Search For:

Displaying 1-50 out of 168 total
Compressed Nonnegative Sparse Coding
Found in: Data Mining, IEEE International Conference on
By Fei Wang, Ping Li
Issue Date:December 2010
pp. 1103-1108
Sparse Coding (SC), which models the data vectors as sparse linear combinations over basis vectors, has been widely applied in machine learning, signal processing and neuroscience. In this paper, we propose a dual random projection method to provide an eff...
 
Research on Visualization of Virtual Plant Based on Information Fusion
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Wei-dong Tang, Ping-ping Li
Issue Date:November 2009
pp. 3-6
It is important basis for virtual plant model to dynamically simulate the development process of plant on computer. The features can be extracted from the experimental results, then the plant growth information and environmental information used to be inte...
 
A Web-Based Political Exchange for Election Outcome Predictions
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Sun-Chong Wang, Ching-Yun Yu, Kuang-Ping Liu, Sai-Ping Li
Issue Date:September 2004
pp. 173-178
Prices form in a free market by the interaction of supply and demand. In a highly competitive industry, prices fluctuate. An exchange market provides an arena for investors to exercise speculative opportunities based on their perception of price movements....
 
Detecting Broken Mappings for Deep Web Integration
Found in: Semantics, Knowledge and Grid, International Conference on
By Jia-Jia Miao, Kai Du, Ai-Ping Li, Yan Jia
Issue Date:October 2007
pp. 56-61
The deep web integration system employs a set of semantic mappings between the mediated schema and the schemas of data sources. In this dynamic distributed environment, sources often undergo changes that invalidate the mappings. Such continuous monitoring ...
 
EMI Filter Design for Power Supplies
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wen Xing Li, Chao Feng, Xing Liu, Ping Li
Issue Date:January 2011
pp. 33-36
This paper introduces a method to design the external electromagnetic interference (EMI) filters for switching power supplies. The thesis expounds theory and calculates the filter insertion loss, then analyses the impact of the source impedance and the com...
 
A Fast Sea Interface Reverberation Suppression Method Based on Unitary Transformation
Found in: Digital Manufacturing and Automation, International Conference on
By Yue-qin Li, Jin-ping Li, Lei Han
Issue Date:December 2010
pp. 3-6
The low-rank structure reverberation suppression algorithm is a better method to restrain the sea interface reverberation. But the data processing speed of the method is very slowly due to the complexity of singular value decomposition. It can not meet the...
 
Distinguishing DDoS Attacks from Flash Crowds Using Probability Metrics
Found in: Network and System Security, International Conference on
By Ke Li, Wanlei Zhou, Ping Li, Jing Hai, Jianwen Liu
Issue Date:October 2009
pp. 9-17
Both Flash crowds and DDoS (Distributed Denial-of-Service) attacks have very similar properties in terms of internet traffic, however Flash crowds are legitimate flows and DDoS attacks are illegitimate flows, and DDoS attacks have been a serious threat to ...
 
Reliable Downloading Algorithms for BitTorrent-like Systems
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Ke Li, Wanlei Zhou, Ping Li
Issue Date:October 2009
pp. 167-173
In this paper we study a reliable downloading algorithm for BitTorrent-like systems, and attest it in mathematics. BitTorrent-like systems have become immensely popular peer-to-peer file distribution tools in the internet in recent years. We analyze them i...
 
A Bluetooth-Smart Insulating Container for Cold-Chain Logistics
Found in: 2013 IEEE 6th International Conference on Service-Oriented Computing and Applications (SOCA)
By Pai H. Chou,Cheng-Ting Lee,Zan-Ya Peng,Jo-Ping Li,Tong Kun Lai,Chun-Min Chang,Cheng-Hsun Yang,Yi-Lin Chen,Chin-Chung Nien,Li-Huei Chen,Li-Yen Lai,Jen-Chao Lu,Shang-Chih Hung
Issue Date:December 2013
pp. 298-303
This paper describes an intelligent insulating shipping container (IISC) and the supporting backend for cold-chain logistics. Each IISC can monitor the interior temperature of the container during shipping of temperature-sensitive items and alerts the deli...
 
Blind Estimation of Communication Emitter Feature Parameters
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Jia Yong-qiang,Li Li-Ping,Li You-Zhu,Gan Lu
Issue Date:October 2012
pp. 281-285
In this paper, the problem of blind estimation of the convolutional interleaving parameters, an important feature parameters of communication emitter, is studied. The unitive mathematical model of the convolutional interleaver was presented and the blind e...
 
Multi-label Classification based on Association Rules with Application to Scene Classification
Found in: Young Computer Scientists, International Conference for
By Bo Li, Hong Li, Min Wu, Ping Li
Issue Date:November 2008
pp. 36-41
In this paper, a multi-label classification based on association rules is proposed. To deal with multiple class labels problem which is hard to settle by existing methods, this algorithm decomposes multi-label data to mine single-label rules, then combines...
 
Voltage Transfer Characteristic Analysis of Dual-Bridge Matrix Converter
Found in: Intelligent Computation Technology and Automation, International Conference on
By Zhiyong Li, Hao Cai, Xiaoying Li, Haixia Chen, Ping Li
Issue Date:October 2008
pp. 1184-1188
A lot of research has been made on space vector modulation (SVM) strategy of matrix converter (MC), but research on over modulation strategy of MC is almost blank. This paper analyzed conventional control theory of dual-bridge MC, derived voltage transmiss...
 
A Novel Modulation Strategy and Simulation Study for Matrix Converter
Found in: Intelligent Computation Technology and Automation, International Conference on
By Hao Cai, Zhiyong Li, Xiaoying Li, Haixia Chen, Ping Li
Issue Date:October 2008
pp. 961-964
A novel over modulation strategy for matrix converter (MC) is put forward on the basis of conventional AC/DC/AC MC control theory. First, fictitious AC/DC rectifier is over modulated to get the greatest dummy DC voltage, then a novel over modulation strate...
 
A New Multi-task Learning Method for Personalized Activity Recognition
Found in: Data Mining, IEEE International Conference on
By Xu Sun,Hisashi Kashima,Ryota Tomioka,Naonori Ueda,Ping Li
Issue Date:December 2011
pp. 1218-1223
Personalized activity recognition usually faces the problem of data sparseness. We aim at improving accuracy of personalized activity recognition by incorporating the information from other persons. We propose a new online multi-task learning method for pe...
 
Learning a Bi-Stochastic Data Similarity Matrix
Found in: Data Mining, IEEE International Conference on
By Fei Wang, Ping Li, Arnd Christian König
Issue Date:December 2010
pp. 551-560
An idealized clustering algorithm seeks to learn a cluster-adjacency matrix such that, if two data points belong to the same cluster, the corresponding entry would be 1, otherwise the entry would be 0. This integer (1/0) constraint makes it difficult to fi...
 
Key Technology Research on Intelligent CAPP System Based on PDM
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Guang yao Cheng, Lei Lei, Ping ping Li
Issue Date:October 2010
pp. 896-902
The multi-level parts feature information modeling and process feature information modeling were proposed to realize the integration of CAD / CAPP based on PDM framework, which was built on the analysis for the processing characteristics of shaft parts of ...
 
Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection
Found in: Network and System Security, International Conference on
By Ping Li, Wanlei Zhou, Yini Wang
Issue Date:September 2010
pp. 377-382
Stepping stone attacks are often used by network intruders to hide their identities. The Round Trip Times (RTT) between the send packets and corresponding echo packets for the connection chains of stepping stones are critical for detecting such attacks. In...
 
A Quick-Response Real-Time Stepping Stone Detection Scheme
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Ping Li, Wanlei Zhou, Yanli Yu
Issue Date:September 2010
pp. 677-682
Stepping stone attacks are often used by network intruders to hide their identities. To detect and block stepping stone attacks, a stepping stone detection scheme should be able to correctly identify a stepping-stone in a very short time and in real-time. ...
 
Multi-Parameters Study on Landfill Pole-Dipole Leak Detection
Found in: Modeling, Simulation and Visualization Methods, International Conference on
By Yang Ping, Li Jinping, Ren Liying, Dong Lu
Issue Date:May 2010
pp. 50-53
The theoretical model of pole- dipole landfill leak detection and the parameters that influence the location results are studied in this paper. Parametric curves for a single leak show that the greater the thickness of the media above the liner, and the gr...
 
Research on the Storage Stability Test Method of SBS Modified Asphalt
Found in: Intelligent Computation Technology and Automation, International Conference on
By Ping Li, Linning Liu, Zhu Sun
Issue Date:May 2010
pp. 178-181
With regard to the shortcomings of present storage stability test, a new instrument was developed and was used in studying the storage stability of SBS modified asphalt. Test results indicate that there is not relation between single asphalt component with...
 
Layered Task Allocation in Multi-robot Systems
Found in: Intelligent Systems, WRI Global Congress on
By Ping Li, Yi-min Yang, Jia-le Lian
Issue Date:May 2009
pp. 62-67
A layered task allocation method is presented for multi-robot systems in a collaboration and adversarial, dynamic, real-time environment with unreliable communication in this paper. The process of task allocation is divided into three layers: task decompos...
 
Computationally Efficient Estimators for Dimension Reductions Using Stable Random Projections
Found in: Data Mining, IEEE International Conference on
By Ping Li
Issue Date:December 2008
pp. 403-412
The method of stable random projections is an efficient tool for computing the lα distances using low memory, where 0 < α ≤ 2 may be viewed as a tuning parameter. This method boils down to a statistical estimation task and various estimators have been p...
 
Analysis on Node's Pairwise Key Path Construction in Sensor Networks
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Ping Li, Ya-Ping Lin, Jiaying Wu, Jingming Xue
Issue Date:September 2008
pp. 506-512
Key pre-distribution schemes based on regular network such as hypercube have several advantages. Examples are lower storage cost and ability to find a proper key path more quickly. However, the probability to establish direct keys is fairly low. Based on a...
 
GIS Based System Integrated with Spatial Image Processing Function for Disaster Reduction
Found in: Image and Signal Processing, Congress on
By Ping Li, Xiaxin Tao
Issue Date:May 2008
pp. 155-159
The disaster reduction systems are most based on GIS, and the core idea of those systems is the past earthquake experiences. Remote sensing image processing can help government assess earthquake damage quickly. Taking this technology integrated with the qu...
 
Multiple Time-delay Smart Deception Jamming to Pseudo-random Code Phase Modulation Fuze
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Xiaopeng Yan,Yongliang Li,Ping Li,Jiantao Wang
Issue Date:March 2012
pp. 428-432
In order to jam the pseudo-random code phase modulation (PRCPM) fuze, a new jamming method based on multiple time-delay smart deception has been developed. By analyzing the principle of PRCPM fuze, the model of multiple time-delay smart deception Jamming s...
 
NV-DICE: A Ferroelectric Nonvolatile DICE Storage Element for Tolerance to Single Event Upsets
Found in: Intelligent System Design and Engineering Application, International Conference on
By Ya-Hong Zhai,Wei Li,Ping Li,Bin Hu,Ke Gu,Xue Fan
Issue Date:January 2012
pp. 1281-1284
This paper proposes a new nonvolatile Dual Interlocked Cell (NV-DICE) storage element. The cell includes a DICE latch and four backup ferroelectric capacitors. It can perform store automatically when the power is off abruptly and has high tolerance to SEU....
 
Semi-Blind Channel Estimation for MIMO-OFDM Systems
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wen Xing Li, Ping Li, Xing Liu, Chao Feng
Issue Date:January 2011
pp. 217-220
In the MIMO-OFDM system channel estimation based on the superimposed pilot is one of most potential and powerful techniques for broad-band wireless communications. In most traditional algorithms, the channel parameters are estimated by calculating the firs...
 
The Research of Beamforming in WiMAX System
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wen Xing Li, Xing Liu, Chao Feng, Ping Li
Issue Date:January 2011
pp. 915-917
As the close-loop beam forming needs to occupy extra system resource, the proposed paper presents two scenarios for open-loop beam forming, according to the 802.16e protocol. With utilizing pilots in uplink data zone and fast-feedback zone, it estimates th...
 
Compound Fuzzy PID Level Control System Based on WinCC and MATLAB
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Qian Linlin, Li Ping, Li Hongxing
Issue Date:January 2011
pp. 757-760
The simulation, verification and realization of complex control arithmetic are introduced in detail. A compound Fuzzy PID level control system is realized on Siemens PROFINET platform. The communication method between supervision configuration software Win...
 
Control Strategy for Three Phase Inverter Supply Based on Back-to-Back
Found in: Electrical and Control Engineering, International Conference on
By Zhu Haibin, Li Yaohua, Wang Ping, Li Zixin
Issue Date:June 2010
pp. 633-636
The paper is talked about a 3-phase 4-leg style of supply system. The part of converter is a power-factor variable and can be decreased the pollution of power net. While the converter can be adapted to the input line voltage's fluctuation. The bus DC volta...
 
Modeling and Dynamic Response Simulation of GTO-Based STATCOM
Found in: Electrical and Control Engineering, International Conference on
By Huang Shao-Ping, Li Yong-Jian, Jin Guo-Bin, Li Ling
Issue Date:June 2010
pp. 1293-1296
The Static Synchronous Compensator (STATCOM) is a shunt device using power electronics to control power flow and improve transient stability on power grids. A model of a 100Mvar GTO-based STATCOM on a 500kV transmission system is built and its dynamic resp...
 
Forecast of Systemic Parameter Drift Based on Monte Carlo Simulation
Found in: Computing, Control and Industrial Engineering, International Conference on
By Wan Qing, Li Min, Duan Ping, Li Jia
Issue Date:June 2010
pp. 412-415
This essay mainly concerns on the degree of systemic parameter drift in process of product life cycle, by establishing the function of system structure and using simulation software to imitate the process of drift. It not only gets the degree of systemic p...
 
The Optimization Implementation of High Performance Video Decoder Based on C6416 DSP
Found in: International Conference on E-Business and E-Government
By Li Ma,Jianbin Song,Ping Li,Xiuying Wang
Issue Date:May 2010
pp. 4890-4893
With the development of the multimedia and network technology, video applications such as VOD, video-phone etc. are used more and more widely in our life. Consider by the high performance and easy implementation, we select TMS320 c6416 DSP platform and imp...
 
A Fast Skip-Mode Selection Algorithm Based on All-Zero Block Check in H.264
Found in: International Conference on E-Business and E-Government
By Li Ma,Jianbin Song,Liping Xiao,Ping Li
Issue Date:May 2010
pp. 3498-3501
H.264 is newest high performance video encoding standard that is attributed to applying several new efficient compress methods such as multiply mode inter frame encoding. There are many coding mode including different-size block mode and skip mode in inter...
 
The Selection of Optimal Wavelet Basis for Radio Fuze Jamming Identification
Found in: Modeling, Simulation and Visualization Methods, International Conference on
By Yue-qin Li, Jian-Fang Wang, Jin-ping Li
Issue Date:May 2010
pp. 90-93
Analyzing the singularity and determining the singularity position of the signal using wavelet technology is the effective method to realize the jamming identification for radio fuze. But it is the important thing to choose the favorable wavelet base for a...
 
Robust Image Copy Detection Using Local Invariant Feature
Found in: Multimedia Information Networking and Security, International Conference on
By Fuhao Zou, Hefei Ling, Xiaowei Li, Zhihua Xu, Ping Li
Issue Date:November 2009
pp. 57-61
This paper proposes a novel geometric distortion resilient image copy detection scheme based on Scale Invariant Feature Transform (SIFT) detector. By using the SIFT detector, the proposed copy detection scheme first construct a series of robust, homogenous...
 
The Hardware and Software Design of LCD Display of Intelligent Analysis Instrument Based on S3C2410 Processor
Found in: Software Engineering, World Congress on
By Wei Li, Heng Yang, Ming Chen, Ping Li
Issue Date:May 2009
pp. 167-171
This intelligent analysis instrument is equipped TFT LCD as displaying terminal. First, timing and logic requirements of a typical TFT LCD are introduced. Hardware circuit between microprocessor S3C2410 and TFT LCD module are designed. Then, based on Windo...
 
Uncertainty Analysis to the Decision Rule of Incomplete Information System
Found in: Information Technology and Applications, International Forum on
By Li Ping, Li Fang, Wu Qizhong
Issue Date:May 2009
pp. 457-460
In an incomplete information system, the measurement of rule's uncertainty is different from that in the complete information system. On the condition of restrict similarity relation, the properties of certainty and coverage factor of decision rule is disc...
 
A Multiple Regression Model for Predicting Comfort Sensation of Knitted Fabric in Sports Condition Based on Objective Properties
Found in: Information and Computing Science, International Conference on
By Min Li, Dong-Ping Li, Wei-Yuan Zhang, Xiao-Zhong Tang
Issue Date:May 2009
pp. 372-375
Clothing comfort is a state of satisfaction indicating physiological, psychological and physical balance among the person. Though objective experiments are easy to measure, subjective experiment is rated an end-use performance test to collect the comfort s...
 
Factor Analysis on Subjective Attributes Affecting Knitted Fabric's Comfort Sensation
Found in: Database Technology and Applications, International Workshop on
By Min Li, Dong-Ping Li, Wei-Yuan Zhang, Xiao-Zhong Tang
Issue Date:April 2009
pp. 695-698
Clothing comfort is a state of satisfaction indicating physiological, psychological and physical balance among the person. Subjective experiment is rated an end-use performance test to collect the comfort sensation of wears. In this paper, 20 samples are c...
 
An Improved Algorithm Based on EMD-Wavelet for ECG Signal De-noising
Found in: Computational Sciences and Optimization, International Joint Conference on
By Nianqiang Li, Ping Li
Issue Date:April 2009
pp. 825-827
In this paper we present an improved algorithm based on EMD-Wavelet for ECG(electrocardiogram) signal de-noising. This method has the advantages of both EMD (Empirical Mode Decomposition) and wavelet adaptive thresholding algorithm for the actual gathering...
 
A Switching Method Based on FD and WTMM for ECG Signal Real-Time Feature Extraction
Found in: Computational Sciences and Optimization, International Joint Conference on
By Nianqiang Li, Ping Li
Issue Date:April 2009
pp. 828-830
ECG (Electrocardiogram) signal real-time feature extraction meets the requirements of some smart cardiac home care systems which can automatically extract ECG feature outside the hospital. In this paper, we discuss a real-time method based on FD (first der...
 
Research on Polarization Parameter Extraction in Radar Reconnaissance
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Xiaopeng Yan, Ping Li, Yueqin Li, Jiantao Wang
Issue Date:December 2008
pp. 997-1001
No summary available.
 
Image Speckle Reduction and Coherence Enhancement in Underwater Ultrasonic Imaging Based on Wavelet Transform
Found in: Computer Science and Software Engineering, International Conference on
By Xiaopeng Yan, Ping Li, Yueqin Li, Fengkai Xu
Issue Date:December 2008
pp. 145-148
In order to reduce the underwater ultrasonic image speckles and to enhance the image characteristics, an anisotropic diffusion model is established based on the wavelet transform in this paper. At the same time, it also provides the steps of the algorithmi...
 
An Evaluation Index Based on Parameter Weight for Image Inpainting Quality
Found in: Young Computer Scientists, International Conference for
By Song Wang, Hong Li, Xia Zhu, Ping Li
Issue Date:November 2008
pp. 786-790
Traditional image quality evaluation index cannot explicitly reflect image inpainting quality. In order to make more reasonable measures on image inpainting, this paper proposed an evaluation method based on parameter weight through analyzing the reason fo...
 
Clustering Application of SVM in Mobile Ad Hoc Network
Found in: Intelligent Computation Technology and Automation, International Conference on
By Haixia Chen, Ronghua Du, Ping Li, Xiaying Li
Issue Date:October 2008
pp. 924-926
Support vector machine (SVM) is trained to classify the mobile nodes as cluster-head nodes or member nodes in this paper. The improved method of SVM is presented. Based on SVM, The process of the classification and clustering is designed .The trained SVM w...
 
An Empirical Study on the Structure of Organizational Learning and Organizational Performance
Found in: Advanced Learning Technologies, IEEE International Conference on
By Li Zhang, Qiong Jia, Ping Li
Issue Date:July 2008
pp. 189-193
This paper does an empirical study on the structure of organizational learning and organizational performance based on the core competitive capability view. The structure provides a path that how is the organizational learning interdependent with innovatio...
 
A Conceptual Structure for Organizational Learning and Organizational Performance
Found in: Advanced Learning Technologies, IEEE International Conference on
By Li Zhang, Qiong Jia, Ping Li
Issue Date:July 2007
pp. 41-42
This paper constructs a conceptual structure for organizational learning and organizational performance based on the core competitive capability view. Based on the research of organizational learning process, we use the core learning capability as the clue...
   
Using Dynamic Copula Method for CDO Pricing
Found in: Information Science and Engineering, International Conference on
By Zezheng Li, Ping Li
Issue Date:December 2009
pp. 4618-4621
This paper extends the copula method in CDO pricing to dynamic copula model. As one can see, financial data often cover a long time period and dependent structure between different time series always tends to change instead of to keep static. So using dyna...
 
Compact Video Synopsis via Global Spatiotemporal Optimization
Found in: IEEE Transactions on Visualization and Computer Graphics
By Yongwei Nie, Chunxia Xiao, Hanqiu Sun, Ping Li
Issue Date:October 2013
pp. 1664-1676
Video synopsis aims at providing condensed representations of video data sets that can be easily captured from digital cameras nowadays, especially for daily surveillance videos. Previous work in video synopsis usually moves active objects along the time a...
 
 1  2 Next >>