Search For:

Displaying 1-19 out of 19 total
An Intelligent Security Defensive Software Scheme and Realization
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Kun Wang, Jin-dong Wang, Liu-qing Shen, Zhen-hua Han
Issue Date:April 2010
pp. 793-796
The existing security defensive systems, which have limitations in many ways, can not adapt to the need of future network defense. In allusion to the problem, an intelligent security defensive software is designed. It has intelligent functions such as envi...
The Intercropping Influence on Heavy Metal Uptake for Hyperaccumulators
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Hanzhou Hao,Rugang Zhong,Yuran Miao,Yongxin Wang,Liu Chengwu
Issue Date:May 2012
pp. 1826-1828
Phytoremediation is the use of living green plants for in situ risk reduction and/or removal of contaminants from contaminated soil. Phytoremediation is an energy efficient, aesthically pleasing method of remediating sites with low to moderate levels of co...
Environmental Influence on Precision and Accuracy Estimating Gene Effect by Molecular Marker Regression Model
Found in: Information and Computing Science, International Conference on
By Xue-Bin Li, Xiao-Ling Yu, San-Hu Wang, Meng-Chao Tian, Tie-Gu Wang, Liu Chang-Zhong
Issue Date:May 2009
pp. 132-135
In the past, the gene effect causing the variation of quantitative trait was researched as a whole body. For avoiding the QTL mapping, the molecular marker regression was used to research the quantitative trait controlled by polygene. A general analysis mo...
An Analytical Performance Model of IP-SAN
Found in: Networking, Architecture, and Storage, International Conference on
By Min Wang, Liu Liu, Wei Xu, Lu Xu
Issue Date:June 2008
pp. 255-262
In this paper we propose a component-based analytical performance model for IP-SAN. We model four key components within IP-SAN individually and they are IP network, cache, RAID and disks. We validate these component models and compose them to give an entir...
Design and Implementation of Security Enhanced Module in Database
Found in: 2013 Seventh International Conference on Internet Computing for Engineering and Science (ICICSE 2013)
By Peng Wang, Liu Xing, Xin Gu, Changming Zhu
Issue Date:September 2013
pp. 60-62
The security enhanced module is designed to improve the security of the database. The design ideas and operating principle are studied. The realizing of the security checked module, including the optimization of security rule base, the realizing of securit...
Optimal Placement of Controls for Truss Structures in Space
Found in: IEEE Intelligent Systems
By Dong-Xu Li,Wang Liu,Jian-Ping Jiang
Issue Date:September 2012
pp. 51-56
The authors propose a genetic algorithm–based approach to finding the optimal placement of actuators and sensors, which is critical for controlling intelligent truss structures in space.
GPU and CPU Cooperative Accelaration for Face Detection on Modern Processors
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Eric Li,Bin Wang,Liu Yang,Ya-ti Peng,Yangzhou Du,Yimin Zhang,Yi-Jen Chiu
Issue Date:July 2012
pp. 769-775
Along with the inclusion of GPU cores within the same CPU die, the performance of Intel's processor-graphics has been significantly improved over earlier generation of integrated graphics. The need to efficiently harness the computational power of the GPU ...
Imaging System Effects on the Measuring Accuracy of the Optical Surface in Interferometer
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yang Wang, Liu Manlin, Xu Weicai
Issue Date:January 2011
pp. 363-365
In order to measure high accuracy or mid spatial frequency optical surfaces, this study investigated imaging system in Fizeau interferometer. Interferometer is a transferring phase information system. General transfer function can’t evaluate the ability of...
The Volunteer Computing Architecture Based on Role Analysis
Found in: Grid and Cloud Computing, International Conference on
By Yu Wang, Liu Xian-rong, Song Si Xin
Issue Date:November 2010
pp. 483-488
Volunteer computing has recently received the strong attraction for executing high throughput applications as CPU, storage and network capacities improve and become cheaper. Volunteer resource can provide computing power for cloud computing in many respect...
Improved 3D assisted pose-invariant face recognition
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Liting Wang, Liu Ding, Xiaoqing Ding, Chi Fang
Issue Date:April 2009
pp. 889-892
Recent face recognition algorithm can achieve high accuracy when testing face samples are frontal. However, when face pose changes largely, the performance of existing methods drop drastically. In this paper, we propose an improved algorithm aiming at reco...
Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks
Found in: Wireless Algorithms,Systems and Applications, International Conference on
By Cliff Wang, An Liu, Peng Ning
Issue Date:August 2007
pp. 29-37
To support a wide variety of applications ranging from military surveillance to health care clinic monitoring, a wireless sensor network must obtain accurate location for each sensor. A number of localization schemes have been developed to allow each senso...
Rotation, Scaling and Translation Invariant Blind Digital Watermarking for 3D Mesh Models
Found in: Innovative Computing ,Information and Control, International Conference on
By Wang Liu, Sheng-he Sun
Issue Date:September 2006
pp. 463-466
A digital watermark is an invisible mark embedded in a three-dimension (3D) mesh model which may be used for a number of different purposes including mesh model authentication, copyright protection and so on. This paper describes a novel method for 3D mode...
Modeling Energy Consumption of Data Transmission over Wi-Fi
Found in: IEEE Transactions on Mobile Computing
By Yu Xiao,Yong Cui,Petri Savolainen,Matti Siekkinen,An Wang,Liu Yang,Antti Ylä-Jääski,Sasu Tarkoma
Issue Date:May 2013
pp. 1
Wireless data transmission consumes a significant part of the overall energy consumption of smartphones, due to the popularity of Internet applications. In this paper we investigate the energy consumption characteristics of data transmission over Wi-Fi, fo...
A Trusted Multi-hop Broadcasting Protocol for Vehicular Ad Hoc Networks
Found in: 2012 International Conference on Connected Vehicles and Expo (ICCVE)
By Daxin Tian,Yunpeng Wang,He Liu,Xianghong Zhang
Issue Date:December 2012
pp. 18-22
The vehicular ad hoc networks (VANETs) are characterized by high mobility of nodes, which resulting in frequent and fast changes in the network topologies. To make sure the messages are received efficiently and reliably, particularly for safety application...
An Application of Apriori Algorithm in SEER Breast Cancer Data
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Qi Fan, Chang-Jie Zhu, Jian-Yu Xiao, Bao-Hua Wang, Liu Yin, Xiao-Lu Xu, Feng Rong
Issue Date:October 2010
pp. 114-116
In this work, we adopt Apriori Algorithm to explore the relationship between treatment preferences and survival of breast cancer patient based on other medical attributes. The SEER Public-Use Data 2005 is used in this research. After the preprocessing of t...
A Unified Framework for Web Link Analysis
Found in: Web Information Systems Engineering, International Conference on
By Zheng Chen, Li Tao, Jidong Wang, Liu Wenyin, Wei-Ying Ma
Issue Date:December 2002
pp. 63
Web link analysis has been proved to provide significant enhancement to the precision of web search in practice. Among existing approaches, Kleinberg?s HITS and Google?s PageRank are the two most representative algorithms that employ explicit hyperlinks st...
Digital watermarking for volume data based on 3D-DWT and 3D-DCT
Found in: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS '09)
By Chunhui Zhao, Wang Liu
Issue Date:November 2009
pp. 352-357
With the rapid development of computer multimedia, how to protect digital products from being copied, pirated and juggled has been an urgent issue in the information security field. Digital watermarking is a new method to solve the referred problems. This ...
Towards a flash search engine based on expressive semantics
Found in: Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters (WWW Alt. '04)
By Dawei Ding, Jun Yang, Liping Wang, Liu Wenyin, Qing Li
Issue Date:May 2004
pp. 472-473
Flash, as a multimedia format, becomes more and more popular on the Web. However, previous works on Flash are totally based on low-level features, which make it unpractical to build a content-based Flash search engine. To address this problem, our paper pr...
Architecture-based problem frames constructing for software reuse
Found in: Proceedings of the 2006 international workshop on Advances and applications of problem frames (IWAAPF '06)
By CHU Wang, LIU Chuda, QIAN Depei
Issue Date:May 2006
pp. 19-24
Reusability is not universal property of program codes. The problem frames can support the software component reuse effectively. The problem frames approach provides an opportunity for software developers to gain experience and expertise for problem domain...