Search For:

Displaying 1-50 out of 400 total
A Classification Algorithm in Li-K Nearest Neighbor
Found in: 2013 Fourth Global Congress on Intelligent Systems (GCIS)
By Bangjun-Wang, Li-Zhang, Xiaoqian-Wang
Issue Date:December 2013
pp. 185-189
The KNN (The K nearest neighbor) is known as its simple efficient and widely used in classification problems or as a benchmark in classification problems. For different data types especially complex structure and high-dimensional data in real-life, the cho...
Long-Term Benefit Driven Adaptation in Service-Based Software Systems
Found in: Web Services, IEEE International Conference on
By Jun Na,Bin Zhang,Yan Gao,Li Zhang,Zhi-liang Zhu
Issue Date:July 2011
pp. 572-579
Service-based software system (SBS) is a software system based on service-oriented architecture (SOA). Although often treated as a composite service, an SBS is proposed from a more practical point of view based on restricted service provisions. In the high...
A New Approach for Near-Lossless and Lossless Image Compression with Bayer Color Filter Arrays
Found in: Image and Graphics, International Conference on
By Xiang Xie, GuoLin Li, XiaoWen Li, ZhiHua Wang, Chun Zhang, DongMei Li, Li Zhang
Issue Date:December 2004
pp. 357-360
This paper presents a new approach for near-lossless and lossless image compression in digital colorful image sensors with Bayer Color Filter Arrays (CFAs). In this approach, the captured CFA raw data is firstly transformed from quincunx shape to rectangul...
The Design of Variable Frequency Power Based on IGBT
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Jie Li,Guang-Hui Li,Li-Juan Hou,Xiu-Li Zhang
Issue Date:November 2012
pp. 217-219
This paper introduces the design method of variable frequency power based on IGBT and SPWM inverter technology. The drive signal of IGBT is SPWM wave produced by MCU, and then a undistorted sine signal can be obtained through the low pass filter. LED digit...
WaterLady: A Case Study for Connecting Physical Devices into Social Networks
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Longbiao Chen,Yaochun Li,Zeming Zheng,Li Zhang,Dan He,Xiaolong Li,Sha Zhao,Shijian Li,Gang Pan
Issue Date:September 2012
pp. 930-934
An increasing number of connectable devices have been used in our everyday living environments. However, their working status usually cannot be remotely monitored in a ubiquitous way, leading to potential inefficiency in energy consumption. In this paper, ...
A Case-Based Component Selection Framework for Mobile Context-Aware Applications
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Fan Dong, Li Zhang, Dexter H. Hu, Cho-Li Wang
Issue Date:August 2009
pp. 366-373
This paper proposes a new semi-reliable multicast algorithm based on the (m, k)-firm scheduling technique, where in each consecutive k window messages sent by a sender, at least m of these messages must be received by the receiver. To assure this restricti...
Challenges, Designs, and Performances of Large-Scale Open-P2SP Content Distribution
Found in: IEEE Transactions on Parallel and Distributed Systems
By Zhenhua Li,Yan Huang,Gang Liu,Fuchen Wang,Yunhao Liu,Zhi-Li Zhang,Yafei Dai
Issue Date:November 2013
pp. 2181-2191
Content distribution on today's Internet operates primarily in two modes: server-based and peer-to-peer (P2P). To leverage the advantages of both modes while circumventing their key limitations, a third mode: peer-to-server/peer (P2SP) has emerged in recen...
Coordinating In-Network Caching in Content-Centric Networks: Model and Analysis
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Yanhua Li, Haiyong Xie, Yonggang Wen, Zhi-Li Zhang
Issue Date:July 2013
pp. 62-72
In-network content storage has become an inherent capability of routers in the content-centric networking architecture. This raises new challenges in utilizing and provisioning the in-network caching capability, namely, how to optimally provision individua...
Identifying suspicious activities through DNS failure graph analysis
Found in: Network Protocols, IEEE International Conference on
By Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang
Issue Date:October 2010
pp. 144-153
As a key approach to securing large networks, existing anomaly detection techniques focus primarily on network traffic data. However, the sheer volume of such data often renders detailed analysis very expensive and reduces the effectiveness of these tools....
SmartShadow: Modeling a user-centric mobile virtual space
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Li Zhang, Gang Pan, Zhaohui Wu, Shijian Li, Cho-li Wang
Issue Date:March 2009
pp. 1-4
This paper attempts to model pervasive computing environments as a user-centric “SmartShadow” using the BDP (Belief-Desire-Plan) user model, which maps pervasive computing environments into a dynamic virtual user space. SmartShadow will follow the user to ...
Cost-Efficient Processing of Continuous Extreme Queries over Distributed Data Streams
Found in: Web-Age Information Management, International Conference on
By Li Tian, Peng Zou, Li Zhang, Aiping Li
Issue Date:July 2008
pp. 157-164
We address the problem of cost-efficient processing of continuous extreme queries (MAX or MIN) over distributed sliding window streams, and propose several methods for communication reduction and resource sharing among queries. Firstly, we develop an effec...
A Cost-Efficient Method for Continuous Top-k Processing over Data Stream
Found in: Web-Age Information Management, International Conference on
By Li Zhang, Li Tian, Peng Zou, Aiping Li
Issue Date:July 2008
pp. 254-261
Continuous top-k query over data stream is very important for several on-line applications, including network monitoring, communication, sensor networks and stock market trading, etc. In this paper, we propose an effective pruning technique, which minimize...
An Approach for Web Service QoS Prediction Based on Service Using Information
Found in: Service Sciences, International Conference on
By Li Zhang, Bin Zhang, Jun Na, Liping Huang, Mingwei Zhang
Issue Date:May 2010
pp. 324-328
With the increasing numbers of Web services and service users on World Wide Web, predicting QoS (Quality of Service) for users will greatly aid service selection and discovery. Due to the different backgrounds and experiences of users, they have different ...
A New GPS Dynamic Filter Algorithm Based on Stationary Wavelet Transformation
Found in: Future Computer and Communication, International Conference on
By Li Hong-lian, Zhang Wei-li, Zhang Jun, Zhang Lei, Jiang Qiang
Issue Date:June 2009
pp. 270-272
Through analyzing the properties of vehicle GPS navigation system signal’s observation gross error and random noise, this paper presents a new dynamic filter algorithm, which based on stationary wavelet transformation (SWT). Firstly, the algorithm decompos...
Assessing Object-Oriented Software Systems Based on Change Impact Simulation
Found in: Computer and Information Technology, International Conference on
By Lin Li, Li Zhang, Linqing Lu, Zhiqiang Fan
Issue Date:July 2010
pp. 1364-1369
Software changes are inevitable during software evolution. And software change propagation intensely increases the difficulty of software maintenance. In this paper, we regard various change requirements as the combination of a series of “atomic change req...
Numerical Simulation of Heat Charging Process for Solar Heating Units with Metal Phase Change Thermal Storage
Found in: Intelligent System Design and Engineering Application, International Conference on
By Guansheng Chen,Li Zhang,Renyuan Zhang,Feng Li
Issue Date:January 2012
pp. 1440-1443
Phase change thermal storage is an important mode of solar thermal energy storage. In the paper, the heat charging processes of solar heating units were simulated under three kinds of heat flux (400,600 and 800kW/m2) at the bottom face respectively. Al-Si ...
Analysis of Parallel Computing Environment Overhead of OpenMP for Loop with Multi-core Processors
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Wan-Qing Li, Tang Ying, Yunfa Li, Zhang Wei, Jangcong Feng, Zhang Jilin
Issue Date:December 2010
pp. 514-517
This paper analyze the parallel computing environment overhead of OpenMP for loop with multi-core processors including the case of data-race. The different solutions of data-race are discussed in present paper, such as critical pragma, atomic pragma and re...
Artificial Neural Network Modeling of Prevalence of Pneumoconiosis among Workers in Metallurgical Industry - A Case Study
Found in: Intelligent System Design and Engineering Application, International Conference on
By Chunmiao Yuan, Gang Li, Zhang Peihong, Chang Li
Issue Date:October 2010
pp. 388-393
The paper describes the training, validation and application of artificial neural network (ANN) models for prevalence of pneumoconiosis among workers in Yueyufeng iron and steel company (China). The models employed three input variables collected at severa...
A New Evolutionary Optimization Algorithm Based on Super-individual
Found in: Intelligent Systems, WRI Global Congress on
By Shun-jiu Wang, Xin-li Zhang, Chang-jian Ni
Issue Date:May 2009
pp. 559-563
According to evolutionary principle, a new evolutionary optimization algorithm based on super-individual (SIEA) is presented. In the SIEA, the population is generated based on super-individual, and the complex process in genetic algorithm (GA) is not requi...
The Application of Analysis Variance Method on Synchronization of Weighted Networks
Found in: International Conference on Natural Computation
By Xuelian Sun, Man Liu, An Li, Zhang Hua
Issue Date:October 2008
pp. 272-275
The synchronization of weighted networks is effected by many factors, such as the density of weight, the heterogeneity of weight and etc. The synchronization of weighted networks is analyzed through the two−factor analysis variance method based on Sun et a...
An Automatic Voice Query System for Bank Based on Telephone Network
Found in: International Symposiums on Information Processing
By Dong-ming Li, Jing Zhang, Li Zhang, Ya-ju Liu, Bo Du
Issue Date:May 2008
pp. 629-632
Automatic voice query system for bank by phone was a hi-tech product based on computer technology, electronic communication technology and speech synthesis technology. The hardware design of this system adopted modularization design scheme, which centered ...
Global Optimization Method Based on the Statistical Genetic Algorithm for Solving Nonlinear Bilevel Programming Problems
Found in: Computational Intelligence and Security, International Conference on
By Hong Li, Yong-Chang Jiao, Li Zhang, Fu-Shun Zhang
Issue Date:December 2007
pp. 96-100
This paper presents a global optimization method based on the statistical genetic algorithm for solving nonlinear bilevel programming problems. The bilevel programming problem is firstly transformed into a single level problem by applying Karush-Kuhn-Tucke...
An Adaptive Replanning Mechanism for Dependable Service-Based Systems
Found in: E-Business Engineering, IEEE International Conference on
By Jun Na, Guo-hong Li, Bin Zhang, Li Zhang, Zhi-liang Zhu
Issue Date:November 2010
pp. 262-269
A promising way to guarantee dependability of service-based systems (SBSs) is replanning service bindings dynamically with the environment changing. As embedded into system execution, such replanning process will directly affect the overall performance of ...
A Wireless Ad Hoc Overlay Networks Indexing Mechanism Based on Petri Nets Theory
Found in: Computational Aspects of Social Networks, International Conference on
By Zhang Li, Zhang Yang
Issue Date:September 2010
pp. 474-478
To solve the collaboration issues between wireless Ad Hoc networks and Overlay Network, an Ad Hoc overlay network model was presented and a Key-based Indexing Mechanism (KIM) was proposed accordingly, based on the distributed algorithm of Overlay Network a...
Implement of E-government System with Data Persistence of JavaEE
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Zhang Li, Zhang Weixi
Issue Date:August 2010
pp. 693-696
Data persistent is an important part of development in JavaEE, and it is an intractable problem in process of designing E-government system. However, we usually use a single framework to build enterprise-class applications, such as mixed logic of reuse pro...
PTSA Event Scheduling Algorithm of CEP-Based RFID Tracking and Locating System
Found in: Information and Computing Science, International Conference on
By Guangqian Zhang, Li Zhang, Xin Liu
Issue Date:May 2009
pp. 98-102
RFID-based tracking and locating system faces many challenges. In order to solve the problem, we build a model of RFID-based tracking and locating system which is based on complex event processing, that is BCEPS model. BCEPS model consists of physical devi...
Improved Full State Hybrid Projective Synchronization of Chaotic Systems with the Different Order
Found in: Young Computer Scientists, International Conference for
By Jianning Yu, Jiangang Zhang, Li Zhang
Issue Date:November 2008
pp. 2925-2930
Chaos synchronization has received a signification attention in nonlinear science. Over the past two decades, many types of synchronization have been announced. This paper introduces another novel type of chaos synchronization-improved full state hybrid pr...
SoftMAC: Layer 2.5 Collaborative MAC for Multimedia Support in Multihop Wireless Networks
Found in: IEEE Transactions on Mobile Computing
By Haitao Wu, Yunxin Liu, Qian Zhang, Zhi-Li Zhang
Issue Date:January 2007
pp. 12-25
In this paper, we present the challenges in supporting multimedia, in particular, VoIP services over multihop wireless networks using commercial IEEE 802.11 MAC DCF hardware, and propose a novel software solution, called Layer 2.5 SoftMAC. Our proposed Sof...
Pervasive Service Bus: Smart SOA Infrastructure for Ambient Intelligence
Found in: IEEE Intelligent Systems
By Gang Pan,Li Zhang,Zhaohui Wu,Shijian Li,Laurence Yang,Man Lin,Yuanchun Shi
Issue Date:July 2014
pp. 52-60
Ambient intelligence (AmI) aims to make our everyday environments intelligent--that is, sensitive, adaptive, and responsive to the presence of people--in a transparent manner. Several challenges exist to building an efficient infrastructure for AmI, includ...
A Differential Evolution with Two Mutation Strategies for Linear Bilevel Programming Problems
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Hong Li,Li Zhang
Issue Date:December 2013
pp. 55-60
An improved constraint handling technique based on a comparison mechanism is presented, and then it is combined with selection operator in differential evolution to fulfill constraint handling and selection simultaneously. A differential evolution with two...
A Novel Cache Replacement Policy for ISP Merged CDN
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Qiao Li,Hui He,Bin-Xing Fang,Hong-Li Zhang
Issue Date:December 2012
pp. 708-709
The cache replacement policy is the key factor affecting the performance of the ISP merged Content Delivery Networks. Current cache replacement schemes only consider the frequency and locality as the basis of replacement. However, we argue the access inter...
A MDA-based Approach for Developing Simulation-Oriented Combat Flows
Found in: 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering (HASE)
By Hong Lu,Li Zhang,Zhao Liu
Issue Date:October 2012
pp. 155-158
Combat flow simulation is usually used to evaluate combat effectiveness. For development of combat flows based on special simulation platforms, both combat flows and platform-specific information need to be concerned. To separate concerns on combat flows a...
An Improved IGA-BP Algorithm Applied to Fault Diagnosis
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Lichun Wu,Li Zhang,Yongbo Yang,Lijie Sun,Fengman Li
Issue Date:July 2012
pp. 194-197
In immune genetic algorithm of float coding, there would be no certain way to calculate the critical value based on the Euclidean distance similarity. For this problem, the paper puts forward a way on "  " method; inspired by the elitist strategy...
Automatic Rib Segmentation in Chest CT Volume Data
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Li Zhang,Xiaodong Li,Qingmao Hu
Issue Date:May 2012
pp. 750-753
An automatic segmentation method for extraction of human rib structures from chest CT volume data is presented. Segmentation is initiated from the middle coronal slice to attain complete and isolated 12 pairs of ribs with a recursive tracking on coronal sl...
A Hybrid Approach for Large Cache Performance Studies
Found in: Quantitative Evaluation of Systems, International Conference on
By David Daly,Parijat Dube,Kaoutar El Maghraoui,Dan Poff,Li Zhang
Issue Date:September 2011
pp. 47-56
Recent technology trends are leading to the possibility of computer systems having last level caches significantly larger than those that exist today. Traditionally, cache effectiveness has been modeled through trace-driven simulation tools, however, these...
The Routing Continuum from Shortest-Path to All-Path: A Unifying Theory
Found in: Distributed Computing Systems, International Conference on
By Yanhua Li, Zhi-Li Zhang, Daniel Boley
Issue Date:June 2011
pp. 847-856
Routing is a critical operation in networks. In the context of data and sensor networks, routing strategies such as shortest-path, multi-path and potential-based (
The Banking System Reference Implementation Based on SOA
Found in: Computational Sciences and Optimization, International Joint Conference on
By Li Zhang, Yan Wang, Fu-jiang Li
Issue Date:April 2011
pp. 374-377
On the basis of understanding the SOA, this paper stresses on the key of the banking system implementing method based on the SOA: transform the business into the components and process modules, integrate business logic and application development, and prop...
Semantic Device Bus for Internet of Things
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Kun Yang, Shijian Li, Li Zhang, Gang Pan
Issue Date:December 2010
pp. 341-346
The vision of the Internet of things is very appealing, and gains more and more attention. Since mobile devices in the Internet become more complex and heterogeneous, device collaboration will be full of technical challenges. How to integrate different sys...
As(III) Removal from Aqueous Solution Using a-Fe2O3-impregnated Chitosan Beads
Found in: Digital Manufacturing and Automation, International Conference on
By Bingjie Liu, Dongfeng Wang, Haiyan Li, Liyuan Wang, Li Zhang
Issue Date:December 2010
pp. 289-292
A novel, bio-based sorbent for As(III), α-Fe2O3-impregnated chitosan beads (FICB), has been successfully synthesized and tested. Batch wise adsorption experiments were performed to evaluate the adsorption conditions, reusability as well as the effect of io...
Research on a Skin Color Detection Algorithm Based on Self-adaptive Skin Color Model
Found in: Communications and Intelligence Information Security, International Conference on
By Guoliang Yang, Huan Li, Li Zhang, Yue Cao
Issue Date:October 2010
pp. 266-270
Skin color detection is an important subject in computer vision research. Color segmentation takes a great attention because color is an effective and robust visual cue for characterizing an object from the others. To aim at existing skin color algorithms ...
Estimation of Vegetation Ecological Water Requirement in Arid Areas Based on Neural Network
Found in: Computational Intelligence and Design, International Symposium on
By Li Zhang, Mengdie Zhao, Yuan Gao
Issue Date:October 2010
pp. 28-30
With a powerful capability in nonlinear mapping, the neural network has been applied widely in patter recognition and nonlinear estimation. Based on the theoretical model of vegetation ecological water requirement in arid areas, this article has estimated ...
A Dynamical Extension Framework Supporting for Personalized Information Portal
Found in: International Conference on E-Business and E-Government
By Ning-jiang Chen,Li-li Zhang,Di Luo
Issue Date:May 2010
pp. 439-442
A kind of personalization extension of Portal framework is studied. Based on the establishment of user pattern which can describe the characteristics of users’ behaviors at runtime, a dynamical mechanism for Portlet composition driven by user pattern is pr...
Key Issues in Designing High-Speed Hardware for Electrical Capacitance Tomography System
Found in: Computer Science-Technology and Applications, International Forum on
By Gao Yan-li, Zhang Yonggao
Issue Date:December 2009
pp. 332-335
It is always a hot spot for researchers that how to improve the ECT system data acquisition speed aim to meet the real-time requirement of high-speed industry processes. Key issues in designing high-speed hardware (small capacitance measurement module, dat...
Method for Supplier Selection Based on ANP and Entropy Righ
Found in: Intelligent Computation Technology and Automation, International Conference on
By Cui Li-li, Zhang Rui-peng, Wang Peng
Issue Date:October 2009
pp. 935-940
Based on the demand of material, this paper first selected the evaluating factors about choosing suppliers, and analyzed the correlation among evaluating factors. Then, by combining the merits of Analytic Network Process (ANP) and entropy right, this paper...
Multidimensional Association Analysis of Web Users' Access Path for Website Design and Promotion
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jianyuan Yan, Li Zhang, Fang Zhao, Wenting Liu, Kai Li
Issue Date:August 2009
pp. 103-107
Data mining technology makes it possible to discover knowledge from daily operational data. As we know, web log contains a lot of information about web users’ behavior on the website, for example, web users’ access path. Information discovered from those d...
Evaluation of Software Change Propagation Using Simulation
Found in: Software Engineering, World Congress on
By Lin Li, Guanqun Qian, Li Zhang
Issue Date:May 2009
pp. 28-33
Software changes are inevitable in the process of software evolution. And software change propagation intensely increases the difficulty of software maintenance. The approach of simulated analysis is introduced to the research on software change propagatio...
A Personnel Classification Model Based on Reducing Cost and Avoiding Risks
Found in: Education Technology and Computer Science, International Workshop on
By Li-li Zhang, Xi-nan Zhao
Issue Date:March 2009
pp. 645-649
Most enterprises face the challenge to reduce personnel cost, since enterprises spend a lot of money on it. This paper studies the classifying method of personnel with the purpose to minimize the cost and avoid risk. It presents an evaluation classifying a...
A Genetic Algorithm Based Method of Fault Maintenance in Software-Intensive System
Found in: Education Technology and Computer Science, International Workshop on
By Bin XIiong, Li Zhang, Na Yang, Jing Li
Issue Date:March 2009
pp. 1056-1059
This paper analyzes the problem of fault maintenance in software-Intensive system. The problem is described and modeled by a Genetic Algorithm (GA) based method. After a complete investigation on elements involved in the problem, the controls parameters in...
Research of Trace Equivalence Relation on XTR
Found in: Communications and Mobile Computing, International Conference on
By Yong Li, Xiang-li Zhang, Long He, Zhi-heng Xie, Chong Zhu
Issue Date:January 2009
pp. 380-384
The trace equivalence relation is analyzed and proved by the property of cyclic group, and the XTR security decreasing caused by the equivalence relation is discussed. To cope with this problem, an improved algorithm was proposed to eliminate the equivalen...
2-D Software Quality Model and Case Study in Software Flexibility Research
Found in: Computational Intelligence for Modelling, Control and Automation, International Conference on
By Li Zhang, Lin Li, Hui Gao
Issue Date:December 2008
pp. 1147-1152
This work starts from the analysis of the traditional decomposed quality model and therelation quality model and discovers the deficiency of them presented the softwarequality. Then based on the measurement theory a 2-D software quality model isproposed, w...
 1  2 Next >>