Search For:

Displaying 1-50 out of 2,130 total
Electronic Reader for the Blind Based on MCU
Found in: Electrical and Control Engineering, International Conference on
By Huang Xiaoli, Li Tao, Hu Bing, Cheng Qiang, Xiao Qiang, Huang Qiang
Issue Date:June 2010
pp. 888-890
Based on AT89S52 MCU designed a blind people e-reader. Details are given in the e-reader hardware and software design. This blind e-reader can convert any Chinese or English document in the computer into corresponding Braille code available to the blind, t...
 
Case Study of ATPG-based Bounded Model Checking: Verifying USB2.0 IP Core
Found in: Computer Design, International Conference on
By Qiang Qiang, Qiang, Chia-Lun Chang, Daniel G. Saab, Jacob A. Abraham
Issue Date:October 2005
pp. 461-463
<p>This paper presents the ATPG performances of verifying USB2.0 IP core. Using the USB protocol and typical properties, the ATPG-based bounded model checking mechanism is revealed. Heuristics to accelerate the ATPG search are presented and their imp...
 
Image Denoising Based on Wave Atoms and Cycle Spinning
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Zhang Wei-Qiang,Song Yi-Mei,Feng Ji-Qiang
Issue Date:November 2012
pp. 310-313
A new method for image denoising was presented", "which colligated the strong point of wave atoms transform and Cycle Spinning. Due to lack of translation invariance of wave atoms transform", "image denoising by coefficient thresholding...
 
Introduction to special issue on computational sustainability
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Carla Gomes, Qiang Yang, Qiang Yang
Issue Date:July 2011
pp. 1-2
Interactions of protein domains control essential cellular processes. Thus, inferring the evolutionary histories of multidomain proteins in the context of their families can provide rewarding insights into protein function. However, methods to infer these ...
     
The Simulation and Implementation of Discrete Particle System based on CUDA
Found in: Business Computing and Global Informatization, International Conference on
By Huang Qiang-qiang, Jiang Shun-liang, Xu Shao-ping, Dong Tian-wen
Issue Date:July 2011
pp. 501-504
In this paper, NVIDIA's parallel computing architecture CUDA is used to implement a discrete particle simulation system. In the neighbor search part, an algorithm based on hash list is used. In the collision part, the stream of CUDA is used to split one st...
 
Review of Generation Schedule Methods with Large-Scale Wind Power Integration
Found in: Asia-Pacific Power and Energy Engineering Conference
By Bin Liu, Jingyang Zhou, Yi Pan, Qiang Li, Haiming Zhou, Qiang Ding
Issue Date:March 2011
pp. 1-4
NA
 
Development of Simulation and Analysis Software of Temperature Control for Massive Concrete Construction
Found in: Software Engineering, World Congress on
By Zhi-qiang Xie, Sheng Qiang, Xiao Sun, Wei Shuai, Rui Zheng
Issue Date:December 2010
pp. 233-236
According to the shortage of analysis software for temperature control while massive concrete structures were widely used, the special temperature control aided analysis software (TCAS) was developed. A mature Fortran program was applied with a precise met...
 
Hybrid SVM/HMM Method for Tool Wear Intelligence Measure in Cutting Process
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Shao Qiang, Shao Cheng, Shao Qiang, Kang Jing
Issue Date:November 2010
pp. 525-529
A new method of tool wear intelligence measure based on Support Vector Machine(SVM) and Hidden Markov Models (HMM) is proposed to monitor tool wear and to predict tool failure. At first, FFT features are extracted from the model signal of the tool in cutti...
 
The Processing Method of Chinese Characters in TCL Scripting Language
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By ZhangYong Qiang, Wang Qiang
Issue Date:October 2010
pp. 398-400
For solving the difficult problem of testing Chinese characters in TCL scripting language (ActiveTcl 8.5.7.0), deeping analysis of the TCL language processing mechanism about the Chinese characters, prposing one processing method of Chinese characters base...
 
Control System Based on Fieldbus for the Workshop of Unloading Coal Precipitator
Found in: Computing, Control and Industrial Engineering, International Conference on
By Zi-sheng Zhang, Chao Cui, Qing Hao, Qiang Liu, Ji-guang Wang, Zhi-qiang Liu, Qing Li
Issue Date:June 2010
pp. 140-143
The fieldbus technology is applied to the auto-control system of the coal unload workshop. The setting-up of the model, the design and the realization of the fieldbus control system are discussed. High-low voltage control systerm structure is analysed. Har...
 
The Analysis of the application about MA in e-commerce
Found in: International Conference on E-Business and E-Government
By Wang Xing-yu,Zhou Qiang-qiang
Issue Date:May 2010
pp. 380-383
A series of security problems face to e-commerce systems based on Mobile Agent has restricted its development. In this paper, by making a behavior analysis for MA at different stages of e-commerce, minimize the security risks by using different access patt...
 
Efficient affinity-based edit propagation using K-D tree
Found in: ACM Transactions on Graphics (TOG)
By Kun Xu, Shi-Min Hu, Tao Ju, Tian-Qiang Liu, Yong Li, Kun Xu, Shi-Min Hu, Tao Ju, Tian-Qiang Liu, Yong Li
Issue Date:December 2009
pp. 1-2
Image/video editing by strokes has become increasingly popular due to the ease of interaction. Propagating the user inputs to the rest of the image/video, however, is often time and memory consuming especially for large data. We propose here an efficient s...
     
The Research of Feasibility Analysis and Risk Prevention Measures of Zero Inventory
Found in: Future Information Technology and Management Engineering, International Seminar on
By Cui-yun Mao, Qiang Mei, Zhi-qiang Ma
Issue Date:December 2009
pp. 69-72
Zero inventory is the special concept of the stock, which is also an important classification concept in industrial enterprises and commercial enterprises. Whether the enterprise is suitable for the implementation of the zero inventory management and how t...
 
A New Method for Information System Selection
Found in: Future Information Technology and Management Engineering, International Seminar on
By Cui-yun Mao, Qiang Mei, Zhi-qiang Ma
Issue Date:December 2009
pp. 65-68
A good information system (IS) makes it possible to improve organizational efficiency and effectiveness, which can provide competitive advantage. Now the most of company through the purchase of existing information systems to complete the construction of e...
 
A PSO-Based Ball-Plate Calibration for Laser Scanner
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Qiang Zhao, Yongheng Yue, Qiang Guan
Issue Date:April 2009
pp. 479-481
Three coordinate laser scanner is one of the important equipments in geometric measurement and reverse engineering fields. The rapid development of manufacture precision towards precise or ultra-precise direction requires higher scanning precision. Calibra...
 
Conceptual Design Knowledge Retrieval, Reuse and Innovation Based on Case and Constraint
Found in: International Workshop on Knowledge Discovery and Data Mining
By Kai-zhou Gao, Quan-ke Pan, Qiang-qiang Sun
Issue Date:January 2009
pp. 163-166
This paper researches on knowledge retrieval, reuse and innovation in product conceptual design. First, user’s design requirement is translated and decomposed using function-method tree. Second, design case and constraint are used to describe a two-layer p...
 
A Mutual-Information-Based Approach to Entity Reconciliation in Heterogeneous Databases
Found in: Computer Science and Software Engineering, International Conference on
By Bao-hua Qiang, Jian-qing Xi, Bao-hua Qiang
Issue Date:December 2008
pp. 666-669
Entity reconciliation is crucial to data interoperability in heterogeneous databases. In our previous research works, we proposed an entities matching algorithm based on attribute entropy to identify the corresponding entities, which can resolve the limita...
 
Binary Trademark Image Retrieval Using Region Orientation Information Entropy
Found in: Computational Intelligence and Security Workshops, International Conference on
By Cai-kou Chen, Qiang-qiang Sun, Jing-yu Yang
Issue Date:December 2007
pp. 295-298
This paper presents a new trademark image retrieval method based on the region orientation information entropy. In the first stage, image is rotated according to principal orientation, and the object region in the rotated image is extracted. Then, the obje...
 
A Novel Algorithm for Identifying Corresponding Attributes in Heterogeneous Databases
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Bao-hua Qiang, Ling Chen, Bao-hua Qiang, Jian-qing Xi, Zhong-fu Wu
Issue Date:August 2007
pp. 459-463
Identifying corresponding attributes is an important issue to realize data sharing and interoperability in heterogeneous databases. The main approaches at present adopted predefined rules to evaluate the similarity of attributes by comparing all attributes...
 
A Sequential Monte Carlo Approach to Anomaly Detection in Tracking Visual Events
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Peng Cui, Li-Feng Sun, Zhi-Qiang Liu, Shi-Qiang Yang
Issue Date:June 2007
pp. 1-8
In this paper we propose a technique to detect anomalies in individual and interactive event sequences. We categorize anomalies into two classes: abnormal event, and abnormal context, and model them in the Sequential Monte Carlo framework which is extended...
 
Reducing verification overhead with RTL slicing
Found in: Proceedings of the 17th great lakes symposium on Great lakes symposium on VLSI (GLSVLSI '07)
By Daniel G. Saab, Jacob A. Abraham, Jen-Chieh Ou, Qiang Qiang
Issue Date:March 2007
pp. 399-404
Design complexity is increasing with every technology generation, causing verification tools to require large amounts of resources. In this paper, we develop a technique to reduce the complexity of verifying digital designs described in a Hardware Descript...
     
Dynamic indexing for multidimensional non-ordered discrete data spaces using a data-partitioning approach
Found in: ACM Transactions on Database Systems (TODS)
By Gang Qian, Qiang Xue, Qiang Zhu, Sakti Pramanik
Issue Date:June 2006
pp. 439-484
Similarity searches in multidimensional Non-ordered Discrete Data Spaces (NDDS) are becoming increasingly important for application areas such as bioinformatics, biometrics, data mining and E-commerce. Efficient similarity searches require robust indexing ...
     
A space-partitioning-based indexing method for multidimensional non-ordered discrete data spaces
Found in: ACM Transactions on Information Systems (TOIS)
By Gang Qian, Qiang Xue, Qiang Zhu, Sakti Pramanik
Issue Date:January 2006
pp. 79-110
There is an increasing demand for similarity searches in a multidimensional non-ordered discrete data space (NDDS) from application areas such as bioinformatics and data mining. The non-ordered and discrete nature of an NDDS raises new challenges for devel...
     
Checking Nested Properties Using Bounded Model Checking and Sequential ATPG
Found in: VLSI Design, International Conference on
By Qiang Qiang, Daniel G. Saab, Jacob A. Abraham
Issue Date:January 2006
pp. 225-230
This paper develops a novel approach to formally verify nested VLSI circuit properties, using bounded model checking and gate-level sequential ATPG tools. This approach improves the verification quality by devising an algorithm that checks nested realistic...
 
Design of a CMOS Operational Amplifier for Extreme-Voltage Stress Test
Found in: Asian Test Symposium
By Shaolei Quan, Qiang Qiang, Chin-Long Wey
Issue Date:December 2005
pp. 70-75
Previous work on extreme-voltage stress test of analog ICs has suffered either from time-costly circuit-level simulation or from the considerable number of bits in the control signal added to circuit for stress operation. This paper presents several fully-...
 
A probabilistic template-based approach to discovering repetitive patterns in broadcast videos
Found in: Proceedings of the 13th annual ACM international conference on Multimedia (MULTIMEDIA '05)
By Peng Wang, Shi-Qiang Yang, Zhi-Qiang Liu
Issue Date:November 2005
pp. 407-410
There are usually repetitive sub-segments in broadcast videos, which may be associated with high-level concepts or events, e.g., news footage, repeated scores in basketball. Unsupervised mining techniques provide generic solutions to discovering such tempo...
     
Adaptive beamforming of cyclic signal and fast implementation
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Qiang Wu, Qiang Wu
Issue Date:April 1994
pp. 157-160
Recently, it has been proposed to apply array beamforming in digital mobile communication systems, such as mobile cellular communication systems and mobile-satellite communication systems, in order to increase channel capacity and suppress co-channel inter...
 
Array signal number detection for coherent and incoherent signals in unknown noise environments
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Qiang Wu, Qiang Wu
Issue Date:April 1994
pp. 257-260
In array signal processing, signal number detection is a necessary step for high resolution directions of arrival (DOA) estimation. With the assumption of spatially white noise, several methods have been proposed for detecting both coherent and uncoherent ...
 
An Efficient Exact Algorithm for the Motif Stem Search Problem over Large Alphabets
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Qiang Yu,Hongwei Huo,Jeffrey Scott Vitter,Jun Huan,Yakov Nekrich
Issue Date:February 2015
pp. 1
In recent years, there has been an increasing interest in planted (l, d) motif search (PMS) with applications to discovering significant segments in biological sequences. However, there has been little discussion about PMS over large alphabets. This paper ...
 
Relative Hidden Markov Models for Video-based Evaluation of Motion Skills in Surgical Training
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Qiang Zhang,Baoxin Li
Issue Date:February 2015
pp. 1
A proper temporal model is essential to analysis tasks involving sequential data. In computer-assisted surgical training, which is the focus of this study, obtaining accurate temporal models is a key step towards automated skill-rating. Conventional learni...
 
Bin Ratio-Based Histogram Distances and Their Application to Image Classification
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Weiming Hu,Nianhua Xie,Ruiguang Hu,Haibin Ling,Qiang Chen,Shuicheng Yan,Stephen Maybank
Issue Date:December 2014
pp. 1-1
Large variations in image background may cause partial matching and normalization problems for histogram-based representations, i.e., the histograms of the same category may have bins which are significantly different, and normalization may produce large c...
 
A Minimax Framework for Classification with Applications to Images and High Dimensional Data
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Qiang Cheng,Hongbo Zhou,Jie Cheng,Huiqing Li
Issue Date:November 2014
pp. 1-1
This paper introduces a minimax framework for multiclass classification, which is applicable to general data including, in particular, imagery and other types of high-dimensional data. The framework consists of estimating a representation model that minimi...
 
Information-Theoretic Dictionary Learning for Image Classification
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Qiang Qiu,Vishal M. Patel,Rama Chellappa
Issue Date:November 2014
pp. 1-1
We present a two-stage approach for learning dictionaries for object classification tasks based on the principle of information maximization. The proposed method seeks a dictionary that is compact, discriminative, and generative. In the first stage, dictio...
 
Scaling Hop-Based Reachability Indexing for Fast Graph Pattern Query Processing
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ronghua Liang,Hai Zhuge,Xiaorui Jiang,Qiang Zeng,Xiaofei He
Issue Date:November 2014
pp. 2803-2817
Graphs are becoming increasingly dominant in modeling real-life networked data including social and biological networks, the WWW and the Semantic Web, etc. Graph pattern queries are useful for gathering information with expressive semantics from these grap...
 
New Algorithms for Secure Outsourcing of Modular Exponentiations
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiaofeng Chen,Jin Li,Jianfeng Ma,Qiang Tang,Wenjing Lou
Issue Date:September 2014
pp. 2386-2396
With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attention in the scientific community. Exponentiations modulo a large prime have b...
 
Contextualizing Object Detection and Classification
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Qiang Chen,Zheng Song,Zhongyang Huang,Yang Hua,Shuicheng Yan
Issue Date:August 2014
pp. 1
We investigate how to iteratively and mutually boost object classification and detection performance by taking the outputs from one task as the context of the other one. While context models have been quite popular, previous works mainly concentrate on co-...
 
Bloom Filter Based Associative Deletion
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jiangbo Qian,Qiang Zhu,Yongli Wang
Issue Date:August 2014
pp. 1986-1998
Bloom filters are widely-used powerful tools for processing set membership queries. However, they are not entirely suitable for many new applications, such as deleting one attribute value according to another attribute value for a set of data objects/items...
 
Using Knowledge Management and Mhealth in High-Risk Pregnancy Care: A Case for the Floating Population in China
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Ben-Da Gu,Ji-Jiang Yang,Jian-Qiang Li,Qing Wang,Yu Niu
Issue Date:July 2014
pp. 678-683
Some disorders and conditions can put a mother or baby at a higher risk for problems, which requires management by a specialist to help ensure the best outcome of the pregnancy. But it is a big challenge in the case of the rural women in urban China, consi...
 
Transfer Learning with Graph Co-Regularization
Found in: IEEE Transactions on Knowledge and Data Engineering
By Mingsheng Long, Jianmin Wang, Guiguang Ding, Dou Shen, Qiang Yang
Issue Date:July 2014
pp. 1-1
Transfer learning is established as an effective technology to leverage rich labeled data from some source domain to build an accurate classifier for the target domain. The basic assumption is that the input domains may share certain knowledge structure, w...
 
Bird Flu Outbreak Prediction via Satellite Tracking
Found in: IEEE Intelligent Systems
By Yuanchun Zhou,Mingjie Tang,Weike Pan,Jinyan Li,Weihang Wang,Jing Shao,Liang Wu,Jianhui Li,Qiang Yang,Baoping Yan
Issue Date:July 2014
pp. 10-17
Advanced satellite tracking technologies have collected huge amounts of wild bird migration data. Biologists use these data to understand dynamic migration patterns, study correlations between habitats, and predict global spreading trends of avian influenz...
 
Relating Diagnosability, Strong Diagnosability and Conditional Diagnosability of Strong Networks
Found in: IEEE Transactions on Computers
By Qiang Zhu,Guodong Guo,Dajin Wang
Issue Date:July 2014
pp. 1847-1851
An interconnection network’s diagnosability is an important measure of its self-diagnostic capability. Based on the classical notion of diagnosability, strong diagnosability and conditional diagnosability were proposed later to better reflect the networks’...
 
Cross-Layer Approach for Minimizing Routing Disruption in IP Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Qiang Zheng,Guohong Cao,Thomas F. La Porta,Ananthram Swami
Issue Date:July 2014
pp. 1659-1669
Backup paths are widely used in IP networks to protect IP links from failures. However, existing solutions such as the commonly used independent model and Shared Risk Link Group (SRLG) model do not accurately reflect the correlation between IP link failure...
 
Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Rui Ding,Qiang Fu,Jian Guang Lou,Qingwei Lin,Dongmei Zhang,Tao Xie
Issue Date:June 2014
pp. 311-322
Online service systems have been increasingly popular and important nowadays. Reducing the MTTR (Mean Time to Restore) of a service remains one of the most important steps to assure the user-perceived availability of the service. To reduce the MTTR, a comm...
 
Opportunistic Concurrency: A MAC Protocol for Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Qiang Ma,Kebin Liu,Zhichao Cao,Tong Zhu,Xin Miao,Yunhao Liu
Issue Date:June 2014
pp. 1
How to shorten the time for channel waiting is critical to avoid network contention. Traditional MAC protocols with CSMA often assume that a transmission must be deferred if the channel is busy, so they focus more on the optimization of serial transmission...
 
Holistic Modeling and Performance Evaluation for Converged Network-Cloud Service Provisioning
Found in: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
By Qiang Duan,Zhen Zheng
Issue Date:May 2014
pp. 978-984
The crucial role that computer networks play in Cloud computing requires a holistic vision of both networking and computing resources that leads to a convergence of network and Cloud service provisioning. Performance evaluation on converged network-Cloud s...
 
Sherlock is Around: Detecting Network Failures with Local Evidence Fusion
Found in: IEEE Transactions on Parallel and Distributed Systems
By Qiang Ma,Kebin Liu,Xin Miao,Yunhao Liu
Issue Date:May 2014
pp. 1
Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct centralized analysis at the powerful back-end. On the one hand, long distance proactiv...
 
Formulating Cost-Effective Monitoring Strategies for Service-Based Systems
Found in: IEEE Transactions on Software Engineering
By Qiang He,Jun Han,Yun Yang,Hai Jin,Jean-Guy Schneider,Steve Versteeg
Issue Date:May 2014
pp. 461-482
When operating in volatile environments, service-based systems (SBSs) that are dynamically composed from component services must be monitored in order to guarantee timely and successful delivery of outcomes in response to user requests. However, monitoring...
 
Comments on “Algorithmic Aspectsof Hardware/Software Partitioning:1D Search Algorithms”
Found in: IEEE Transactions on Computers
By Haojun Quan, Tao Zhang, Qiang Liu, Jichang Guo, Xiaochen Wang, Ruimin Hu
Issue Date:April 2014
pp. 1055-1056
In this paper, the work in is analyzed. An error in its theoretical description part is pointed out and illustrated by a simple example. A modification suggestion is proposed to make the theoretical description of the work more deliberate and thus being us...
 
On-chip traffic regulation to reduce coherence protocol cost on a microthreaded many-core architecture with distributed caches
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Chris Jesshope, Jian Fu, Qiang Yang, Raphael Poss
Issue Date:March 2014
pp. 1-21
When hardware cache coherence scales to many cores on chip, over saturated traffic of the shared memory system may offset the benefit from massive hardware concurrency. In this article, we investigate the cost of a write-update protocol in terms of on-chip...
     
Energy-Aware Web Browsing on Smartphones
Found in: IEEE Transactions on Parallel and Distributed Systems
By Bo Zhao,Wenjie Hu,Qiang Zheng,Guohong Cao
Issue Date:March 2014
pp. 1
Smartphone based web browsing wastes a lot of power when downloading webpages due to the special characteristics of the wireless radio interface. In this paper, we identify these special characteristics, and address power consumption issues through two nov...
 
 1  2 Next >>