostility and working principle of the malicious software and their actions, based on the kernel driver, this paper designs a Real-time inspection system framework and solution of malicious software and actions. This system appli...
3D Data Acquisition Based on Shifting De Bruijn Structured Light
Found in: Computer and Electrical Engineering, International Conference on
By Li Yao, Di Wu
Issue Date:December 2008
pp. 36-40
We present a simple, low cost but fast 3D data acquisition method. We employ a projector to project shifting color De Bruijn strips on the object, and a digital camera to record videos of the scene. The strips pattern divides the image to several spaces an...
Comprehensive Evaluation System Uncertainty on Durability of Concrete Structure
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Wang Chang-long, Qi Yan-ming, Gao Hong-jun, Li Yao
Issue Date:December 2008
pp. 362-367
Considered in assessing durability of concrete structures on the basis of factors was finished. Concrete structures for specific components, to assess the durability nodes do not contain many intellectual, select the most impact on the durability of concre...
White Matter Fiber Tracts Based On Diffusion Tensor Imaging
Found in: International Conference on Natural Computation
By Qian Di, Tingting Wang, Li Yao, XiaoJie Zhao
Issue Date:October 2008
pp. 306-310
The recently developed magnetic resonance imaging technique of diffusion tensor imaging (DTI) has a widespread application on investigating the cerebral white matter architecture. When referred to fiber tracking, as the typical application of DTI, one of t...
Approach to the Formal Representation of OWL-S Ontology Maintenance Requirements
Found in: Web-Age Information Management, International Conference on
By Aihua Bao, Li Yao, Weiming Zhang, Jinping Yuan
Issue Date:July 2008
pp. 56-61
OWL-S Ontology Maintenance is an important issue in the research of Semantic Web Services and Knowledge Management. This paper analysed the differences between the maintenance of OWL-S and domain ontology evolution, and proposed an OWL-S oriented ontology ...
Application of Time-varying Coherence to Coordinative Connectivity Based on Event Related EEG
Found in: International Conference on Natural Computation
By Xiaotong Wen, Kai Yin, Dongzhi Sun, Li Yao, Xiaojie Zhao
Issue Date:August 2007
pp. 216-220
Classic coherence analysis can detect coordination of EEG rhythms between brain areas. However, it could not reflect the dynamic properties changing with time. Time-varying coherence analysis is a method developed on base of classic coherence analysis and ...
Levels of Authentication Assurance: an Investigation
Found in: Information Assurance and Security, International Symposium on
By Aleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow
Issue Date:August 2007
pp. 155-160
The ES-LoA project, funded by the UK Joint Information Systems Committee (JISC) under its e- Infrastructure Security Programme, investigates current and future needs among UK research and education community for a more fine-grained authorisation scheme tha...
A model and dynamics for reticulated supply chain based on multi-agent system
Found in: Intelligent Systems Design and Applications, International Conference on
By Lei Zhang, Yi-jun Li, Yao-qun Xu
Issue Date:October 2006
pp. 919-924
In essence, Supply Chain is a dynamic complex system that is composed of a multiplicity of entities with independent decision-making ability. Traditional models, such as chain-shaped, radial-shaped and so on, are not fit for this complex setting any more. ...
Selection of Materialized View Based on Information Weight and Using Huffman-Tree on Spatial Data Warehouse
Found in: Innovative Computing ,Information and Control, International Conference on
By JingJing Li, Yao Wang, RuiQiang Liu
Issue Date:September 2006
pp. 71-74
We propose the method of selecting materialized views on a spatial data warehouse. And focus on selecting spatial tuples. The selecting considerations include query frequency, source data and spatial complexity, so we introduce information content and dens...
A Conceptual Model of Agent Mediated Web Service
Found in: Services Computing, IEEE International Conference on
By Fang Liu, Li Yao, Weiming Zhang, Hua Liu, Hua Zhang
Issue Date:September 2004
pp. 638-642
Current Web services standards enable publishing service descriptions and finding services on a match based on criteria such as method signatures or service category, but provide no basis for selecting a good service or for comparing ratings of services. T...
Blind closed-form array response estimation in wireless communication
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Liang Jin, Min-Li Yao, Qin-Ye Yin
Issue Date:March 1999
pp. 2913-2916
A closed-form array response estimation (CARE) technique for blind source separation in wireless communication is developed. By exploiting the data structure of second-order statistics of the array output in the presence of multipath, we construct a signat...
The Research and Development of Restrained Iteration Deconvolution Algorithm in Three-Dimensional Microscope Image Restoration
Found in: Information Science and Engineering, International Conference on
By Ming Wang, Jin Li Yao
Issue Date:December 2009
pp. 1487-1490
The theory of microscope for imaging thick transparent samples and iterative restrained deconvolution algorithm are introduced in this paper. Under the microscope imaging principle of transparency, clarity of the known three-dimensional images is degenerat...
The Receiver Operational Characteristic for Binary Classification with Multiple Indices and Its Application to the Neuroimaging Study of Alzheimer's Disease
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Adam Fleisher, Eric Reiman, Hillary Protas, Juan Li, Kewei Chen, Li Yao, Napatkamon Ayutyanont, William Jagust, Xia Wu
Issue Date:January 2013
pp. 173-180
Given a single index, the receiver operational characteristic (ROC) curve analysis is routinely utilized for characterizing performances in distinguishing two conditions/groups in terms of sensitivity and specificity. Given the availability of multiple dat...
The Performance Comparison between TCP Reno and TCP Vegas
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Chang-Li Yao
Issue Date:July 2000
pp. 61
Following the development of TCP Vegas, the performance comparison between TCP Reno and TCP Vegas has not been discussed thoroughly. The discussion of the revised TCP version, TCP Vegas, remains insufficient to decide whether or not to use it. This paper a...
Location privacy leaking from spectrum utilization information in database-driven cognitive radio network
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Haojin Zhu, Muyuan Li, Yao Liu, Zhaoyu Gao, Zhenfu Cao
Issue Date:October 2012
pp. 1025-1027
The Database-driven Cognitive Radio Network is regarded as a promising way for a better utilization of radio channels without introducing the interference to the primary user. However, it is also facing a series of security threats. In this study, we ident...
Multi-strategy grouping genetic algorithm for the pickup and delivery problem with time windows
Found in: Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation (GEC '09)
By Genhong Ding, Linye Li, Yao Ju
Issue Date:June 2009
pp. 70-73
The Pickup and Delivery Problem with Time Windows (PDPTW) is a generalization of the well studied Vehicle Routing Problem with Time Windows (VRPTW). This paper studies a Grouping Genetic Algorithm for solving the PDPTW. The insertion-searching heuristics (...
IEEE standard 1500 compatible interconnect diagnosis for delay and crosstalk faults
Found in: Proceedings of the 2006 conference on Asia South Pacific design automation (ASP-DAC '06)
By Chauchin Su, Chung-Len Lee, Jwu E Chen, Katherine Shu-Min Li, Yao-Wen Chang
Issue Date:January 2006
pp. 366-371
We propose an interconnect diagnosis scheme based on Oscillation Ring test methodology for SOC design with heterogeneous cores. The target fault models are delay faults and crosstalk glitches. We analyze the diagnosability of an interconnect structure and ...
Multilevel full-chip routing with testability and yield enhancement
Found in: Proceedings of the 2005 international workshop on System level interconnect prediction (SLIP '05)
By Chauchin Su, Chung-Len Lee, Jwu-E Chen, Katherine Shu-Min Li, Yao-Wen Chang
Issue Date:April 2005
pp. 29-36
We propose a multilevel full-chip routing algorithm that improves testability and diagnosability, manufacturability, and signal integrity for yield enhancement. Two major issues are addressed. (1) The oscillation ring (OR) test and its diagnosis scheme for...