Search For:

Displaying 1-50 out of 59 total
Identifying Potential Pollution Sources in River Basin via Water Quality Reasoning Based Expert System
Found in: 2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)
By Yi Wang,Yuanyuan Wang,Meng Ran,Yu Liu,Zhichao Zhang,Liang Guo,Ying Zhao,Peng Wang
Issue Date:June 2013
pp. 671-674
Indentifying potential pollution sources from the monitoring water quality data is desirable for water quality management. A simple expert system module was developed in this paper to infer the latent pollution sources and explain variation in water qualit...
 
The Vibration Frequencies of Wind Turbine Steel Tower by Transfer Matrix Method
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wang Meng, Wang Zhangqi
Issue Date:January 2011
pp. 995-998
Large-scale wind turbine structure is simplified as a slender cantilever beam with variable sections subject to complex loads configuration. An analytical procedure to estimate not only natural frequencies but also vibration mode shapes of thin-walled tubu...
 
Multiple Moving Prey Pursuit Algorithm Based on the Changeable Alliance
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Yue-hai Wang, Meng-meng Zhang
Issue Date:August 2007
pp. 658-662
Multiple Moving Preys Cooperative Pursuit (MMPCP) problem was discussed where exists multiple random moving preys, each kind of which need different number of pursuers to circle to capture. Following the idea of
 
Using Coupling Measure Technique and Random Iterative Algorithm for Inter-Class Integration Test Order Problem
Found in: Computer Software and Applications Conference Workshops
By Zhengshan Wang, Bixin Li, Lulu Wang, Meng Wang, Xufang Gong
Issue Date:July 2010
pp. 329-334
Inter-class integration test order (ICITO) problem is to determine the order in which classes are integrated and tested. It is very important in object-oriented software integration testing or regression testing, because different test orders need differen...
 
Lighting systems control for demand response
Found in: Innovative Smart Grid Technologies, IEEE PES
By Sri Andari Husen,Ashish Pandharipande,Ludo Tolhuizen, Ying Wang, Meng Zhao
Issue Date:January 2012
pp. 1-6
Lighting is a major part of energy consumption in buildings. Lighting systems will thus be one of the important component systems of a smart grid for dynamic load management services like demand response. We consider the problem of control of multiple ligh...
 
On Improving Real-Time Interrupt Latencies of Hybrid Operating Systems with Two-Level Hardware Interrupts
Found in: IEEE Transactions on Computers
By Miao Liu, Duo Liu, Yi Wang, Meng Wang, Zili Shao
Issue Date:July 2011
pp. 978-991
In this paper, we propose to implement hybrid operating systems based on two-level hardware interrupts. We analyze and model the worst-case real-time interrupt latency for RTAI and identify the key component for its optimization. Then, we propose our metho...
 
Learning Encoded Facial Curvature Information for 3D Facial Emotion Recognition
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Yiding Wang,Meng Meng,Qingkai Zhen
Issue Date:July 2013
pp. 529-532
In current 3D facial expression recognition system, feature extraction has always been a critical point. We focus on encoding feature by using curvature information. 3D facial expression images are described by means of four images which gray level are the...
 
The Homogeneity and Heterogeneity Hypothesis Test of the Relative Risk
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Yawei Wang,Xueli Wang,Meng Xiao
Issue Date:October 2012
pp. 576-579
Relative risk plays an important role in identifying and assessing diseases in the case-control association study, but the homogeneity and heterogeneity of the RR is often ignored in M stratum 2*2 tables and cohort (2*k tables) studies. This paper proposes...
 
Query by multi-tags with multi-level preferences for content-based music retrieval
Found in: Multimedia and Expo, IEEE International Conference on
By Ju-Chiang Wang, Meng-Sung Wu,Hsin-Min Wang, Shyh-Kang Jeng
Issue Date:July 2011
pp. 1-6
This paper presents a novel content-based music retrieval system that accepts a query containing multiple tags with multiple levels of preference (denoted as an MTML query) to retrieve music from an untagged music database. We select a limited number of po...
 
An Effective Bottleneck Detection Method for Job Shop
Found in: Computing, Control and Industrial Engineering, International Conference on
By Yingni Zhai, Shudong Sun, Junqiang Wang, Meng Wang
Issue Date:June 2010
pp. 198-201
A new bottleneck definition from the perspective of the manufacturing system’s objective is proposed. A distinct bottleneck detection method based on orthogonal experiment (BD-OE) for job shop is proposed according to the definition. The method takes the o...
 
Integrating GIS, GPS Technologies for Designing Vehicle Monitor System
Found in: Machine Vision and Human-machine Interface, International Conference on
By Xiaorong Wang, Meng Wang
Issue Date:April 2010
pp. 416-418
This paper introduces the structure function, main feature and implementation principles of a vehicle monitor system. The system use MapX controls to match electronic map for implementing vehicle monitor, and adopts MSComm controls to obtain information of...
 
Decision Support in the Railway Accident Rescue by Hybrid Reasoning
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Lin-ze Wang, Meng Song
Issue Date:August 2009
pp. 80-84
In the paper, we employ a hybrid reasoning model to aid the decision making in railway accident rescue. A coarse-to-fine model is proposed which combines the Rule-Based-Reasoning (RBR) and Cased-Based-Reasoning (CBR). In section 2, we present the framework...
 
Environmental Influence on Precision and Accuracy Estimating Gene Effect by Molecular Marker Regression Model
Found in: Information and Computing Science, International Conference on
By Xue-Bin Li, Xiao-Ling Yu, San-Hu Wang, Meng-Chao Tian, Tie-Gu Wang, Liu Chang-Zhong
Issue Date:May 2009
pp. 132-135
In the past, the gene effect causing the variation of quantitative trait was researched as a whole body. For avoiding the QTL mapping, the molecular marker regression was used to research the quantitative trait controlled by polygene. A general analysis mo...
 
Static Check of WS-CDL Documents
Found in: Service-Oriented System Engineering, IEEE International Workshop on
By Lei Zhou, Hanyi Zhang, Tao Wang, Chuchao Yang, Zheng Wang, Meng Sun, Geguang Pu
Issue Date:December 2008
pp. 142-147
This paper presents an approach to check WS-CDL documents statically. To deal with those constraints appeared in CDL documents, which cannot be captured by its meta model (XML Schema) totally, we use B abstract machines to represent the constraints and des...
 
Video accessibility enhancement for hearing-impaired users
Found in: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
By Jianguo Jiang, Meng Wang, Meng Wang, Mengdi Xu, Mengdi Xu, Richang Hong, Richang Hong, Shuicheng Yan, Shuicheng Yan, Tat-Seng Chua, Tat-Seng Chua, Xiao-Tong Yuan, Xiao-Tong Yuan
Issue Date:October 2011
pp. 1-19
There are more than 66 million people suffering from hearing impairment and this disability brings them difficulty in video content understanding due to the loss of audio information. If the scripts are available, captioning technology can help them in a c...
     
Correlative multilabel video annotation with temporal kernels
Found in: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
By Guo-Jun Qi, Hong-Jiang Zhang, Hong-Jiang Zhang, Jinhui Tang, Jinhui Tang, Meng Wang, Meng Wang, Tao Mei, Tao Mei, Xian-Sheng Hua, Xian-Sheng Hua, Yong Rui, Yong Rui
Issue Date:October 2008
pp. 1-27
Automatic video annotation is an important ingredient for semantic-level video browsing, search and navigation. Much attention has been paid to this topic in recent years. These researches have evolved through two paradigms. In the first paradigm, each con...
     
Scene-Specific Pedestrian Detection for Static Video Surveillance
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Xiaogang Wang, Meng Wang, Wei Li
Issue Date:February 2014
pp. 361-374
The performance of a generic pedestrian detector may drop significantly when it is applied to a specific scene due to the mismatch between the source training set and samples from the target scene. We propose a new approach of automatically transferring a ...
 
High-power Pit (Well)-Ground Electromagnetic Automatic Sweep Frequency Transmitter Used for Exploration of Metal Mine
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wang Meng, Deng Ming, Jin Sheng, Wu Kai
Issue Date:January 2011
pp. 332-335
Using the existing pits, wells and tunnels in mine areas, high power electromagnetic transmitters on the ground and underground (pit, well) and receivers on the ground can be integrated as a quasi 3-D measuring device, which provides a new method for explo...
 
Deformation Analysis of Tunable Fabry-Perot Structure Caused by Thermal Residual Gradient Stresses
Found in: MEMS, NANO, and Smart Systems, International Conference on
By Pen-Lun Chang, Shun-Wu Wang, Meng-Ju Lin
Issue Date:July 2005
pp. 61-64
<p>The deformation of Fabry-Perot caused by thermal residual stresses is investigated. The sizes of structure have effect on deformation, especially the ratio of width to length, W/L. If the W/L ratio is smaller, the deformation is larger. But, the s...
 
Seamless Privacy: Privacy-Preserving Subgraph Counting in Interactive Social Network Analysis
Found in: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Xuan Ding, Wei Wang, Meng Wan, Ming Gu
Issue Date:October 2013
pp. 97-104
Social network analysis (SNA) is increasingly attracting attentions from both academia and industrial areas. While revealing interesting properties and inferences from social network data is important, the protection of sensitive information of individuals...
 
Evaluation of Electric Vehicle Charging Station Sitting Based on Fuzzy Analytic Hierarchy Process
Found in: 2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)
By Wang Meng,Liu Kai,Zhao Songhui
Issue Date:June 2013
pp. 568-571
The construction of charging station is a major component of electric vehicle market operation and the comprehensive evaluation of a location is an important part for the construction of charging station. In this article, on the basis of analyzing the trad...
 
Hadoop Based Data Processing Method and Its Application on Braille Identification
Found in: 2012 5th International Conference on Intelligent Networks and Intelligent Systems (ICINIS)
By Nian-Feng Li,Li-Rong Wang,Meng Zhang,Hua-Xun Zhang
Issue Date:November 2012
pp. 329-332
It is not so efficient to store and manage massive data with traditional distributed database architecture. Hadoop, as an open source framework, is suitable for data distributed storage and management on a group of cheap machines. Based on the research of ...
 
Towards Automatic Tagging for Web Services
Found in: 2012 IEEE 19th International Conference on Web Services (ICWS)
By Lu Fang,Lijie Wang,Meng Li,Junfeng Zhao,Yanzhen Zou,Lingshuang Shao
Issue Date:June 2012
pp. 528-535
Tagging technique is widely used to annotate objects in Web 2.0 applications. Tags can support web service understanding, categorizing and discovering, which are important tasks in a service-oriented software system. However, most of existing web services'...
 
The Determination of Optimal Suppliers for the Chain Restaurant Industry by Integrating a Modified LVQ Algorithm and the Gray Multi-attribute Decision
Found in: Computer, Consumer and Control, International Symposium on
By Shen-Tsu Wang,Meng-Hua Li,Ching-Ying Lin
Issue Date:June 2012
pp. 845-848
Using an intelligent supplier selection support structure to determine optimal suppliers, as based on the future development strategies of a company, is very important to the members of the chain restaurant industry in the current consumer demand-oriented ...
 
Complex Human-System Systems Design for C2
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Xu-Hui Luo,Jiang Wang,Meng Qian,Zhong Liu,Wei-Ming Zhang,Cheng Zhu
Issue Date:December 2011
pp. 1031-1038
Human-System systems design is a critical part of Command and Control (C2) design, in order to improve the whole effectiveness of C2 design, the human beings and systems must be in harmony in the human-in-loop systems, which can be referred to as Cyber-phy...
 
Two-Step NonLinear Optimal Control Approach for Coal Mine Rescue Robot Navigation
Found in: Digital Manufacturing and Automation, International Conference on
By Wanli Liu,Zhankui Wang,Meng Guo
Issue Date:August 2011
pp. 1380-1383
Coal mine rescue robot (CMRR) places an important role when any disaster happens in underground mine. However, they have not yet an effective approach for rescue robot navigation and location in unknown and complex environment. In this paper, a new nonLine...
 
DOM: A Data-dependency-Oriented Modeling approach for efficient simulation of OS preemptive scheduling
Found in: 2011 Design, Automation & Test in Europe
By Peng-Chih Wang, Meng-Huan Wu, Ren-Song Tsay
Issue Date:March 2011
pp. 1-6
Operating system (OS) models are widely used to alleviate the overwhelmed complexity of running system-level simulation of software applications on specific OS implementation. Nevertheless, current OS modeling approaches are unable to maintain both simulat...
   
Research on Data Fusion in the Process of AUV Retrieve
Found in: Communications and Intelligence Information Security, International Conference on
By Wei Dong, Dawei Wang, Meng Li
Issue Date:October 2010
pp. 143-146
Autonomous underwater vehicle (AUV) forms part of a huge group of undersea systems and plays a significant role for both commercial and military applications. Many different kinds of AUVs have been designed in recent years around the world. Sensors should ...
 
Performance of SBS Modified Asphalt and Influence of Aging
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Li Ping, Zhou Huan, Zhao Qiaochu, Wang Meng
Issue Date:October 2010
pp. 57-60
In order to study the performance of SBS modified asphalt and the influence of aging, two types of SBS and three kinds of base asphalts are selected according to SHRP index, and performances of combination of modified asphalt at different aging phases are ...
 
Open GIS-Based Lightning Information System for Electric Power System
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Ying Wang, Meng Zhang
Issue Date:October 2010
pp. 1049-1052
Lightning is one of the single largest causes of service disruptions and equipment damage occurring on utility distribution systems. Protection of power distribution system from lightning-related damage and faults is crucial to maintaining adequate power q...
 
The Implement of an Improved Delaunay Triangulation Algorithm
Found in: Information and Computing Science, International Conference on
By He Jun, Wang Meng-lin
Issue Date:June 2010
pp. 211-214
The algorithms of Delaunay triangulation are the main algorithms when establishing DEM. The algorithm of going forward beginning with margins has been improved in two ways after some researches are made on several Delaunay triangulation algorithms. On the ...
 
TeMPS: A Conceptual Framework for Pervasive and Social Games
Found in: Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on
By Hong Guo, Hallvard Trætteberg, Alf Inge Wang, Meng Zhu
Issue Date:April 2010
pp. 31-37
Pervasive and social game is an emerging game genre which brings more physical movement and social interactions into game. This article proposes the conceptual framework TeMPS that systematically characterizes the important aspects of pervasive and social ...
 
Research on the Web Services Selection Problem
Found in: Education Technology and Computer Science, International Workshop on
By Feng Guo, Lihong Zhao, Yi Wang, Meng Zhang
Issue Date:March 2010
pp. 284-287
Based on service oriented infrastructures, there are many services that provide the same functionality but differ in quality parameters. An important issue for web services composition is how to select appreciates services from a set of alternatives with Q...
 
The Model of Vehicle Position Estimation and Prediction Based on State-Space Approach
Found in: Intelligent Computation Technology and Automation, International Conference on
By Li Pingsheng, Xie Xiaoli, Li Bin, Wang Meng
Issue Date:October 2009
pp. 822-825
As one part of ITS (Intelligent Transportation System), IRS (Intelligent Road System) focus on improving the road safety and operation efficiency of highway system based on the idea of cooperation between road infrastructure and vehicles. Many IRS applicat...
 
Economic Loss for Water Contaminations in East Lake Based on Logistic Model
Found in: Environmental Science and Information Application Technology, International Conference on
By Hongxia Xia, Wang Meng
Issue Date:July 2009
pp. 287-290
Water Contaminations bring not only great damage to the ecological balance, but also serious losses to the national economy. The results of existing methods, which are used to calculate Economic Loss of water contaminations, are not able to reflect the pro...
 
Binary fuzzy rough set model based on triangle modulus and its application to image processing
Found in: Cognitive Informatics, IEEE International Conference on
By Dan Wang,Meng-da Wu
Issue Date:June 2009
pp. 249-255
Rough sets theory is an important tool that process uncertainty information. In this paper, image processing based on rough sets theory is discussed in detail. The paper presents a binary fuzzy rough set model based on triangle modulus, which describes bin...
 
The Impact of International Oil Prices on Consumer Prices: Evidence from a VAR Model
Found in: Computer Science and Information Engineering, World Congress on
By Chi-Jui Huang, Hui-Cheng Wang, Meng-Gu Chen, Tsorng-Chyi Hwang
Issue Date:April 2009
pp. 531-534
This study examines possible impacts of crude oil price (OP) on consumer price index (CPI) among three oil exchange markets and four Asian countries with different economic development levels over the period January 1999 to June 2008. A time-series vector ...
 
Do Index Funds Perform Acceptably? Evidence of Time Varying Risk Analysis
Found in: Computer Science and Information Engineering, World Congress on
By Sheng-Hung Chen, Hui-Cheng Wang, Meng-Gu Chen, Chi-Jui Huang, Tsorng-Chyi Hwang
Issue Date:April 2009
pp. 517-520
The purpose of this note is to examine the performance of equity index funds in Taiwan using time-varying Jensen's and risk, which is generated by both the rolling and recursive regression approach. The empirical evidence indicates that the Taiwan Top50 Tr...
 
An Energy-Balanced Clustering Routing Algorithm for Wireless Sensor Networks
Found in: Computer Science and Information Engineering, World Congress on
By Yao Lan, Cui Xiuli, Wang Meng
Issue Date:April 2009
pp. 316-320
When cluster heads transmit their data to the sink via multi-hop communication, the cluster heads closer to the sink not only gather the data in its cluster but also forward the data for other cluster heads. These key nodes are burdened with heavy relay tr...
 
Research on the Robustness of a Proportional Integral Switching Surface Based on Sliding Mode Control
Found in: Advanced Computer Control, International Conference on
By Jun Liu, Yang Wang, Meng-zhi Huang, Jian-bo Lu
Issue Date:January 2009
pp. 464-467
In this paper, a novel proportional-integral (PI) switching surface is introduced for determining the synchronization performance of systems in the sliding mode motion. Based on the sliding mode controller, the system is established by a robust control sch...
 
Experimental and numerical investigations into high-voltage pulsed DC electric fields for enhancing CE chip performance
Found in: International Conference on Nano/Micro Engineered and Molecular Systems
By Jing-Hui Wang, Meng-Ku Chi, Lung-Ming Fu, Che-Hsin Lin
Issue Date:January 2009
pp. 726-730
This paper presents a simple method to enhance the separation efficiency of DNA biosamples in a chip-based capillary electrophoresis system utilizing high-voltage pulsed DC electric fields. Since the average power consumption is reduced by the pulse electr...
 
Research on Recognition Methods for Traffic Signs
Found in: Future Generation Communication and Networking
By Song Zhenghe, Zhao Bo, Zhu Zhongxiang, Wang Meng, Mao Enrong
Issue Date:December 2008
pp. 387-390
In order to insure safety of driving vehicle in the driver assistance system and effective navigation in the automatic driving system, a new recognition method based on the neural network and the invariant moments for traffic signs was proposed in this pap...
 
Fast Design and Construction for Network Application Solution Based on .Net 3.5 Framework
Found in: Computer Science and Software Engineering, International Conference on
By Huazhu Song, Bin Zhao, You Zhou, Yi Lu, Wang Meng
Issue Date:December 2008
pp. 420-423
The formal publication of the latest brand new generation Microsoft .NET 3.5 Framework indicates that this software giant is successful evolving on its plan. This paper introduces the technology based on .NET 3.5 Framework and its new features, advocates S...
 
A Novel Location-Aided Routing Algorithm for MANETs
Found in: Information Technology: New Generations, Third International Conference on
By Kun Wang, Meng Wu, Lu Weifeng, Xia Pengrui, Subin Shen
Issue Date:April 2008
pp. 1162-1163
The movement of nodes in MANETs results in a change in routes, requiring some mechanism for determining new routes. In this paper, a Distance-Based Location-Aided Routing (DBLAR) for MANETs had been proposed. By tracing the LI of destination nodes and the ...
 
A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks
Found in: Information Technology: New Generations, Third International Conference on
By Kun Wang, Meng Wu, Subin Shen
Issue Date:April 2008
pp. 1000-1005
In Ad Hoc networks, node misbehaviors due to selfish or malicious reasons can significantly degrade the performance of ad hoc networks. Previously, we proposed a trust-based incentive model on a self-policing mechanism to make nodes evaluate the trust of t...
 
A Learning Content Adaptation Tool with Templates for Different Handhelds
Found in: Advanced Information Networking and Applications, International Conference on
By Hsuan-Pu Chang, Jason C. Hung, Chun-Chia Wang, Meng-Ting Weng, Timothy K. Shih, Chen-Yu Lee
Issue Date:March 2008
pp. 457-463
A large number of excellent digital learning materials have been created and distributed for e-learning. These contents are mostly designed for reading on regular PCs that have big screens, powerful computing, large storage and wide bandwidth compared to h...
 
Hybrid Calibration of a Five-axis Robot based on Modeless and Model-based Methods
Found in: Innovative Computing ,Information and Control, International Conference on
By Daokui Qu, Jintao Wang, Meng Pan, Dianguo Xu, Zhenyu Liu
Issue Date:September 2007
pp. 612
Through Analysis of both model-based robotic calibration and modeless robotic calibration, considering the structure of a five-axis grinding robot, a hybrid robotic calibration method is proposed which combines the advantages of the two common robotic cali...
 
Dynamic Key Messaging for Cluster Computing
Found in: Network Computing and Applications, IEEE International Symposium on
By Ming Zhu, Yang Wang, Meng Ding, Constantine Katsinis
Issue Date:September 2004
pp. 192-199
Over the past decades, distributed computing has been gaining popularity. It provides more computing power and memory space for parallel applications. On the other hand, such applications fight back and challenge the architectures of the distributed system...
 
Design and Implementation of XML-Based Communication Protocol for CECSS
Found in: Information Science and Engineering, International Conference on
By Qiang Lu, Jie Li, Hua Wang, Meng-jun Zhou
Issue Date:December 2009
pp. 1699-1702
Concerning the features of multi-objects and massive data transmission, a XML-based method to design and implement communication protocol for CECSS is presented. With the aid of UML, the typical requesting and responding protocols of CECSS are analyzed thr...
 
Colorizing tags in tag cloud: a novel query-by-tag music search system
Found in: Proceedings of the 19th ACM international conference on Multimedia (MM '11)
By Hsin-Min Wang, Ju-Chiang Wang, Meng-Sung Wu, Shyh-Kang Jeng, Yu-Chin Shih
Issue Date:November 2011
pp. 293-302
This paper presents a novel content-based query-by-tag music search system for an untagged music database. We design a new tag query interface that allows users to input multiple tags with multiple levels of preference (denoted as an MTML query) by coloriz...
     
 1  2 Next >>