Search For:

Displaying 1-50 out of 147 total
Fault Diagnosis of Gearbox Based on Order Domain Averaging
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Zi-wei Dong,Guan-hai Xue,Wei Jiang,Yan-yan Wei
Issue Date:September 2011
pp. 49-51
Against the non stationary random process of gearbox's velocity variation, an analysis method for the vibration signals at shift process in the rotate mechanism is explored. The vibration signals and the speed signals at start-up in the gearbox are sampled...
ASCSS: An Automatic Service Composition Approach Based on Service Similarity
Found in: Semantics, Knowledge and Grid, International Conference on
By Wei Jiang, Songlin Hu, Wei Li, Wei Yan, Zhiyong Liu
Issue Date:December 2008
pp. 197-204
This paper realizes an approach for automatic service composition based on graph search (ASCGS for short). It forms an interoperable directed graph (IDG) by utilizing the interoperable relationships among services, and each request will be inserted tempora...
Research on Repeatability of Vehicle Mass Analysis System
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Xiong Shu-sheng, Shi Wei, Jiang Yao-hua, Wu Xi-jiang, LI Wei, Ren Xiao-shuai, He Wen-hua, Qu Zhen-ai, Lv Yin-ding
Issue Date:January 2011
pp. 71-73
According to the specific requirements of national standards on transient emission measurement system, an emission measurement system with VMAS is constructed. The components and theory of VMAS are introduced. The system’s repeatability is discussed based ...
Continuous Query for QoS-Aware Automatic Service Composition
Found in: 2012 IEEE 19th International Conference on Web Services (ICWS)
By Wei Jiang,Songlin Hu,Dongwon Lee,Shuai Gong,Zhiyong Liu
Issue Date:June 2012
pp. 50-57
Current QoS-aware automatic service composition queries over a network of Web services are often one-time innature. After a network of Web services is built, such queries are issued once, and answers are found from the scratch. The underlying assumption is...
The Overview of Protection Schemes for Distribution Systems Containing Micro-Grid
Found in: Asia-Pacific Power and Energy Engineering Conference
By Jian Chen, Zheng-you He, Wei Jiang
Issue Date:March 2011
pp. 1-4
The Study on Enhancing the Structured Capability of Enterprise Knowledge Management—Based on the Theory of Knowledge Supply Chain
Found in: Information Science and Management Engineering, International Conference of
By Ying Wang, Wei-wei Jiang
Issue Date:August 2010
pp. 337-340
This paper introduces the theory of knowledge supply chain, and places the knowledge supply and demand of enterprises into the whole knowledge supply chain, through identifying the knowledge gaps of enterprise knowledge management, at different levels, suc...
CFS Optimizations to KVM Threads on Multi-Core Environment
Found in: Parallel and Distributed Systems, International Conference on
By Wei Jiang, Yisu Zhou, Yan Cui, Wei Feng, Yu Chen, Yuanchun Shi, Qingbo Wu
Issue Date:December 2009
pp. 348-354
Multi-core architecture provides more on-chip parallelism and powerful computational capability. It helps virtualization achieve scalable performance. KVM (kernel based virtual machine) is different from other virtualization solutions which can make use of...
An Enhanced Text Analysis Approach in Text-to-Speech Synthesis for Mandarin Chinese
Found in: International Conference on Natural Computation
By Wei Jiang, Xiao-Long Wang, Yi Guan, Xiu-Li Pang
Issue Date:August 2007
pp. 410-414
An enhanced text analysis approach for Chinese text- to-speech (TTS) systems is presented in this paper, as the basic understanding process, the text analysis need provide a fine and effective linguistic information, which is marked explicitly with the cor...
QoS-Based Service Composition under Various QoS Requirements
Found in: 2013 20th Asia-Pacific Software Engineering Conference (APSEC)
By Gang Wang,Li Zhang,Jing Jiang,Wei Jiang
Issue Date:December 2013
pp. 67-74
There are various approaches for QoS-based web service composition. However, most of them are concerned about the algorithms of service compositions while ignoring the flexibility and expressiveness of users to set QoS constraints. Most of them assume that...
Design Optimization of Energy- and Security-Critical Distributed Real-Time Embedded Systems
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Xia Zhang,Jinyu Zhan,Wei Jiang,Yue Ma,Ke Jiang
Issue Date:May 2013
pp. 741-750
In this paper, we approach the design of energy-and security-critical distributed real-time embedded systems from the early mapping and scheduling phases. Modern Distributed Embedded Systems (DESs) are common to be connected to external networks, which is ...
Resource Allocation of Security-Critical Tasks with Statistically Guaranteed Energy Constraint
Found in: 2012 IEEE 18th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2012)
By Wei Jiang,Ke Jiang,Yue Ma
Issue Date:August 2012
pp. 330-339
In this paper, we are interested in resource allocation for energy constrained and security-critical embedded systems. Tasks in such systems need to be successfully executed under certain energy budget and be robust against serious security threatens. Diff...
Skin Detection Using Color, Texture and Space Information
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Zhiwei Jiang, Min Yao, Wei Jiang
Issue Date:August 2007
pp. 366-370
Among various skin detection methods, Skin Probability Map (SPM) method is an effective one. Though SPM method possesses high true acceptance rate (TAR), its false acceptance rate (FAR) is unacceptable in some cases. The reason is that SPM method only use ...
Large-Scale Longitudinal Analysis of SOAP-Based and RESTful Web Services
Found in: 2012 IEEE 19th International Conference on Web Services (ICWS)
By Wei Jiang,Dongwon Lee,Songlin Hu
Issue Date:June 2012
pp. 218-225
While the usage of web services has increased explosively in recent years, very few studies examined the characteristics of web services using large-scale real data for a long period of time. In this paper, we present one such a large scale longitudinal an...
MATE-CG: A Map Reduce-Like Framework for Accelerating Data-Intensive Computations on Heterogeneous Clusters
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Wei Jiang,Gagan Agrawal
Issue Date:May 2012
pp. 644-655
Clusters of GPUs have rapidly emerged as the means for achieving extreme-scale, cost-effective, and powerefficient high performance computing. At the same time, high level APIs like map-reduce are being used for developing several types of high-end and/or ...
SciMATE: A Novel MapReduce-Like Framework for Multiple Scientific Data Formats
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Yi Wang,Wei Jiang,Gagan Agrawal
Issue Date:May 2012
pp. 443-450
Despite the popularity of MapReduce, there are several obstacles to applying it for developing scientific data analysis applications. Current MapReduce implementations require that data be loaded into specialized file systems, like the Hadoop Distributed F...
Ex-MATE: Data Intensive Computing with Large Reduction Objects and Its Application to Graph Mining
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Wei Jiang, Gagan Agrawal
Issue Date:May 2011
pp. 475-484
Map-reduce framework has been widely used as the infrastructure for processing large-scale datasets in various domains. Recent work has shown that an alternate API MATE(Mapreduce with an Alternate API), where a reduction object is explicitly maintained and...
The Research on Grid-Connected Photovoltaic Inverter Based on DSP
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Lili Zhang, Yueping Mo, Wei Jiang, Jin Cong
Issue Date:October 2010
pp. 723-726
This paper proposes a two-stage structure solar inverter topology with maximum power point tracking capability. The control of the solar inverter is digitally implemented using Freescale DSP56F8346, the dedicated photovoltaic intelligent power modules is u...
Data stream clustering and modeling using context-trees
Found in: International Conference on Services Systems and Services Management
By Wei Jiang, Pierre Brice
Issue Date:June 2009
pp. 932-937
Many applications such as telecommunication and commercial video broadcasting streams, computer systems logs, and web clicks are categorical or mixed-value data streams that exhibit context-dependency. Models that try to capture this context-dependency ten...
Gabor Wavelets for Image Processing
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Wei Jiang, Ting-Zhi Shen, Jian Zhang, Yu Hu, Xin-Yi Wang
Issue Date:August 2008
pp. 110-114
This paper proposes an efficient algorithm for edge detection. Our algorithm is based on an improved Gabor wavelets-based (IGWs) edge detector, and can detect edges with eight directions. Morphological operations can be used as techniques for images pre- o...
Toward Experiential Mobile Media Processing
Found in: IEEE MultiMedia
By John Wus,Jun Tian,Hongbing Li,Dong-Qing Zhang,Wei Jiang,Zhenyu Wu,Heather Yu
Issue Date:April 2014
pp. 80-89
Smartphone cameras are often used to take pictures and videos because so many people now carry their smartphones everywhere. Therefore, smartphone camera quality plays an important role in overall smartphone evaluation and usage. Although smartphone camera...
A Vulnerability Optimization Method for Security-Critical Real-Time Systems
Found in: 2013 IEEE 8th International Conference on Networking, Architecture, and Storage (NAS)
By Xia Zhang,Jinyu Zhan,Wei Jiang,Yue Ma
Issue Date:July 2013
pp. 215-221
In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among securit...
Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Bharath K. Samanthula, Wei Jiang
Issue Date:June 2013
pp. 51-58
With the growing popularity of data and service outsourcing, where the data resides on remote servers in encrypted form, there remain open questions about what kind of query operations can be performed on the encrypted data. In this paper, we focus on one ...
Incentive Compatible Privacy-Preserving Data Analysis
Found in: IEEE Transactions on Knowledge and Data Engineering
By Murat Kantarcioglu,Wei Jiang
Issue Date:June 2013
pp. 1323-1335
In many cases, competing parties who have private data may collaboratively conduct privacy-preserving distributed data analysis (PPDA) tasks to learn beneficial data models or analysis results. Most often, the competing parties have different incentives. A...
A Probabilistic Encryption Based MIN/MAX Computation in Wireless Sensor Networks
Found in: 2013 14th IEEE International Conference on Mobile Data Management (MDM)
By Bharath K. Samanthula,Wei Jiang,Sanjay Madria
Issue Date:June 2013
pp. 77-86
Wireless sensor networks (WSNs) have wide range of applications in military, health-monitoring, smart-home applications, and in other commercial environments. The computation of data aggregation functions like MIN/MAX is one of the commonly used tasks in m...
Structural and Message Based Private Friend Recommendation
Found in: 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
By B. K. Samanthula, Wei Jiang
Issue Date:August 2012
pp. 684-690
The emerging growth of online social networks have opened new doors for various business applications such as promoting a new product across its customers. Besides this, friend recommendation is an important tool for recommending potential candidates as fr...
An Adaptive Risk Control and Security Management for Embedded Real-Time System
Found in: 2012 Seventh International Conference on Availability, Reliability and Security (ARES)
By Yue Ma,Wei Jiang,Nan Sang,Ziguo Zhong
Issue Date:August 2012
pp. 11-17
Traditional mechanisms for risk control and task scheduling may not be very suitable for security-critical embedded real-time systems under dynamic peration environments. In this paper, we are interested in design of an adaptive risk control and management...
SAFCM: A Security-Aware Feedback Control Mechanism for Distributed Real-Time Embedded Systems
Found in: 2012 IEEE 18th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2012)
By Yue Ma,Wei Jiang,Nan Sang,Paul Pop
Issue Date:August 2012
pp. 340-349
Distributed Real-time Embedded (DRE) systems are facing great challenges in networked, unpredictable and especially unsecured environments. In such systems, there is a strong need to enforce security on distributed computing nodes in order to guard against...
Grouplet-Based Distance Metric Learning for Video Concept Detection
Found in: 2012 IEEE International Conference on Multimedia and Expo (ICME)
By Wei Jiang,Alexander C. Loui
Issue Date:July 2012
pp. 753-758
We investigate general concept detection in unconstrained videos. A distance metric learning algorithm is developed to use the information of the group let structure for improved detection. A group let is defined as a set of audio and/or visual code words ...
Design of Real Time Multimedia Platform and Protocol to the Internet of Things
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Wei Jiang,Limin Meng
Issue Date:June 2012
pp. 1805-1810
With the vigorous development of the Internet of Thing (IOT) technology, the wave of the Internet of Things applications followed by. Applications based on IOT real-time multimedia are under the spotlight. However, due to the needs of real-time characteris...
Research on Cryptographic Algorithms for Embedded Real-time Systems: A Perspective of Measurement-based Analysis
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Wei Jiang,Zhenlin Guo,Yue Ma,Nan Sang
Issue Date:June 2012
pp. 1495-1501
Security and energy are two main concerns for embedded systems, especially in battery-powered security-critical systems. In this paper, we make efforts to identify energy-related characteristics of common security algorithms for data-sensitive embedded rea...
Distributing Power Grid State Estimation on HPC Clusters - A System Architecture Prototype
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Yan Liu,Wei Jiang,Shuangshuang Jin,Mark Rice,Yousu Chen
Issue Date:May 2012
pp. 1467-1476
The future power grid is expected to further expand with highly distributed energy sources and smart loads. The increased size and complexity lead to increased burden on existing computational resources in energy control centers. Thus the need to perform r...
Design of ECG Signal Acquisition and Processing System
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Zeli Gao,Jie Wu,Jianli Zhou,Wei Jiang,Lihui Feng
Issue Date:May 2012
pp. 762-764
In this paper, the electrocardiogram (ECG) signal detecting, amplifying, anti-aliasing filtering circuits were designed and made to get the analog ECG signal, and then make it necessarily conditioned to meet the requirement of data acquisition card USB-600...
A Comparison of Detection Probability of CUSUM Procedures under Increasing Population Sizes
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Honghao Zhao,Lianjie Shu,Wei Jiang,Kwok-Leung Tsui
Issue Date:May 2012
pp. 1152-1155
Detecting increases of incidence rate of an adverse health event is critical to health surveillance. Motivated by successful applications in industry quality control and productivity improvement, various cumulative sum (CUSUM) procedures have been develope...
Scheduling Concurrent Applications on a Cluster of CPU-GPU Nodes
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Vignesh T. Ravi,Michela Becchi,Wei Jiang,Gagan Agrawal,Srimat Chakradhar
Issue Date:May 2012
pp. 140-147
Heterogeneous architectures comprising a multicore CPU and many-core GPU(s) are increasingly being used within cluster and cloud environments. In this paper, we study the problem of optimizing the overall throughput of a set of applications deployed on a c...
Development of Evaluation on Urban Land Intensive Use System Based on the Distributional Structure of Client/Serve
Found in: Computer Science and Electronics Engineering, International Conference on
By Pan Hongyi,Gu Jirong,He Wei,Jiang Guiguo
Issue Date:March 2012
pp. 295-298
The purpose of this study is to develop an information system for evaluation of urban land Intensive use, so as to make the evaluating processes modeled and automated. Evaluation of Intensive urban land (EIUL) is considers as research object, and the metho...
NestCloud: Towards practical nested virtualization
Found in: Cloud and Service Computing, International Conference on
By Zhenhao Pan,Qing He,Wei Jiang,Yu Chen,Yaozu Dong
Issue Date:December 2011
pp. 321-329
This paper describes a nested virtualization solution, which allows virtual machine monitor (VMM) with virtual machine to run within another virtual machine with low overhead. Previous nested virtualization solutions on x86 platform are mainly based on emu...
Energy Measurement and Analysis of Security Algorithms for Embedded Systems
Found in: IEEE/ACM International Conference on Green Computing and Communications
By Zhenlin Guo,Wei Jiang,Nan Sang,Yue Ma
Issue Date:August 2011
pp. 194-199
Energy and security are hot topics for real-time embedded systems. However, little traditional research consider the two factors together, which leaves a great challenge to guarantee the security of embedded applications running under battery-powered real-...
Effects of Air Flow Disturbance of Spool Valve on Vibration Control of Active Pneumatic Vibration Isolation System
Found in: Digital Manufacturing and Automation, International Conference on
By Feijong Liao,Xiaoping Li,Wei Jiang
Issue Date:August 2011
pp. 492-497
Active pneumatic vibration isolation system (APVIS) is widely used in IC equipments and high precision metrology devices. Proportional spool valves are normally used as its actuator. However, it exhibits strong non-Linearity, such as dead zone and stick-sL...
Automatic consumer video summarization by audio and visual analysis
Found in: Multimedia and Expo, IEEE International Conference on
By Wei Jiang,Courtenay Cotton,Alexander C. Loui
Issue Date:July 2011
pp. 1-6
Video summarization provides a condensed version of a video stream by analyzing the video content. Automatic summarization of consumer videos is an important tool that facilitates efficient browsing, searching, and album creation in large consumer video co...
Process Calculation Method Study and Application of Oil-Gas Multiphase Transportation Pipeline
Found in: Asia-Pacific Power and Energy Engineering Conference
By Li-xin Wei, Jiang-bo Wen, Yang Liu, Yan-chun Xu
Issue Date:March 2011
pp. 1-4
Effect of DC Bias Current on Group-Type Transformer and Its Restraining Measures
Found in: Asia-Pacific Power and Energy Engineering Conference
By Wei Jiang, Lin Yang, Xi Liu, Guangning Wu
Issue Date:March 2011
pp. 1-4
Solar Cells Parameter Extraction Using a Hybrid Genetic Algorithm
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Xue Lingyun, Sun Lefei, Huang Wei, Jiang Cong
Issue Date:January 2011
pp. 306-309
Using the numerical analysis and optimization method to extract solar cells parameters, one recurrent issue refers to the difficulty in initializing the parameters. These methods using solar cells exponential model are sensible to small changes in the data...
Privacy-Preserving Updates to Anonymous and Confidential Databases
Found in: IEEE Transactions on Dependable and Secure Computing
By Alberto Trombetta, Wei Jiang, Elisa Bertino, Lorenzo Bossi
Issue Date:July 2011
pp. 578-587
Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for ce...
Multilevel Image Thresholding Selection Based on the Firefly Algorithm
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Ming-Huwi Horng, Ting-Wei Jiang
Issue Date:October 2010
pp. 58-63
The multilevel thresholding is an important technique for image processing and pattern recognition. The maximum entropy thresholding has been widely applied in the literature. In this paper, a new multilevel MET algorithm based on the technology of the fir...
The Overview of Research on Microgrid Protection Development
Found in: Intelligent System Design and Engineering Application, International Conference on
By Wei Jiang, Zheng-you He, Zhi-qian Bo
Issue Date:October 2010
pp. 692-697
In general, the microgrid can operate in both grid-connection mode and islanded mode that challenges the traditional over-current protection scheme in the distribution network. The novel research and development of protection, including both the microgrid ...
Periodic Real-Time Message Scheduling for Confidentiality-Aware Cyber-Physical System in Wireless Networks
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Wei Jiang, Wensheng Guo, Nan Sang
Issue Date:August 2010
pp. 355-360
Security problem poses a great challenge for running mission-critical cyber-physical systems in wireless networks. With the disregard of security factors, existing message scheduling schemes expose critical messages to security threats, especially by confi...
Automatic aesthetic value assessment in photographic images
Found in: Multimedia and Expo, IEEE International Conference on
By Wei Jiang, Alexander C. Loui, Cathleen Daniels Cerosaletti
Issue Date:July 2010
pp. 920-925
The automatic assessment of aesthetic values in consumer photographic images is an important issue for content management, organizing and retrieving images, and building digital image albums. This paper explores automatic aesthetic estimation in two differ...
The Design of Digital Amplitude-Frequency Equilibrium Power Amplifier
Found in: Information Technology and Applications, International Forum on
By Liu Wei, Jiang Wenlong, Qi Haidong
Issue Date:July 2010
pp. 152-154
The purpose of this design is to design and produce an amplitude-frequency balanced power amplifier. It is controlled by attenuation-frequency characteristics of the cosine type equalizer, making it compensate for unbalanced system attenuation-frequency ch...
QSynth: A Tool for QoS-aware Automatic Service Composition
Found in: Web Services, IEEE International Conference on
By Wei Jiang, Charles Zhang, Zhenqiu Huang, Mingwen Chen, Songlin Hu, Zhiyong Liu
Issue Date:July 2010
pp. 42-49
With the proliferation of Web services, service engineers demand good automatic service composition algorithms that not only synthesize the correct work plans from thousands of services but also satisfy the quality requirements of the users. Our observatio...
Non-rigid Registration in 3D Implicit Vector Space
Found in: Shape Modeling and Applications, International Conference on
By Zhi-Quan Cheng, Wei Jiang, Gang Dang, Ralph R. Martin, Jun Li, Honghua Li, Yin Chen, Yanzhen Wang, Bao Li, Kai Xu, Shiyao Jin
Issue Date:June 2010
pp. 37-46
We present an implicit approach for pair-wise non-rigid registration of moving and deforming objects. Shapes of interest are implicitly embedded in the 3D implicit vector space. In this implicit embedding space, registration is performed using a global-to-...
 1  2 Next >>