Search For:

Displaying 1-50 out of 76 total
Weighted Pseudo Almost Automorphic Solution to a Class of Integrodifferential Equations
Found in: Internet Computing and Information Services, International Conference on
By Chou-li Lu,Xiao-qiu Song,Li-li Zhou
Issue Date:September 2011
pp. 144-147
This paper is concerned with weighted pseudo almost auto orphic functions, which is associated with the optimal control problem of distributed parameter system, especially in the nonlinear evolution equation. Applying the Banach fixed point theorem, we pro...
 
The Discussion of Spur Gear Library System Based on UG/Open
Found in: Digital Manufacturing and Automation, International Conference on
By Tao Jiang,Liang-jing Li,Rui-li Zhou,Jin-guo Li
Issue Date:August 2011
pp. 1266-1269
UGNX second development technology is used to create the cyLindrical spur gear 3d parametric model. then menu and interface designed by UG/Open API, MenuScript menu and UIStyler dialog and control procedures, thus build intuitive gear database man-machine ...
 
Research on the Parallelism of Security Vulnerability Detection of Logic-Unknown PLD
Found in: Computer Science-Technology and Applications, International Forum on
By Li Zhou, Qing-bao Li, Min Fan, Guang-en Zhou
Issue Date:December 2009
pp. 321-325
As the development of integrated circuit, the algorithms of security vulnerability detection available are not suitable for encrypted PLD in large scale, which would bring inacceptable comsumption of memory and time. By analyzing the relation of input sign...
 
Analysis of Developing Enterprise Quality Credit Classified Supervision System Based on B/S Model
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Li Zhou, Kui-tong Xian, Bao Li
Issue Date:May 2009
pp. 500-505
The operation of enterprise quality credit classified supervision was the core operation of enterprise quality credit information data system. By expounding the system structure of B/S model, the system development thought based on B/S model was been broug...
 
Intelligent Classification Based on Tolerance Relations
Found in: Future BioMedical Information Engineering, International Seminar on
By Pei Li Zhou, Wanjing Cai
Issue Date:December 2008
pp. 445-448
Binary relations and its operations are important in set theory. But traditional research mainly focuses on pure mathematics operations on set theory. Pansystems strengthen the research work in set theory by combining mathematics with its philosophical bac...
 
A Coordination Control by Sections on the Trunk Line of Urban Traffic Network
Found in: MultiMedia and Information Technology, International Conference on
By Li Zhou, Wei Li
Issue Date:December 2008
pp. 665-668
Aiming at the multi-intersections of the urban traffic trunk line, a coordination control by sections is brought forward. The proposed algorithm includes three key steps. Firstly, according to the relativity of each two or three natural intersections on th...
 
Effects of Mixed Chelators on the Leaching of Zinc in Contaminated Soils under the Co-planting System
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Jian-Li Zhou,Qi-Tang Wu,Ze-Bin Wei,Xiao-Fang Guo,Xue-Feng Shi,Le Shao
Issue Date:January 2013
pp. 682-687
To study the influence of mixed chelators (MC) on Zn leaching in two contaminated soil (acid soil with pH 4.63 and neutral soil with pH 6.51) with Pb-Zn mining wastewater under the co-planting system, a outdoor soil column (100 cm) leaching experiment was ...
 
Optimize Block-Level Cloud Storage System with Load-Balance Strategy
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Li Zhou,Yi-Cheng Wang,Ji-Lin Zhang,Jian Wan,Yong-Jian Ren
Issue Date:May 2012
pp. 2162-2167
Cloud storage systems take advantage of distributed storage technology and virtualization technology, to provide virtual machine clients with customizable storage service. They can be divided into two types: distributed file system and block level storage ...
 
Ultra-High Speed Fault Phase Selection Method Using Morphology-Wavelet Transform
Found in: Asia-Pacific Power and Energy Engineering Conference
By Yuanchao Hu, Jiangjun Ruan, Xun Li, Dong Wang, Yujiao Zhang, Li Zhou
Issue Date:March 2011
pp. 1-4
NA
 
Application of Image Mosaic Algorithm in Lateral Multi-lens Video Logging
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Hu Hong-tao, Lin Xia, Li Zhou-li
Issue Date:January 2011
pp. 539-542
The wall sequence images acquired by lateral multi-lens video logging method had some peculiarities that the overlap region of adjacent images can be estimated. This paper proposed an image mosaic algorithm which first estimated the overlap areas of adjace...
 
OSEK COM-Based Dynamic Priority Assignment Method on CAN
Found in: Embedded Software and Systems, Second International Conference on
By Lvhong Zhang, Hong Li, Li Zhou, Minde Zhao, Zhigang Gao
Issue Date:May 2009
pp. 615-620
OSEK/VDX is an important specification in the field of automotive electronics and OSEK COM specifies the data communication behaviors inter-ECU and intra-ECU, but doesn't appoint specific underlying layer. In this paper,OSEK COM is implemented based on CAN...
 
Study on the Development Model of MDA-Based Enterprise Quality Credit Information System
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Li Zhou, Kui-tong Xian, Bao Li
Issue Date:May 2009
pp. 423-427
Based on detailed expatiation of system development model, the development model and its structure of Model Driven Architecture (MDA) was been discussed according to the development traits of enterprise quality credit information system. Combined with syst...
 
Fuzzy-Logic-Based Rate Adaption Scheme for TFMCC
Found in: Networking and Digital Society, International Conference on
By Haiyuan Ma, Xiangru Meng, Li Zhou, Huan Li, Xiaomin Zhang
Issue Date:May 2009
pp. 238-241
This paper proposes a fuzzy-logic-based rate adaption scheme named FRA in order to enhance the smoothness of TCP-Friendly Multicast Congestion Control (TFMCC). To alleviate oscillation of sending rate for TFMCC sender, FRA introduces five actions for adjus...
 
Research on the Algorithm of Decrypting Encrypted Synchronous Sequential Machine
Found in: Computer Science and Computational Technology, International Symposium on
By Guangyu Zeng, Min Fan, Qingbao Li, Li Zhou
Issue Date:December 2008
pp. 599-602
As the core link of Off-line Reverse Analysis, data collecting can be regarded as decryption of encrypted synchronous Sequential Machine, the key part of which is driving itself from decrypted state to encrypted state by building state transition diagram a...
 
Use Closure of Relevant Sets of Attributes to Efficiently Find Candidate Keys
Found in: Computer Science and Software Engineering, International Conference on
By Hongbo Li, Li Zhou
Issue Date:December 2008
pp. 237-242
Based on canonical cover or minimum cover for functional dependency set F, a data structure MAC is constructed, which facilitates to compute closures of all attributes sets. Using MAC, a fast algorithm of computing closure of an individual set of attribute...
 
Simulating and Modeling of Intake Pipe Fuel Film Dynamic Characteristic under Gasoline Engine Transient Condition
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yi-hu Wu, Huanchun Gong, Lin-li Ou, Li Zhou, Cui Wang
Issue Date:October 2008
pp. 703-707
During the gasoline engine transient process, both fuel quantity and fuel film parameter change, fuel film dynamics balance in intake pipe is destroyed, which makes the fuel quantity from nozzle and fuel quantity into the cylinder not be equaled. Therefore...
 
Multifractal Analysis of Edge Images Detected with Classical Edge Detector
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wei Chen, Xing-xin Chen, Li Zhou
Issue Date:March 2010
pp. 725-727
This paper proposes that multifractal analysis method be adopted for the analysis of edge images detected with classical edge detectors. We analyze the direct multifractal analysis method based on box-counting method with experimental images, and determine...
 
A Soft-Sensing Approach to On-Line Predicting Ammonia-Nitrogen Based on RBF Neural Networks
Found in: Embedded Software and Systems, Second International Conference on
By Changhui Deng, Deyan Kong, Yanhong Song, Li Zhou, Jun Gu
Issue Date:May 2009
pp. 454-458
Measuring ammonia-nitrogen in the aquaculture water is always a problem that how to carry out the on-line monitoring in the process of industrialized culture. There isn’t a more effective method to realize the real time on-line monitoring at present. Some ...
 
New Track Correlation Algorithm of Distributed Multi-sensor System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Weihua Zhang, Hongbo Li, Li Zhou
Issue Date:October 2008
pp. 1087-1090
In multi-target and false alarm scenario, the effect of the traditional optimal track correlation algorithm based on statistics of two local nodes can’t satisfy the need of engineering. A new global optimal track correlation algorithm based on the traditio...
 
An Image Management System Implemented on Open-Source Cloud Platform
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Jian Wan,Shuting Han,Jilin Zhang,Baojin Zhu,Li Zhou
Issue Date:May 2013
pp. 2064-2070
In Cloud computing, the IAAS provides services and calculation to users by virtual machines. The management of virtual machine images not only consumes a huge amount of storage space, but also gives large pressure on network transmission. By using deduplic...
 
VM Co-scheduling: Approximation of Optimal Co-scheduling in Data Center
Found in: Advanced Information Networking and Applications, International Conference on
By Wei Yan, Li Zhou, Chuang Lin
Issue Date:March 2011
pp. 340-347
Multi-resource sharings among virtual machines (VM)are very important in data center, but also bring contentions for cache, disk and network in host server. Recent studies focus primarily on locally optimizing resource sharings in a single server, or globa...
 
Research on Mobile Multimedia Information Service Delivery System Based on SaaS Model
Found in: Intelligent Computation Technology and Automation, International Conference on
By Liu Wen,Xiong Li,Zhou Xuan
Issue Date:March 2011
pp. 1106-1109
With the advent of the digital age, enjoying mobile multimedia information services will become the fashion of customers. How to deliver such services from the providers to the recipients quickly and efficiently has become an important research issue for s...
 
Analysis of Remote Sensing Images of Chinese Mountains Using Box-Counting Dimension Method
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wei Chen, Jia-lin Xu, Li Zhou
Issue Date:May 2010
pp. 671-673
This paper proposes that box-counting dimension method be adopted for the analysis of remote sensing images of Chinese mountains. At first, remote sensing images of half-bared and green Chinese mountains are segmented with a global image threshold value, t...
 
Dynamic Integration Mechanism for Job-Shop Scheduling Model Base Using Multi-agent
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Niu Li, Zhou Hong, Han Xiaoting
Issue Date:December 2009
pp. 421-425
A kind of model base architecture for job-shop scheduling systems is proposed in this paper. In order to meet the complex and changeable requirements of job-shop scheduling problem and fit the specific features of model base management and job-shop schedul...
 
Estimation of Leaf Area Index Using Remote Sensing in the Groundwater-Fluctuating Belt in Lower Reaches of Heihe River, Northwest China
Found in: Environmental Science and Information Application Technology, International Conference on
By Yanhong Jia, Chuanyan Zhao, Li Zhou, Boying Niu
Issue Date:July 2009
pp. 462-465
The leaf area index (LAI) is an important parameter to characterize the canopy evapotranspiration of regional vegetation. For studying the ecological water requirement of vegetation in the groundwater-fluctuating belt in lower reaches of Heihe River, north...
 
A New Method of Transformation of Measurement
Found in: Future BioMedical Information Engineering, International Seminar on
By Pei Li Zhou, Wanjing Cai
Issue Date:December 2008
pp. 449-452
The world is divided according to different scales. When we face a problem, we usually look into the problem from different perspective and then find out the solution. The different perspectives are actually different ways of measuring the object from vari...
 
An ACO for Solving RCPSP
Found in: Computer Science and Computational Technology, International Symposium on
By Li Zhou, Dong Wang, Wuliang Peng
Issue Date:December 2008
pp. 250-253
An improved ant colony optimization (ACO) was developed based on the characteristics of resource-constrained project scheduling problem (RCPSP).
 
Mapping DAG to CGRA Using Min-Max Ant Colony System
Found in: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Li Zhou, Hengzhu Liu
Issue Date:October 2013
pp. 520-523
Coarse-grained reconfigurable array (CGRA) architecture has become popular because of its performance and flexibility. The efficiency of CGRA relies on an efficient application mapping algorithm to exploit parallelisms. In this paper, we formalized the tem...
 
Design of a RS485-to-1553B Bus Bridge
Found in: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Li Zhou, Junshe An
Issue Date:October 2013
pp. 255-258
Based on the analysis on the characteristics of RS485 and 1553B bus, a bus system of 1553B protocol over RS485 transceivers is introduced, which can reduce the mass, size and power of spacecrafts when applied in space missions. Design of a RS485-to-1553B b...
 
Ev-LCS: A System for the Evolution of Long-Term Composed Services
Found in: IEEE Transactions on Services Computing
By Xumin Liu,Athman Bouguettaya,Jemma Wu,Li Zhou
Issue Date:January 2013
pp. 102-115
We propose a system, called EVolution of Long-term Composed Services (Ev-LCS), to address the change management issues in long-term composed services (LCSs). An LCS is a dynamic collaboration between autonomous web services that collectively provide a valu...
 
Memory Pre-synchronization Technology for Application Migration
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Tang Haofu,Wang Huixiang,Xiao Limin,Ruan Li,Zhou Yuanhao
Issue Date:October 2012
pp. 406-411
The rapid development of internet technology and mobile communication technology has brought significant changes to the way in which people retrieve information and experience application service. We believe that application migration can perfectly solve t...
 
Real-time PCR and Immunohistochemistry Detecting the Expression of PETA-3 in Breast Cancer and the Clinical Significance
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Ting Liu,Li Zhou,Wei Rong
Issue Date:May 2012
pp. 864-867
Objective: To observe the relationship between the expression of PETA-3 and clinicopathological factors in breast cancer. Methods: 40 breast cancer samples were detected by the real-time PCR and immunohisto chemical staining to analyze the expression of PE...
 
The Complexity of Routing Algorithm in Small-World Networks
Found in: Computer Science and Electronics Engineering, International Conference on
By Li Zhou,Feng Yan
Issue Date:March 2012
pp. 423-427
Small-World networks have been an active and common topic in many disciplines, including the social and natural sciences. In order to understand the
 
Fast Iris Boundary Location Based on Window Mapping Method
Found in: Computational Intelligence and Security, International Conference on
By Yu Li,Zhou Xue
Issue Date:December 2011
pp. 1127-1130
In recent years, iris recognition has become a hot research topic because it shows outstanding recognition accuracy. Iris boundary location is an essential part in iris recognition because it defines the effective image region used for feature extraction. ...
 
The Study of Boiler Control System of Water Level of Steam Drum Based on New Immune PID Controller
Found in: Digital Manufacturing and Automation, International Conference on
By Li Zhou,Xia Sun
Issue Date:August 2011
pp. 1336-1339
Considering of there is a static error when the conventional PID controller is appLied to adjust the outputs suitably based on the error rate, according to biological immune adjustment principle and combined with conventional PID, a control system in boile...
 
Scene Classification Combining Low-level and Semantic Modeling Strategies
Found in: Digital Manufacturing and Automation, International Conference on
By Li Zhou,Dewen Hu
Issue Date:August 2011
pp. 1071-1075
Scene classification is an important issue in the field of computer vision. AltHough considerable progress has been made, it remains a challenging issue. Most of the current scene classification approaChes are based on either low-level or semantic modeLing...
 
An Incomplete and Dynamic Game Analysis on Behavior between the Owner and Entrepreneur
Found in: Computational Sciences and Optimization, International Joint Conference on
By Li Zhou
Issue Date:April 2011
pp. 677-680
To explain the reason and the condition under which the owner has the motion to pretend or expose his real type of psychological contract, a dynamic game model is constructed in this article, given that entrepreneur's psychological contract is the common k...
 
Protocol Security Testing with SPIN and TTCN-3
Found in: Software Testing Verification and Validation Workshop, IEEE International Conference on
By Li Zhou, Xia Yin, Zhiliang Wang
Issue Date:March 2011
pp. 511-519
Protocol security testing is an important technique to ensure the security of communication protocols. However, methods considering both effective detection to specification vulnerabilities and efficient testing on protocol implementations are not well dev...
 
A Method for Exporting Relational Schema into Document Type Definition
Found in: Information Science and Engieering, International Symposium on
By Li Zhou, Jue Wang
Issue Date:December 2010
pp. 30-32
A method is proposed for publishing relational data into extensional markup language (XML). First, the characteristics of relational schemas represented by Entity-Relation (E-R) diagrams and XML document type definitions (DTDs) are analyzed. Secondly, the ...
 
Chinese Web Information Retrieval Based on Shallow Parsing
Found in: Web Information Systems and Mining, International Conference on
By Zhi-qun Chen, Qi-li Zhou, Rong-bo Wang
Issue Date:October 2010
pp. 206-210
To improve the retrieval performance, shallow parsing technique for text was introduced for Chinese Web information retrieval. Firstly, predicate, prepositive nominal component and succedent nominal component close to the predicate were extracted from Chin...
 
ULMS: An Accelerator for the Applications by Shifting Writing Log from Local Disk to Clouds
Found in: Computer Software and Applications Conference Workshops
By Li Zhou, Yong Zhang, Chunxiao Xing
Issue Date:July 2010
pp. 104-108
Log data is critical to applications and the management and analysis of log data is a hot research topic. Existing log managements are normally tightly integrated with applications themselves, which may lead to problems including performance, local storage...
 
The Design of Agent-Based Intelligent Traffic Visualized Simulation System
Found in: Electrical and Control Engineering, International Conference on
By Li Zhou, Kai Zhao
Issue Date:June 2010
pp. 3066-3069
Based on the Agent technology's simulation autonomy entity characteristics, this paper has studied the structure of traffic system Agent model and Vehicle Agent's driving control strategy, such as Freedom driving, Following driving, Overtaking driving and ...
 
From the China's GEM to See the Reasons for the Success of the Local Venture Capital Companies: Fortune Venture Capital Case Studies
Found in: International Conference on E-Business and E-Government
By Li Zhou,CaiJu Yang
Issue Date:May 2010
pp. 4065-4068
The first 28 enterprises of China's Growth Enterprise Market listed on October 30, 2009 at the Shenzhen Stock Exchange, so a large number of local venture capital companies has been revealed. In this paper we try to analyze the reasons for the success of t...
 
The Generalized Form of Cassical Edge Detecting Masks
Found in: Intelligent Computation Technology and Automation, International Conference on
By Wei Chen, Jia-lin Xu, Li Zhou
Issue Date:May 2010
pp. 825-828
Edge detecting is the most important pre-processing in image analysis, feature extraction and recognition. Gradient is a basilic measure of edge images, and we can calculate the values of magnitude and rotation of edges with it. We analyse the first-order ...
 
The Realization of Simulation of Vehicle Dynamics Model Visualization Based on Simulink and VR Toolbox
Found in: Education Technology and Computer Science, International Workshop on
By Huang Xinjian, Jiang Ruiqing, Cui Li, Zhou Zhaohua
Issue Date:March 2010
pp. 224-227
By making use of V-Realm Builder toolbox of matlab7.1, in this research, Skoda Vehicle Dynamics Visualization (SVDV) was built up. By combining with Simulink, a dynamic system, which was jointed into SVDV to simulate and analyze, was also established. The ...
 
The Research of RFID-Based Indoor Signal Block Positioning System Optimum Interval of Placing Tags
Found in: Computer Engineering and Applications, International Conference on
By Jun Wu, Li Zhou, Zhenting Xiang
Issue Date:March 2010
pp. 266-270
This paper studies the real-time location of human body and objects in indoor environments of several methods, and through reverse thinking, study of a RFID-based indoor signal blocking method for positioning, according to the experimental thinking, we did...
 
Box-Counting Dimension Analysis of Edge Images Detected with Classical Edge Detector
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wei Chen, Xing-xin Chen, Li Zhou
Issue Date:March 2010
pp. 756-758
This paper proposes that box-counting dimension method be adopted for the analysis of edge images detected with classical edge detectors. By using this method, the authors find that the number of ln(N(l)) and ln(l) of binary image is greater than that of e...
 
Congestion Control Algorithm Based on Loss Trend Oriented to Many-to-Many Reliable Multicast
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Liu Li, Zhou Zhong, Liu Dongmei, Wu Wei
Issue Date:May 2009
pp. 93-99
Congestion control algorithms of existing reliable multicast protocols are mainly derived from end-to-end model, which has high resource requirements and sometimes suppresses the package sending too much. Many-to-many reliable multicast requires efficient ...
 
A Simulation of Vehicle Lateral Stability Based on Fuzzy PID Control
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yihu Wu, Cui Wang, Li Zhou, Linli Ou
Issue Date:April 2009
pp. 194-199
In order to improve the lateral stability of the vehicles at a high speed, a parameter self-tuning fuzzy PID Control method to control the yaw moment couple with side slip angle of the front wheel is proposed, and a Fuzzy PID controller is designed. Based ...
 
A Simulation of the Four-Wheel Steering Vehicle Stability Based on DYC Control
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Zhou, Linli Ou, Cui Wang
Issue Date:April 2009
pp. 189-193
In order to improve the lateral stability of the vehicles at a high speed, a DYC control method is applied to four-wheel steering vehicle control. Through model tracking method, a feedback controller which used direct yaw moment as the controlled output ba...
 
 1  2 Next >>