Search For:

Displaying 1-41 out of 41 total
On Partial Order Relations in Granular Computing
Found in: Granular Computing, IEEE International Conference on
By Hongxing Chen, Yuhua Qian, Jiye Liang, Wei Wei
Issue Date:August 2010
pp. 102-106
Information granularity is an approache to measuring uncertainty of an information system in granular computing. Partial order relations are often used to characterize the monotonicity of an uncertainty measure. In this paper, we focus on a generalized par...
A measurement study and implication for architecture design in wireless body area networks
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Yu Ge,Liang Liang,Wei Ni,Aung Aung Phyo Wai,Gang Feng
Issue Date:March 2012
pp. 799-804
Reliability and energy efficiency are two key performance metrics in wireless body area network (WBAN) to meet the requirement of healthcare applications. The network architecture of WBAN has significant impact on transmission performance. In this paper, w...
A Framework to Eliminate Backdoors from Response-Computable Authentication
Found in: 2012 IEEE Symposium on Security and Privacy
By Shuaifu Dai, Tao Wei, Chao Zhang, Tielei Wang, Yu Ding, Zhenkai Liang, Wei Zou
Issue Date:May 2012
pp. 3-17
Response-computable authentication (RCA) is a two-party authentication model widely adopted by authentication systems, where an authentication system independently computes the expected user response and authenticates a user if the actual user response mat...
An Example of Applying Segmentation and Registration in Multi-sensor Data Fusion
Found in: Intelligent Computation Technology and Automation, International Conference on
By Liang Wei, Li Xiaoming, He Jianbin, Wei Hongfei
Issue Date:May 2010
pp. 518-522
Taking an intelligent rehabilitation training system device as an example, the specific method of segmentation and registration is proposed in the process of information fusion in this paper, and the result of actual running test illustrates the effectiven...
Reliability Polynomials of Networks with Vertex Failure
Found in: Computational Intelligence and Security, International Conference on
By Haixing Zhao, Liang Wei
Issue Date:December 2009
pp. 268-271
For a graph $G$ with perfectly reliable edges and unreliable vertices, we consider the reliability of $G$ for which vertices fail independently of each other with a constant probability $p$. The reliability of graph $G$, denoted by $P_n(G, p)$, is defined ...
A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models
Found in: IEEE Transactions on Knowledge and Data Engineering
By Jing Gao,Feng Liang,Wei Fan,Yizhou Sun,Jiawei Han
Issue Date:January 2013
pp. 15-28
Ensemble learning has emerged as a powerful method for combining multiple models. Well-known methods, such as bagging, boosting, and model averaging, have been shown to improve accuracy and robustness over single models. However, due to the high costs of m...
Study of Gas Pipeline Leak Detection Based on Hilbert Marginal Spectrum
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Yang Hedeng,Zhang Laibing,Liang Wei,Ye Yingchun,Ren Yijing
Issue Date:August 2012
pp. 1259-1262
Gas pipeline leakage will lead to great economic losses. So, the study of leak detection on gas pipelines is very important. A leak detection method based on Hilbert-Huang transform (HHT) has been proposed. First, the signal is transformed via HHT, than th...
Study on Leakage Acoustic Signal in Natural Gas Pipeline
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Ye Yingchun,Zhang Laibin,Liang Wei
Issue Date:August 2012
pp. 1244-1247
The leakage is a serious threat to safety in natural gas transportation pipeline system. When the leakage is happening, the acoustic signal is generated by high-speed jet flow from inter pipelines. Leakage acoustic signal propagates within pipelines, and i...
Spatial-temporal Distribution Characteristics of Soil Organic Matter and Total Nitrogen in the Jiuduansha Wetlands of the Yangtze Estuary
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Chi-quan He,Gang Ni,Guang-yuan Zhi,Xia Liang,Wei Du,Yan-ru Lei
Issue Date:May 2012
pp. 1680-1683
The spatial patterns of soil total nitrogen and organic matter was investigated for the Shangsha shoal of Jiuduansha shoals in Yangtze Estuary. Soils had a distinctive seasonal variation in the content of total nitrogen and organic matter, and these change...
Multiscale SSR Tag Cloud Visualization for Biomarker Discovery
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Jhen-Li Huang, Chien-Ming Chen, Tun-Wen Pai, Liang Wei Zeng, Ronshan Cheng
Issue Date:July 2011
pp. 519-523
Tag cloud is an efficient visualization technique to help users rapidly understand the significant components within a tag based dataset. To make practical use of the visualization method, we proposed a cross-comparison mechanism for discovering Simple Seq...
Semiglobal Practical Stabilization of a Class of Nonlinear Systems with Parametric Uncertainty
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yan Liang, Wei Zhang
Issue Date:January 2011
pp. 221-224
This paper investigates the semi global practical stabilization problem of a class of nonlinear systems with parametric uncertainty. In particular, for uncertain systems presenting a cascade structure where the zero-input dynamics of the deriving system is...
Research on the Approach of Task Decomposition in Soccer Robot System
Found in: Digital Manufacturing and Automation, International Conference on
By Jianping Chen, Yimin Yang, Liang Wei
Issue Date:December 2010
pp. 284-289
Task decomposition is an important research topic of mission planning in multi-robot system, which directly influences on the task allocation effect. Aiming at the task decomposition problem of soccer robot system, this paper proposed an approach of task d...
Attribution of Conversion Events to Multi-channel Media
Found in: Data Mining, IEEE International Conference on
By Brendan Kitts, Liang Wei, Dyng Au, Amanda Powter, Brian Burdick
Issue Date:December 2010
pp. 881-886
This paper presents a practical method for measuring the impact of multiple marketing events on sales, including marketing events that are not traditionally trackable. The technique infers which of several competing media events are likely to have caused a...
Targeting Television Audiences Using Demographic Similarity
Found in: Data Mining Workshops, International Conference on
By Brendan Kitts, Liang Wei, Dyng Au, Stefanie Zlomek, Ryan Brooks, Brian Burdick
Issue Date:December 2010
pp. 1391-1399
Targeting advertising on television is difficult due to limitations around ad tracking and ad delivery. This paper describes a new method of television advertising which can work with today’s state of the art broadcast television media. The method works by...
A Key Management Scheme Based Generalized Signcryption in Mobile Ad Hoc Network
Found in: Communications and Intelligence Information Security, International Conference on
By Liang Wei, Chuan-Rong Zhang, Lian-Qing Zheng
Issue Date:October 2010
pp. 117-120
Mobile ad hoc network is a new multi-hop wireless communication network. It has wide application, but it is exposed to kinds of security threats. Key management is vital important in ad hoc network security research field. Firstly the related work about ke...
Design of High-Speed DDC Based Multi-stage
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Chen Ming, Quan HouDe, Zhao Huan, Liang Wei
Issue Date:September 2010
pp. 936-939
This paper presents a multi-stage digital-down-converter (DDC) bases on nπ/4 fixed frequency down-conversion. From the contradiction between high-speed processing and the challenge of FPGAs hardware resources in the typical direct frequency conversion, spe...
Thruster Fault Diagnosis of Autonomous Underwater Vehicles Based on Least Disturbance Wavelet Neural Network
Found in: Computer Modeling and Simulation, International Conference on
By Xiao Liang, Wei Li, Linfang Su, Han Yin, Jun Zhao
Issue Date:January 2010
pp. 78-82
Aiming at the character that the hidden layer wavelet function of wavelet neural network can adjust scale factor and shift factor to affect the outputs of neural network, the least disturbance algorithm adding scale factor and shift factor was proposed. Th...
Modeling and Simulation of Mini Autonomous Underwater Vehicles with Fins
Found in: Computer Modeling and Simulation, International Conference on
By Xiao Liang, Wei Li, Jianguo Lin, Linfang Su, Hui Li
Issue Date:January 2010
pp. 295-299
Because of small volume of the mini autonomous underwater vehicle, the ability to resist the wave and the current disturbance is not ideal enough. The present motion models ignore the effect of the external disturbance, and even ignore the fin effective an...
Model Identification for Autonomous Underwater Vehicles Based on Maximum Likelihood Relaxation Algorithm
Found in: Computer Modeling and Simulation, International Conference on
By Xiao Liang, Wei Li, Jianguo Lin, Linfang Su, Hui Li
Issue Date:January 2010
pp. 128-132
In order to obtain a precise mathematical model of an autonomous underwater vehicle (AUV), model identification based on maximum likelihood relaxation algorithm is proposed in this paper. With experiment data of zigzag motion, the hydrodynamic derivatives ...
Early Warning and Emergency Response System for Water Pollution Accidents in Wuhan City, China
Found in: Environmental Science and Information Application Technology, International Conference on
By Xuying Yuan, Yijin Wu, Shuang Liang, Wei Liao, Liangyue Tian, Xi Huang, Hao Zhang, Bei Huang
Issue Date:July 2009
pp. 171-174
Safe and reliable drinking water is vital to every community. But Water pollution incidents have taken place in China frequently resulting in an enormous economic loss. How to solve the problem becomes a significant issue to scrub the deleterious effects o...
An Algorithm of Glass-Image Recognition Based on Wavelet Packet Decomposition
Found in: Computational Intelligence and Natural Computing, International Conference on
By Hu Liang, Wei ZhiHua
Issue Date:June 2009
pp. 206-209
Wavelet packet decomposition not only has the decompose effect at low-frequency by using wavelet decomposition, but also has the decompose effect at high-frequency where can not do by using wavelet decomposition. In this paper, the wavelet packet decomposi...
A New Embedded Encryption Algorithm for Wireless Sensor Networks
Found in: Information Technology and Applications, International Forum on
By Liang Wei, Xu Jianbo, Tang Mingdong, Huang Li
Issue Date:May 2009
pp. 119-122
The traditional ideas and solutions focusing on network security problems are unsuitable for wireless sensor networks in which storage space and computing power are limited. In order to reduce cost in processor of sensor node, this paper proposes a new emb...
A New Non-linear Cross-Encryption Method for Video Images
Found in: Information Technology and Applications, International Forum on
By Xu Jianbo, Liang Wei, Zhu Liwang, Peng Li
Issue Date:May 2009
pp. 239-242
In view of that the two-dimensional chaotic sequence only holds a low limited-accuracy, as well as the linear complexity of linear feedback shift register generated-sequence is limited, also the generated-sequence is easily decoded. This paper proposes one...
Fuzzy Information Fusion Based Quantitative HAZOP Analysis for Gas Compressor Units
Found in: Intelligent Systems, WRI Global Congress on
By Liang Wei, Zhang Laibin, Hu Jinqiu
Issue Date:May 2009
pp. 423-427
An improved HAZOP modeling and reasoning approach for machine safety assessment based on fuzzy information fusion is proposed in this paper to solve the problems of the quantitative information loss and the safety decision-making difficulty in mechanical s...
Data Mining Technology Based Leak Detection Method for Crude Oil Pipeline
Found in: Computer Science and Information Engineering, World Congress on
By Liang Wei, Zhang Laibin, Ye Yingchun
Issue Date:April 2009
pp. 656-660
It is well known that the work condition of pipeline, the leak included, can be identified by a pressure signal analysis. Because of the high frequency data collection and always on-line pipeline leak detection, the pressure signal brings up massive data. ...
A Novel BP Algorithm for Pipeline Condition Recognition
Found in: Computer Science and Information Engineering, World Congress on
By Zhang Laibin, Ye Yingchun, Liang Wei, Yu Dongliang, Wang Zhaohui
Issue Date:April 2009
pp. 220-224
Because of kinds of regulating commands, Oil and gas pipelines in operation can occasionally generate a series of conditions consisting of stopping transportation, starting transportation, distribution, increment, internal pump regulation of single station...
Oil Pipeline Work Conditions Clustering Based on Simulated Annealing K-Means Algorithm
Found in: Computer Science and Information Engineering, World Congress on
By Ye Yingchun, Zhang Laibin, Liang Wei, Yu Dongliang, Wang Zhaohui
Issue Date:April 2009
pp. 646-650
With regards to the characteristics of work conditions on oil pipeline, such as complicated changes, lack of prior knowledge and difficult classification, simulated annealing K-means clustering algorithm are proposed. Samples, which include various work co...
A Multi-agent Based Architecture for an Assistive User Interface of Intelligent Home Environment Control
Found in: Intelligent Systems Design and Applications, International Conference on
By Chih-Hsien Liang, Wei-Sheng Hung, Ming-Che Hsieh, Chung-Min Wu, Chin-Hsing Luo
Issue Date:November 2008
pp. 335-338
This study proposes a multi-agent based architecture to support the intelligent home environment (IHE) control with an assistive user interface. The architecture is composed of six different agents (including assistive user interface, broke, appliance cont...
Design of Pre-processing Circuit for Wireless ECG Monitoring System
Found in: BioMedical Engineering and Informatics, International Conference on
By Jie Zhu, Nini Rao, Dasong Liang, Wei Chen
Issue Date:May 2008
pp. 598-602
Based on the analysis of Electrocardiograph (ECG) signal’s characteristic, a pre-processing circuit contains amplifiers and de-noising filters for ECG monitoring system is designed. In the stage of low-pass filter, we improve the maximally flat (MF) filter...
Distributed Transmission Power Control for Wireless Sensor Networks
Found in: Communication Networks and Services Research, Annual Conference on
By Xiao Liang, Wei Li, T. Aaron Gulliver
Issue Date:May 2008
pp. 417-421
In wireless networks, transmission power control (TPC) can save energy and decrease transmission latency. Due to the characteristics of wireless sensor networks (WSNs), the TPC has to be distributed, which presents a significant design challenge. We propos...
Automatic Detection of Large Dense-Core Vesicles in Secretory Cells and Statistical Analysis of Their Intracellular Distribution
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Ester Díaz, Guillermo Ayala, María Elena Díaz, Liang-Wei Gong, Derek Toomre
Issue Date:January 2010
pp. 2-11
Analyzing the morphological appearance and the spatial distribution of large dense-core vesicles (granules) in the cell cytoplasm is central to the understanding of regulated exocytosis. This paper is concerned with the automatic detection of granules and ...
A Web based Multipoint Application Model without Real-time Constraints
Found in: Innovative Computing ,Information and Control, International Conference on
By Liang-Wei Wang, Tzao-Lin Lee, Shann-Chiuen Wu
Issue Date:September 2007
pp. 137
This paper presents a web based multipoint communication model which differs from the multimedia conferencing model defined by ITU-T T.120 series of recommendations. The T.120 series are built on top of OSI Transport layer, and are suitable for real-time c...
A New Evaluation Method Based on Variable Range of Triangular Fuzzy Number
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Liang Wei, Feng Dai, Yan Liu, Songtao Wu, Chenggang Cai
Issue Date:August 2007
pp. 98-102
There is a certain extent of the fuzzy measure with the value of samples and standards in evaluation. Based on the theories of the triangular fuzzy number(TFN) and the variable range fuzzy set, the model for fuzzy approaching degree of triangular fuzzy num...
Feature Subset Selection and Ranking for Data Dimensionality Reduction
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Hua-Liang Wei, Stephen A. Billings
Issue Date:January 2007
pp. 162-166
A new unsupervised forward orthogonal search (FOS) algorithm is introduced for feature selection and ranking. In the new algorithm, features are selected in a stepwise way, one at a time, by estimating the capability of each specified candidate feature sub...
A Policy Framework for Collaborative Web Service Customization
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Haiqi Liang, Wei Sun, Xin Zhang, Zhongbo Jiang
Issue Date:October 2006
pp. 197-204
A web service usually serves many consumers, with each consumer having its specific functional or nonfunctional requirements. The web service should be customizable to meet those requirements, as is especially apparent for complex web services with large g...
Target Tracking based on the Dynamic Cluster Method in the Acoustic Sensor Network
Found in: Computer and Information Technology, International Conference on
By Chuanzhi Zang, Yu Haibin, Liang Wei, Jieyin Bai, Guangwei Li
Issue Date:September 2005
pp. 362-367
<p>When finding the moving target in the acoustic sensor network, a dynamic cluster is formed to triangulate the target?s position. While the target is moving, the old cluster is revoked and a new cluster is formed to follow the target. An election s...
The Mold Mobility Model for Mobile Wireless Networks
Found in: Wireless Internet, International Conference on
By Shih-Tsung Liang, Wei-Hsueh Sheng
Issue Date:July 2005
pp. 79-84
In mobile wireless networks, the network performance is expected to be highly correlated with the mobility pattern of mobile hosts. In this paper, we propose a new mobility model called the mold mobility model. Different from existing entity and group mobi...
Intelligent Fault Tolerant Control Using Artificial Neural Networks
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Gary G. Yen, Liang-Wei Ho
Issue Date:July 2000
pp. 1266
As dynamic systems become more complex, experience more rapidly changing environments, and encounter a greater variety of unexpected component failures, solving the control problems of such systems is a grand challenge for control engineers. In this resear...
Detecting stealthy malware with inter-structure and imported signatures
Found in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11)
By Bin Liang, Wei You, Wenchang Shi, Zhaohui Liang
Issue Date:March 2011
pp. 217-227
Recent years have witnessed an increasing threat from kernel rootkits. A common feature of such attack is hiding malicious objects to conceal their presence, including processes, sockets, and kernel modules. Scanning memory with object signatures to detect...
Understanding the benefits of open access in Femtocell networks: stochastic geometric analysis in the uplink
Found in: Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems (MSWiM '13)
By Ben Liang, Wei Bao
Issue Date:November 2013
pp. 237-246
We introduce a comprehensive analytical framework to compare between open access and closed access in two-tier femtocell networks, with regard to uplink interference and outage. Interference at both the macrocell and femtocell levels is considered. A stoch...
Impact of IP mobility on Skype session quality in IEEE 802.11 networks
Found in: Proceedings of the International Conference on Mobile Technology, Applications, and Systems (Mobility '08)
By Jen-Yi Pan, Liang-Wei Huang, Pei-Yuen Chiu
Issue Date:September 2008
pp. 1-21
Prevalent among Voice over Internet Protocol (VoIP) applications, Skype provides high quality voice communication and firewall transparency. To enhance its mobility, particular handheld devices and software on cellular phones designed for Skype have alread...