Search For:

Displaying 1-9 out of 9 total
Geometric properties of multiple reflections in catadioptric camera with two planar mirrors
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Xianghua Ying, Kun Peng, Ren Ren, Hongbin Zha
Issue Date:June 2010
pp. 1126-1132
A catadioptric system consisting of a pinhole camera and two planar mirrors is deeply investigated in this paper. The two mirrors combine to form a corner and face-to-face with the pinhole. Their relative pose is unknown. An object will be reflected in the...
 
Affective Assessment by Digital Processing of the Pupil Diameter
Found in: IEEE Transactions on Affective Computing
By Peng Ren,Armando Barreto,Ying Gao,Malek Adjouadi
Issue Date:January 2013
pp. 2-14
Previous research found that the pupil diameter (PD) can be an indication of affective state, but this approach to the detection of the affective state of a computer user has not been investigated fully. We propose a new affective sensing approach to evalu...
 
Hybrid Dynamic Modeling and MPPT Control for Photovoltaic Power Generation System
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Chen Peng, Ren Shibin, Li Wenhua, Wang Haitao
Issue Date:January 2011
pp. 336-339
Photovoltaic power generation system had been paid more and more attention. Photovoltaic power generation system was a nonlinear system, which was decided by the nonlinear characteristic of photovoltaic cell and power electronic device. In this paper, acco...
 
Design of Optimization Filter Based on Novel Immune Algorithm
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Chen Peng, Ren Shibin, Li Wenhua, Wang Haitao
Issue Date:January 2011
pp. 990-993
With the increase of nonlinear load in electric network, Optimization design of filter was more and more important for electric network safe and economical operation. In this paper, for multi-Objective, with strategy of antibody concentration with sufficie...
 
Unequal Clustering Scheme Based LEACH for Wireless Sensor Networks
Found in: Genetic and Evolutionary Computing, International Conference on
By Peng Ren, Jiansheng Qian, Leida Li, Zhikai Zhao, Xiaobin Li
Issue Date:December 2010
pp. 90-93
Clustering technique is an effective topology control approach which can improve the scalability and lifetime in wireless sensor networks (WSNs). LEACH is a classical clustering algorithm for low energy scheme, however, it still have some deficiencies. Thi...
 
Optimization Design of Power Factor Correction Converter Based on Genetic Algorithm
Found in: Genetic and Evolutionary Computing, International Conference on
By Hai Peng Ren, Ting Zheng
Issue Date:December 2010
pp. 293-296
A small-signal model is used to design the controller parameters of the conventional Power Factor Correction (PFC) converter. The dynamics of the converter is nonlinear, therefore, it is hard to derive desirable performance. Genetic algorithm is used to op...
 
Energy Balancing Multi-path Routing for Wireless Sensor Networks
Found in: Genetic and Evolutionary Computing, International Conference on
By Peng Ren, Wang Xueying
Issue Date:December 2010
pp. 570-573
This article presents a new flooding routing protocol for wireless sensor networks based on a Location-Aided data dissemination scheme. This protocol uses node’s information to select proper routing path in virtual grids, thereby balancing energy consumpti...
 
Energy-Balanced Scheme Based Unequal Density of Backbone for Wireless Sensor Networks Under Coal Mine
Found in: Information Technology and Computer Science, International Conference on
By Peng Ren, Qian Jian-sheng, Sun Yan-jing, Jiang Hai-feng, Lu Zhao-lin
Issue Date:July 2010
pp. 56-59
In order to solve uneven data throughput phenomenon for wireless sensor networks under coal mine, which cause “hot spots” problem, energy-efficient uneven clustering scheme based on the energy and distribution density of cluster heads ( UCS-ED ) is propose...
 
Decision Trees Generation Based on Fault Trees Analysis
Found in: Information Technology and Applications, International Forum on
By Yongjian Tao, Decun Dong, Peng Ren
Issue Date:May 2009
pp. 178-180
Notice of Violation of IEEE Publication Principles <br/><br/>
 
 1