Search For:

Displaying 1-50 out of 168 total
Study and Application about Differential Fiber Bragg Grating Force-Testing Ring
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Sheng Li
Issue Date:March 2010
pp. 519-522
Cable force testing techniques which based on fiber Bragg grating (FBG), namely, FRP smart tendon, FBG vibration sensor and FBG force-testing ring, etc, have been widely used in bridge cable long-term safety monitoring. Except for FRP smart tendon, the oth...
 
How Homogenize Chaos-Based Pseudo-random Sequences
Found in: Computer Science and Software Engineering, International Conference on
By Sheng Li-Yuan, Sheng Zhe, Xiao Yan-Yu
Issue Date:December 2008
pp. 793-796
This letter presents a universally valid algorithm designed for homogenizing chaos-based pseudo-random number generators (PRNGs). The algorithm bases on shifting-bit operations represented by floating-point numbers on computers, without aiming at material ...
 
A Digital Watermarking Algorithm Based on Region of Interest for 3D Image
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Fan Sheng-Li,Yu Mei,Jiang Gang-Yi,Shao Feng,Peng Zong-Ju,Fan Sheng-li
Issue Date:November 2012
pp. 549-552
A digital watermarking algorithm based on depth perceptual region of interest (DP-ROI) for copyright protection of three dimension (3D) images is proposed. First, DP-ROI is defined according to the three-dimensional depth sensation of human visual system a...
 
Ontology Based Grid Information Interoperation
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Sheng Di, Hai Jin, Shengli Li, Ling Chen, Li Qi, Chengwei Wang
Issue Date:May 2007
pp. 91-96
A series of problems arises with the emergence and fast development of grid. Among all the problems, one of them is how to smoothly connect heterogeneous grid platforms. There are a number of ways to solve this problem and the relatively more efficient one...
 
Integration of Featured Specialty Construction and Featured Course Construction in Higher Education - With a Case Study of China Jiliang University
Found in: Education Technology and Computer Science, International Workshop on
By Tian-tai Guo, Dong-sheng Li, Dai-liang Xie, Bo Fang, Hui-jun Liu, Sheng-hu Xue
Issue Date:March 2009
pp. 871-875
Universities in China are facing harsh competitions for their graduates' employment in a labor market which was lagging behind the development of the universities, and it's
 
Research on CNCbCAD&CAPP Technology in Intelligent Numerical Control
Found in: International Conference on Natural Computation
By Hui Xu, Tian-Sheng Li, Sheng Lu, Tan Liu
Issue Date:August 2007
pp. 199-206
This paper is based on a new philosophy of CNC (Computer Numerical Control), which is named as INC (Integrated Numerical Control or Intelligent Numerical Control). CNCbCAD&CAPP (CNC technology based on CAD&CAPP) is one of the most important key tec...
 
GlobalWatch: A Distributed Service Grid Monitoring Platform with High Flexibility and Usability
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Sheng Di, Hai Jin, Shengli Li, Ling Chen, Chengwei Wang
Issue Date:December 2006
pp. 440-446
GlobalWatch is a distributed platform to monitor various resources of grid platforms so as to improve the flexibility and usability of grid systems. In order to enhance the flexibility, we make improvements from three aspects. 1) We take advantage of both ...
 
Research on Fuzzy VQC in Substation Based on MATLAB
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Sheng Li, Pulin Xin
Issue Date:August 2009
pp. 356-359
A design example of voltage and reactive power fuzzy logic controller for 110kV substation based on MATLAB is done in this paper. 56 fuzzy control rules are extracted on the basis of nine-area diagram divided the area of prior switching of capacitors. MATL...
 
A New Method of Black Start Based on VSC-HVDC
Found in: Computing, Control and Industrial Engineering, International Conference on
By Li Li, Mingxia Zhou, Sheng Li, Yinhui Li
Issue Date:June 2010
pp. 300-303
For a good Black-Start scheme, it is important to avoid inrush current and transient over voltage while starting-up other major power system equipments. In this paper, the advantages of VSC-HVDC as black start power are analyzed. Control Strategies of VSC-...
 
Assessment of the Straw Resource Recovery Using Thermal-Plasma Solid-Waste Treatment Technology
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Xin Liu,Sheng-li Li,Ming-shu Li
Issue Date:May 2012
pp. 1236-1239
This paper discusses the feasibility of applying thermal-plasma solid-waste treatment (TST) technology to achieve straw resource recovery. It introduces the technology's process flow, the basic principles of thermal plasma as well as vitrification and gasi...
 
Event Entailment Extraction Based on EM Iteration
Found in: Asian Language Processing, International Conference on
By Zhen Li, Hanjing Li, Mo Yu, Tiejun Zhao, Sheng Li
Issue Date:December 2010
pp. 101-104
In the research and development of various natural language processing systems, like Q&A system and text-to-scene conversation system, we realize that knowledge of text entailment helps a lot in improving the performance of the system. Systems with tex...
 
Approach of Stitching VRML Clips Together
Found in: International Conference on Internet Computing in Science and Engineering
By Zhen Li, Hanjing Li, Sheng Li, Tiejun Zhao
Issue Date:December 2009
pp. 42-46
Stitching multiple animate or video clips together is a widely used technique in multimedia processing area. From digital video editing to scene generator in Text-to-Scene conversion system, it usually has its usage. Currently, many general or specific sof...
 
MAGE: Adaptive Granularity and ECC for resilient and power efficient memory systems
Found in: 2012 SC - International Conference for High Performance Computing, Networking, Storage and Analysis
By Sheng Li,Doe Hyun Yoon,Ke Chen,Jishen Zhao,Jung Ho Ahn,Jay B. Brockman,Yuan Xie,Norman P. Jouppi
Issue Date:November 2012
pp. 1-11
Resiliency is one of the toughest challenges in highperformance computing, and memory accounts for a significant fraction of errors. Providing strong error tolerance in memory usually requires a wide memory channel that incurs a large access granularity (h...
 
The Phoneme-Level Articulator Dynamics for Pronunciation Animation
Found in: Asian Language Processing, International Conference on
By Sheng Li,Lan Wang,En Qi
Issue Date:November 2011
pp. 283-286
Speech visualization can be extended to a task of pronunciation animation for language learners. In this paper, a three dimensional English articulation database is recorded using Carstens Electro-Magnetic Articulograph (EMA AG500). An HMM-based visual syn...
 
Word-Level Reordering Model for Phrase-Based SMT
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Pengyuan Liu,Shui Liu,Sheng Li
Issue Date:August 2011
pp. 193-196
The complicated alignment and small translation unit make the word based approaches extremely complex and thereby hard to achieve promising performance. The employment of phrase largely addresses the alignment problem. On the other hand, the phrase-based S...
 
Discover Linguistic Patterns in Parsed Corpus with Frequent Subrtree Mining
Found in: International Workshop on Knowledge Discovery and Data Mining
By Bo Wang, Tiejun Zhao, Muyun Yang, Sheng Li
Issue Date:January 2010
pp. 86-89
Recognition of special linguistic patterns in a certain language is very helpful for many NLP applications such as information extraction, machine translation and parsing. State-of-the-arts syntax parsers are based on given grammar. The used grammar is con...
 
Automatic Syntactic Segment Filtration for Mass Syntax Corpus with Mutual Information
Found in: Future Information Technology and Management Engineering, International Seminar on
By Bo Wang, Tiejun Zhao, Muyun Yang, Sheng Li
Issue Date:December 2009
pp. 234-237
Syntactic analysis (Syntactic parsing) is an important method in the natural language processing. The Syntactic parsing aims to find a linguistic structure of a sentence with the knowledge of a certain grammar. The constituent parser which can build hierar...
 
Stability vs. Effectiveness: Improved Sentence-Level Combination of Machine Translation Based on Weighted MBR
Found in: Asian Language Processing, International Conference on
By Bo Wang, Tiejun Zhao, Muyun Yang, Hongfei Jiang, Sheng Li
Issue Date:December 2009
pp. 39-42
We describe an improved strategy to combine the outputs of machine translation on sentence-level balancing the stability and the effectiveness of the combination. The new method alternates the classical MBR-based sentence-level combination with weighted Mi...
 
The Lower Hops Selection Scheme for Constructing the Multihoming NEMO
Found in: Hybrid Intelligent Systems, International Conference on
By Long-Sheng Li, Jhu-Shyuan Mei, Yao-Hui Tsai, Gwo-Chuan Lee
Issue Date:August 2009
pp. 123-128
Network Mobility (NEMO) allows a mobile network (MONET) to move around and maintains session connectivity of nodes in the MONET. To increase session reliability of the MONET, multihoming NEMO is the easiest way. In the multihoming environment, the MONET ha...
 
The Mobile Router Forwarding Scheme for Multicast in the NEMO
Found in: Networking, Architecture, and Storage, International Conference on
By Long-Sheng Li, Yong-Yu Yang, Jhu-Syuan Mei
Issue Date:June 2008
pp. 113-120
Multicast is an efficient method to transmit datagrams in the Internet. In this paper, we provide a multicast algorithm in a network mobility (NEMO) environment. We propose the Mobile Router Forwarding Scheme (MRFS) algorithm. There are two advantages in t...
 
Enhancement of Non-air Conduct Speech Based on Multi-band Spectral Subtraction Method
Found in: Image and Signal Processing, Congress on
By Sheng Li, Ming Niu, JianQi Wang, Tian Liu, XiJing Jing
Issue Date:May 2008
pp. 338-341
The spread of speech is not only depending upon the air, but by means of other medium. This study reports a new speech detecting method by using EMW Radar. However, the combined noise which is added in the detected speech decreased the speech quality to a ...
 
Heterogeneous RSVP Extension for End-to-End QoS Support in UMTS/WLAN Interworking Systems
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Gwo-Chuan Lee, Long-Sheng Li, Wei-Yu Chien
Issue Date:December 2006
pp. 170-175
Because of the popularity of WLAN, UMTS and WLAN networks are often combined into two-tier heterogeneous networks. However, it is important for mobile hosts to have an end-to-end QoS support for service continuity in the UMTS/WLAN interworking systems. To ...
 
Enterprise Information Mashup and Real Time Business Assurance for Global Collaboration
Found in: International Conference on Collaborative Computing: Networking, Applications and Worksharing
By Chung-Sheng Li
Issue Date:November 2006
pp. 3
Summary form only given. As part the globalization trend, enterprises are facing a serious challenge of needing to be globally consistent and locally nimble at the same time. Recent rapid evolution of Web 2.0 and real-time event driven architecture served ...
 
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques
Found in: 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
By Dawu Gu,Juanru Li,Sheng Li,Zhouqian Ma,Zheng Guo,Junrong Liu
Issue Date:September 2012
pp. 27-33
Differential fault analysis is one of the most efficient side channel attack techniques that threat the security of block cipher. However, it often requires a penultimate or an antepenultimate round faulty encryption and is not suitable for middle round fa...
 
A Refined RBAC Model for Cloud Computing
Found in: Computer and Information Science, ACIS International Conference on
By Wei Li,Haishan Wan,Xunyi Ren,Sheng Li
Issue Date:June 2012
pp. 43-48
Cloud computing is a fast growing field which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the Internet and users can access resources on based on their payments. This paper discusses cloud com...
 
Spray Dust Removal Device Based on the Image Contrast
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Zhang Jiang-shi,Niu Sheng-li,Li Yan,Zhao Yong-guang
Issue Date:March 2012
pp. 638-641
to solve the dust pollution problems for fixed points producing dust which were belt transport lane point and fully-mechanized face in the underground mine, this paper studied and designed a set of system based on image of coal dust pollution evaluation an...
 
End to End Security and Path Security in Network Mobility
Found in: Parallel Processing Workshops, International Conference on
By Long-Sheng Li,Shr-Shiuan Tzeng,Rui-Chung Bai,Meng-Tai Li
Issue Date:September 2011
pp. 16-21
At RFC 3776, IP security protocol (IPsec) has been implemented in mobile IP for securing IP datagram at IP layer. Previous research only considered the traffic between mobile node (MN) and home agent (HA), but the traffic from HA to correspondent node (CN)...
 
Research of Steam Boiler Using High Temperature Heat Pipe Based on Metal Phase Change Materials
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Mao Ling Bo, ZhangRen Yuan, Li Feng, Chen Guan Sheng, Li Shi Dong, Wang Chang Hong
Issue Date:February 2011
pp. 2208-2212
In this paper a novel steam boiler using high temperature heat pipe based on energy storage by metal phase change materials is introduced. In a steam drum construction, composed of heat reservoir, high temperature heat pipe, boiler drum, frame, etc., the b...
 
Spatial Ontology Instantiation for Text-to-Scene Conversion System
Found in: International Conference on Internet Computing in Science and Engineering
By Hanjing Li, Xiaoping Xue, Sheng Li, Tiejun Zhao
Issue Date:December 2009
pp. 147-151
Spatial concepts conversion in text-to-scene conversion system is one of the essential tasks. This paper provides a hybrid method to instantiate spatial concepts. The hybrid method is on clustering, cognition and rules. The spatial ontology with instantiat...
 
Tracking and Positioning Maneuvering Target with Low Thrust Acceleration
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Heng-Nian Li, Yong-Xuan Huang, Ji-Sheng Li
Issue Date:August 2009
pp. 607-611
The uncertainty of thrust acceleration will cause enormous error to model and track the accelerated motion of maneuvered target during orbit transfer process. An on-line minimum-variance estimator was developed for thrust acceleration applied to orbit tran...
 
A Novel Nonlinear Feature Extraction and Recognition Approach Based on Improved 2D Fisherface Plus Kernel Discriminant Analysis
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Yong-fang Yao, Sheng Li, Zhu-li Shao, Xiao-yuan Jing, David Zhang, Jing-yu Yang
Issue Date:December 2008
pp. 333-337
A novel nonlinear feature extraction and recognition approach which is based on improved 2D Fisherface plus Kernel discriminant analysis is proposed. We provide an improved 2D Fisherface method that designs a new strategy to select appropriate 2D principal...
 
Nonlinear DCT Discriminant Feature Extraction with Generalized KDCV for Face Recognition
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Sheng Li, Yong-fang Yao, Xiao-yuan Jing, Zhu-li Shao, David Zhang, Jing-yu Yang
Issue Date:December 2008
pp. 338-341
A nonlinear DCT discriminant feature extraction approach for face recognition is proposed. First, we analyze the nonlinear discriminabilities of DCT frequency bands and select appropriate bands. Second, we extract nonlinear discriminant features from the s...
 
Extending BLEU Evaluation Method with Linguistic Weight
Found in: Young Computer Scientists, International Conference for
By Muyun Yang, Junguo Zhu, Jufeng Li, Lixin Wang, Haoliang Qi, Sheng Li, Liu Daxin
Issue Date:November 2008
pp. 1683-1688
BLEU is one of the most popular metrics for automatic evaluation of machine translation quality. Focusing on its ignorance of different effects of various translation units upon translation quality, this paper extends proper weights to different words and ...
 
Online Linear Discriminative Learning for Spam Filter
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Haoliang Qi, Xiaoning He, Muyun Yang, Jun Li, Guohua Lei, Zhongyuan Han, Sheng Li
Issue Date:October 2008
pp. 306-309
This paper describes a simple but effective discriminative learner for spam filter. We statically derive the features within Bayesian framework, cluster them into groups according to their position and then assigning weights respectively. The model is eval...
 
Efficient Maintaining of Skyline over Probabilistic Data Stream
Found in: International Conference on Natural Computation
By Jin-jiu Li, Sheng-li Sun, Yang-yong Zhu
Issue Date:October 2008
pp. 378-382
Inherent uncertainty and unreliability of data exists widely in emerging applications, like sensor network based ubiquitous computation, results output in information extraction and data integration, etc. Multidimensional skyline analysis is crucial to mul...
 
A New Improvement on Mean-Shift Algorithm
Found in: Image and Signal Processing, Congress on
By Zhong-Sheng Li, Ren-Fa Li, Yu-Feng Liu, Yao-Xue Zhang
Issue Date:May 2008
pp. 307-311
Complex motion makes consecutive frames experience dramatic change, and thus becomes a barrier to object-tracking. Three factors contribute to more complexity of motion: longer sampling period,an moving object with complex appearance and nonrestraint movem...
 
A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Fang Sheng, Li Xu-Jian, Zhang Li-Wei
Issue Date:August 2007
pp. 848-853
In traditional video compression standards, the quantizer plays an important role. It is the same for the Distributed Video Coding (DVC), which can be thought to consist of a quantizer followed by a Slepian-Wolf encoder. The quantizer has dominant effect o...
 
The Extraction of Spatial Relationships from Text Based on Hybrid Method
Found in: International Conference on Information Acquisition
By Hanjing Li, Tiejun Zhao, Sheng Li, Yanhai Han
Issue Date:August 2006
pp. 284-289
Natural language is an easy and effective medium for spatial description. Thus, we foresee the emergence of methods to extract spatial relationships from text as constraints on layout of objects in a 3D scene. This would allow users to quickly display obje...
 
Bilingual Phrase Extraction from N-Best Alignments
Found in: Innovative Computing ,Information and Control, International Conference on
By Yong-Zeng Xue, Sheng Li, Tie-Jun Zhao, Mu-Yun Yang, Jun Li
Issue Date:September 2006
pp. 410-414
Improved approach of phrase extraction was proposed for phrase-based statistical machine translation. The effectiveness was investigated when using n-best alignments instead of one-best for phrase extraction. Bilingual phrase pairs were extracted in the pr...
 
Learning Image Query Concepts via Intelligent Sampling
Found in: Multimedia and Expo, IEEE International Conference on
By Beitao Li, Edward Chang, Chung-Sheng Li
Issue Date:August 2001
pp. 244
In this paper, we propose an active and inductive combined learning method to learn users' image query concepts. We model query concepts in K-CNF, which can be used to express most practical queries. To learn a user's query concept, we propose MEGA. MEGA i...
 
Learning Balanced and Unbalanced Graphs via Low-Rank Coding
Found in: IEEE Transactions on Knowledge and Data Engineering
By Sheng Li,Yun Fu
Issue Date:February 2015
pp. 1
Graphs have been widely applied in modeling the relationships and structures in real-world applications. Graph construction is the most critical part in these models, while how to construct an effective graph is still an open problem. In this paper, we pro...
 
How Good is Web Based MT: A Case Study on Paper Title Translation
Found in: 2012 International Conference on Asian Language Processing (IALP)
By Jia Yao,Muyun Yang,Junmao Meng,Dongqing Xiao,Tiejun Zhao,Sheng Li
Issue Date:November 2012
pp. 213-216
Web based machine translation is now public ally available to Internet users. To address its effectiveness in assisting people in real translation task, this paper presents a controlled user study on how human choose and modify MT results during translatin...
 
Fault Analysis of the Piccolo Block Cipher
Found in: 2012 Eighth International Conference on Computational Intelligence and Security (CIS)
By Sheng Li,Dawu Gu,Zhouqian Ma,Zhiqiang Liu
Issue Date:November 2012
pp. 482-486
We present several types of fault based attacks on the new lightweight block cipher Piccolo. The cipher is a variant of a generalized Feistel network (GFN) while the round keys are not involved in the F-function. This leads to an interesting principle whic...
 
A Social Label Automatic Tagging Based Method on Situation Semantics in Web Service Discovery
Found in: 2012 International Conference on Management of e-Commerce and e-Government (ICMeCG)
By Sheng Li,Jing Hu
Issue Date:October 2012
pp. 91-94
The traditional approach to describe web services using ontology is a departure from the perspective of web service provider which can not ensure high precision and recall ratios, that is the consistency of the service designing intent and the service usin...
 
The Design of a Rehabilitation Training System with EMG Feedback
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Guangji Sheng,Li Wang,Dengrong Ma,Fan Fan,Haijun Niu
Issue Date:May 2012
pp. 917-920
In recent year, the number of the patients with neuromuscular dyskinesias is constantly increasing. Many patients can recover the function of the limbs muscle through rehabilitation training. However, it is important for doctor and patients to real-time mo...
 
CACTI-3DD: Architecture-level modeling for 3D die-stacked DRAM main memory
Found in: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)
By Ke Chen, Sheng Li,N. Muralimanohar, Jung Ho Ahn,J. B. Brockman,N. P. Jouppi
Issue Date:March 2012
pp. 33-38
Emerging 3D die-stacked DRAM technology is one of the most promising solutions for future memory architectures to satisfy the ever-increasing demands on performance, power, and cost. This paper introduces CACTI-3DD, the first architecture-level integrated ...
 
Attack using reconstructed fingerprint
Found in: Information Forensics and Security, IEEE International Workshop on
By Sheng Li,Alex C. Kot
Issue Date:December 2011
pp. 1-6
Most fingerprint recognition systems store minutiae-based fingerprint template in a database. As the minutiae template is very compact, many take it for granted that these minutiae points do not contain sufficient information for reconstructing the origina...
 
CACTI-P: Architecture-level modeling for SRAM-based structures with advanced leakage reduction techniques
Found in: Computer-Aided Design, International Conference on
By Sheng Li,Ke Chen,Jung Ho Ahn,Jay B. Brockman,Norman P. Jouppi
Issue Date:November 2011
pp. 694-701
This paper introduces CACTI-P, the first architecture-level integrated power, area, and timing modeling framework for SRAM-based structures with advanced leakage power reduction techniques. CACTI-P supports modeling of major leakage power reduction approac...
 
System implications of memory reliability in exascale computing
Found in: SC Conference
By Sheng Li,Ke Chen,Ming-Yu Hsieh,Naveen Muralimanohar,Chad D. Kersey,Jay B. Brockman,Arun F. Rodrigues,Norman P. Jouppi
Issue Date:November 2011
pp. 1-12
Resiliency will be one of the toughest challenges in future exascale systems. Memory errors contribute more than 40% of the total hardware-related failures and are projected to increase in future exascale systems. The use of error correction codes (ECC) an...
 
Study on Predictive Model of Customer Churn of Mobile Telecommunication Company
Found in: Business Intelligence and Financial Engineering, International Conference on
By Yu-bao Chen,Bao-sheng Li,Xin-quan Ge
Issue Date:October 2011
pp. 114-117
This paper first confines and analyzes the meaning of churn management in a mobile telecommunication industry and key influencing factors, designs a new prediction model to deal with the churn management of mobile telecommunication company through data min...
 
 1  2 Next >>