Search For:

Displaying 1-50 out of 95 total
The Research on Network Teaching Evaluation Based on Fuzzy Synthesis
Found in: Education Technology and Computer Science, International Workshop on
By Haimei Wei, Feng Wang, Chengling Zhao, Ling Jiang, Wei Lu
Issue Date:March 2009
pp. 923-926
The construction and improvement of teaching evaluation system is a very important part of teaching work in recent years. Along with the constant development of network-based study, a comprehensively scientifically and objective evaluation is increasingly ...
An object-oriented model for drawing understanding and its ability of noise absorption
Found in: Document Analysis and Recognition, International Conference on
By Wei Wu, Wei Lu, M. Sakauchi
Issue Date:August 1995
pp. 261
In this paper we propose a new framework of object-oriented model named MTDM (Matching Tree Driving Model) for drawing understanding and verify its ability of noise absorption. MTDM makes use of descriptions of object-oriented style and is an integration o...
Content Dependent Image Watermarking Using Chaos and Robust Hash
Found in: Computational Intelligence and Security Workshops, International Conference on
By Wei Lu, Hongtao Lu
Issue Date:December 2007
pp. 660-663
Most of the present watermarking schemes focused on achieving the robustness to common signal processing and geometrical distortions. However, there are many special attacks to watermarking introduced in recent years, such as collusion attacks, copy attack...
A Modified Canny Algorithm for Detecting Sky-Sea Line in Infrared Images
Found in: Intelligent Systems Design and Applications, International Conference on
By Jun-Wei Lu, Jian-Cun Ren, Yi Lu, Xiao-Hu Yuan, Chen-Gang Wang
Issue Date:October 2006
pp. 289-294
Detecting sky-sea line is very important to identify targets for missile imaging guidance. As traditional Canny algorithm gives out too many edges in infrared images with sky-sea background, an modified Canny algorithm is suggested to detect the sky-sea li...
Detecting Puny Target in Infrared Images Based on Edge Characteristics
Found in: Intelligent Systems Design and Applications, International Conference on
By Jun-Wei Lu, Chen-Gang Wang, Jian-Cun Ren, Xiao-Hu Yuan, Yi Lu
Issue Date:October 2006
pp. 283-288
Detecting puny target on a sea is very important to missile guidance of anti-warship. An algorithm based on edge characteristics is suggested in this paper to detect the puny target on a sea. Based on the maximum length and on the equal diameter of objects...
Remote Sensing Images Super-resolution Based on Sparse Dictionaries and Residual Dictionaries
Found in: 2013 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC)
By Yingying Zhang,Wei Wu,Yong Dai,Xiaomin Yang,Binyu Yan,Wei Lu
Issue Date:December 2013
pp. 318-323
In this paper, a sensing image super-resolution (SR) reconstruction method is proposed. Sparse dictionary dealing with remote sensing image SR problem is introduced in this work. The sparse dictionary is based on a sparsity model where the dictionary atoms...
A Multi-agent Simulation Paradigm of Customer Retention Management
Found in: Computer Science and Information Engineering, World Congress on
By En Li, Wei Lu, Ying Zhou
Issue Date:April 2009
pp. 581-585
Customer retention is one of the most important topics in customer relationship management research. To date,customer retention studies are mainly carried out on the macro or firm level instead of the individual customer level. This study develops a model ...
Efficiently Supporting Edit Distance Based String Similarity Search Using B
Found in: IEEE Transactions on Knowledge and Data Engineering
By Wei Lu,Xiaoyong Du,Marios Hadjieleftheriou,Beng Chin Ooi
Issue Date:December 2014
pp. 2983-2996
Edit distance is widely used for measuring the similarity between two strings. As a primitive operation, edit distance based string similarity search is to find strings in a collection that are similar to a given query string using edit distance. Existing ...
A SysML Based Requirement Modeling Automatic Transformation Approach
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Chih-Hung Chang,Chih-Wei Lu,Wen Pin Yang,William Cheng-Chung Chu,Chao-Tung Yang,Ching-Tsorng Tsai,Pao-Ann Hsiung
Issue Date:July 2014
pp. 474-479
In a software development life cycle, system requirement management is an important but neglected step. A good requirement management can not only help developers to meet the requirements of the system, but also play an essential role for the communication...
Efficient and Scalable Processing of String Similarity Join
Found in: IEEE Transactions on Knowledge and Data Engineering
By Chuitian Rong,Wei Lu,Xiaoli Wang,Xiaoyong Du,Yueguo Chen,Anthony K.H. Tung
Issue Date:October 2013
pp. 2217-2230
The string similarity join is a basic operation of many applications that need to find all string pairs from a collection given a similarity function and a user-specified threshold. Recently, there has been considerable interest in designing new algorithms...
Study of Biological Population Stable Development Based on Mathematical Models
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Yuanhao Lai,Wei Lu,Tianyuan Zheng
Issue Date:June 2013
pp. 872-875
In this paper, we take the elephant population from a large National Park in South Africa as a typical example to study how to keep population stable. According to approximate age and gender data of the elephants emigrated from the park in the last two yea...
An Empirical Study of Liquidity Premium Based on Multiple Models
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Wei Lu,Yuanhao Lai,Yangzhuo Liu
Issue Date:June 2013
pp. 388-391
Whether the degree of stock liquidity affects stock price is a hot issue of capital market theory. This paper studies the relationship between liquidity and expected return in A share market of China. According to the stock market liquidity premium theory,...
Mining Botnet Behaviors on the Large-Scale Web Application Community
Found in: 2013 Workshops of International Conference on Advanced Information Networking and Applications (WAINA)
By Daniel Garant,Wei Lu
Issue Date:March 2013
pp. 185-190
Botnets are networks of compromised computers controlled under a common command and control channel. Recognized as one of the most serious security threats on current Internet infrastructure, botnets are often hidden in existing applications, e.g. IRC, HTT...
Dynamic RMSA in spectrum-sliced elastic optical networks for high-throughput service provisioning
Found in: 2013 International Conference on Computing, Networking and Communications (ICNC)
By Liang Zhang,,Wei Lu,,Xiang Zhou,,Zuqing Zhu
Issue Date:January 2013
pp. 380-384
We propose several novel dynamic routing, modulation and spectrum assignment (RMSA) algorithms for high-throughput service provisioning in spectrum-sliced elastic optical networks. The proposed algorithms can be applied to network provisioning, where a net...
Profit Maximization over Social Networks
Found in: 2012 IEEE 12th International Conference on Data Mining (ICDM)
By Wei Lu,Laks V.S. Lakshmanan
Issue Date:December 2012
pp. 479-488
Influence maximization is the problem of finding a set of influential users in a social network such that the expected spread of influence under a certain propagation model is maximized. Much of the previous work has neglected the important distinction bet...
The Development of Cloud Computing and Its Challenges for Taiwan
Found in: 2012 IEEE 36th Annual Computer Software and Applications Conference - COMPSAC 2012
By William C. Chu,Chih-Hung Chang,Chih-Wei Lu,Juei-Nan Chen,Feng-Jian Wang
Issue Date:July 2012
pp. 380-386
Along with the growing attention, cloud computing is not only changing the computing paradigm, but also the style of computing in which dynamically scalable and virtualized resources are provided as services over the Internet. Cloud computing introduces a ...
Cloud computing in Taiwan
Found in: Computer
By William Cheng-Chung Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Juei-Nan Chen, Pao-Ann Hsiung, Hahn-Ming Lee
Issue Date:June 2012
pp. 48-56
Cloud computing is changing the computing environment: scalable, virtualized resources are increasingly provided as services over the Internet. Taiwan is also changing, transforming itself from a hardware manufacturing island into a cloud village offering ...
Project Daytona: Data Analytics as a Cloud Service
Found in: Data Engineering, International Conference on
By Roger S. Barga,Jaliya Ekanayake,Wei Lu
Issue Date:April 2012
pp. 1317-1320
Spreadsheets are established data collection and analysis tools in business, technical computing and academic research. Excel, for example, offers an attractive user interface, provides an easy to use data entry model, and offers substantial interactivity ...
Design and Realization of Grain Seed Quality Testing System Based on Particle Image Processing Technology
Found in: Computer Science and Electronics Engineering, International Conference on
By Duan Liying,Zhang Genshan,Liu Xuning,Shi Wei,Lu Aiqin,Chen Weihua
Issue Date:March 2012
pp. 61-65
How to quickly and accurately identify the quality of grain seed, grain type and other basic indicators and improve the efficiency of breeding quality, wheat production and quality in the work of selection or breeding have become a serious problem. The pro...
SIMPATH: An Efficient Algorithm for Influence Maximization under the Linear Threshold Model
Found in: Data Mining, IEEE International Conference on
By Amit Goyal,Wei Lu,Laks V.S. Lakshmanan
Issue Date:December 2011
pp. 211-220
There is significant current interest in the problem of influence maximization: given a directed social network with influence weights on edges and a number k, find k seed nodes such that activating them leads to the maximum expected number of activated no...
Resource Management for Robotic Applications
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Yi-Zong Ou,E. T.-H. Chu,Wen-Wei Lu,Jane W. S. Liu,Ta-Chih Hung,Jwu-Sheng Hu
Issue Date:November 2011
pp. 1210-1216
This paper presents Robotic Application Resource Management Services (RARMS), a collection of tools for integrating reusable software components of a wide class of robotic applications on Microsoft Windows, a general-purpose, commodity operating system. RA...
Upper capacity bound and power allocation in polarized distributed MIMO system
Found in: Software Maintenance and Reengineering, European Conference on
By Wei Lu, Desheng Wang, Yingzhuang Liu
Issue Date:August 2011
pp. 200-204
By deriving the upper capacity bound of the polarized distributed MIMO system on Rician channel, the suboptimal power allocation scheme is presented by applying Lagrangian optimization. The suboptimal power allocation is based on the path loss fading infor...
XML-Based Reusable Component Repository for Embedded Software
Found in: Computer Software and Applications Conference Workshops
By Chih-Hung Chang,Chih-Wei Lu,William C. Chu,Chao-Tung Yang,Pao-Ann Hsiung,Nien-Lin Hsueh,Chorng-Shiuh Koong,Kuei-Kai Shao
Issue Date:July 2011
pp. 345-350
In the development stage of the embedded system, the market demand and system development trend will be influence by the Time to Market. Reliable and fast system deployment is not easy to implement. Reduced price and system development time can increase th...
A Scalable Communication Runtime for Clouds
Found in: Cloud Computing, IEEE International Conference on
By Jaliya Ekanayake,Jared Jackson,Wei Lu,Roger Barga,Atilla Soner Balkir
Issue Date:July 2011
pp. 211-218
Leveraging cloud computing to acquire the necessary computation resources to scale out parallel applications is becoming common practice. However, many such applications also require communication and synchronization between processes. Although, commercial...
A SysML-Based Requirement Supporting Tool for Embedded Software
Found in: Secure Software Integration and Reliability Improvement Companion, IEEE International Conference on
By Chih-Hung Chang, Chih-Wei Lu, Kuo-Fong Kao, William C. Chu, Chao-Tung Yang, Nien-Lin Hsueh, Pao-Ann Hsiung, Chorng-Shiuh Koong
Issue Date:June 2011
pp. 202-206
Maintaining uniformity of software requirement documents with the artifacts of other phases of software lifecycle is very important. However, it is a difficult and time-consuming task. Natural language usually contains uncertainty. Most requirement documen...
CloudClustering: Toward an Iterative Data Processing Pattern on the Cloud
Found in: Parallel and Distributed Processing Workshops and PhD Forum, 2011 IEEE International Symposium on
By Ankur Dave,Wei Lu,Jared Jackson,Roger Barga
Issue Date:May 2011
pp. 1132-1137
As the emergence of cloud computing brings the potential for large-scale data analysis to a broader community, architectural patterns for data analysis on the cloud, especially those addressing iterative algorithms, are increasingly useful. MapReduce suffe...
Computer-Assisted Archaeological Line Drawing
Found in: Computer
By Renju Li, Tao Luo, Hongbin Zha, Wei Lu
Issue Date:July 2011
pp. 62-65
Traditional 2D line-drawing methods are mostly manual and hence quite laborious. A new 3D-model-assisted approach makes archaeological reports more accurate, efficient, and informative. The Web extra is a video that shows a new computer-assisted archaeolog...
Direct Optimization of Low-Thrust Transfers Using Averaging Techniques Based on Fourier Series Expansion
Found in: Computational Sciences and Optimization, International Joint Conference on
By Pan Wei, Lu Changhou
Issue Date:April 2011
pp. 46-50
Low-thrust transfers in the central gravitational field involve a large number of orbital revolutions, which poses a real challenge to trajectory optimization. This article uses an orbital averaging technique based on Fourier series Expansion to describe t...
Study on Measurement Model for Forest Risk Assessment in Beijing
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Zhang Ying, Yi Ai-jun, Ji Jian-wei, Lu Ji
Issue Date:February 2011
pp. 1750-1755
It has an important significance to promote the Beijing forestry development and strengthen forest resources management for study on Beijing forest measurement model of risk assessment. This paper has studied on forest measurement model of risk assessment ...
Research on the Treatment of Oily Wastewater by Laboratory Static Simulation Experiments in the Loess-Microorganism System
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Han Zhiyong, Feng Xin, Li Wei, Lu Ling
Issue Date:January 2011
pp. 135-138
The removal effect of loess-microorganism system on oil pollution treatment was studied by static simulation laboratory experiments in this paper. The influencing factors such as nutrient substance, temperature, oxidizer and pH were analyzed. The optimal e...
Performing Large Science Experiments on Azure: Pitfalls and Solutions
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Wei Lu, Jared Jackson, Jaliya Ekanayake, Roger S. Barga, Nelson Araujo
Issue Date:December 2010
pp. 209-217
Carrying out science at extreme scale is the next generational challenge facing the broad field of scientific research. Cloud computing offers to potential for an increasing number of researchers to have ready access to the large scale compute resources re...
From Applications, to Models and to Embedded System Code: A Modeling Approach in Action
Found in: Quality Software, International Conference on
By Hsin-Yu Tung, Chih-Hung Chang, Chih-Wei Lu, William C. Chu, Hongji Yang
Issue Date:July 2010
pp. 488-494
Embedded systems are becoming more and more popular in current digital era. In order to improve the development efficiency, a framework of Object-Oriented (OO) program on embedded system is designed in this research. UML modeling language is adopted to con...
Research of Detecting System of Tower Crane Based on .NET Environment
Found in: Electrical and Control Engineering, International Conference on
By Zhou Jianxing, Qiu Xinguo, Jiang Wei, Lu Xu
Issue Date:June 2010
pp. 1598-1601
Tower crane is broadly adopted in industrial, it is urgent necessary to study the effective means to detect and evaluate the status of tower cranes. May be it is a good way to use finite element software to analyze the tower cranes' status parameters. A pa...
Efficient Common Items Extraction from Multiple Sorted Lists
Found in: Conference, International Asia-Pacific Web
By Wei Lu, Chuitian Rong, Jinchuan Chen, Xiaoyong Du, Gabriel Pui Cheong Fung, Xiaofang Zhou
Issue Date:April 2010
pp. 219-225
Given a set of lists, where items of each list are sorted by the ascending order of their values, the objective of this paper is to figure out the common items that appear in all of the lists efficiently. This problem is sometimes known as common items ext...
An Adaptive Deformation Method Based on Hierarchical Progressive Meshes
Found in: Networking and Services, International conference on
By Wei Lu, Jingui Pan
Issue Date:March 2010
pp. 375-380
This paper proposes a novel adaptive deformation method based on a hierarchical progressive mesh structure. It hierarchically clusters faces to construct a binary tree of the original model and creates a progressive mesh for each node. Based on this struct...
Robust Planning of Test Poles for Grounding Grids Corrosion Diagnosis
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Jian Liu, Jianxin Wang, Zengli Li, Wei Lu, Sen Wang, Zhizhong Li
Issue Date:March 2010
pp. 283-286
To aid the corrosion diagnosis of a grounding grid, test poles are suggested to implant on some nodes. A genetic algorithm based test poles allocation optimization approach is suggested to work out the set of schemes to make all of the branches clear with ...
A Study on Performance of Inter-Vehicle Communications in Bidirectional Traffic Streams
Found in: Future Networks, International Conference on
By Xiaoyan Sun, Yuanlu Bao, Wei Lu, Jun Dai, Zhe Wang
Issue Date:January 2010
pp. 68-72
Inter-vehicle communication (IVC) network has become an important topic in research for its potential advantages in enhancing traffic security and efficiency. This paper investigates the communication performance of IVC networks in two lane bidirectional t...
Design and Implementation of Web Services Oriented GPRS Remote Meter Reading Model
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Li Wei, Lu Hui, Zhang Xiaoliang, Wang Yuanhong
Issue Date:December 2009
pp. 281-284
Based on the research on a power company remote meter reading system and for the purpose of enhancing the management level of the meter reading of power companies, the web services oriented GPRS remote meter reading model is suggested. By means of the Web ...
Privacy Preserving Classification Algorithm Based on Random Multidimensional Scales
Found in: Computational Intelligence and Design, International Symposium on
By Wei Lu, Yi-ping Jiang
Issue Date:December 2009
pp. 406-409
A privacy preserving classification algorithm based on random Multidimensional Scales(MDS) is presented in this paper. We first alter the selection of the parameter embedded dimension d for satisfying the security of privacy preserving classification. Furt...
Fault Tolerant Control of Networked Control System with Delay in Forward and Feedback Channels
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yu Qiang-Chen, Guo Lin-Sun, Wei-Lu, Zhi Yan-Xu, Qi Lin-Liu
Issue Date:October 2009
pp. 537-540
This paper deals with fault tolerant control of a Networked Control Systems (NCS) problem with network delay. With the augmented state space method, the integrity design of NCSs with faults was analyzed. A optimal casual state feedback control law was show...
An Anomaly Detection and Analysis Method for Network Traffic Based on Correlation Coefficient Matrix
Found in: Scalable Computing and Communications; International Conference on Embedded Computing, International Conference on
By Ning Chen, Xiao-Su Chen, Bing Xiong, Hong-Wei Lu
Issue Date:September 2009
pp. 238-244
Based on TCP protocol, this paper aims at TCP flows, discusses the effects of multivariate correlation analysis on network traffic, obtains the quantitative relationship between different types of TCP packets in each time unit by correlation coefficient ma...
A Novel 1GSPS Low Offset Comparator for High Speed ADC
Found in: Networked Computing and Advanced Information Management, International Conference on
By Guo Yongheng, Cai Wei, Lu Tiejun, Wang Zongmin
Issue Date:August 2009
pp. 1251-1254
In high speed ADC, comparator influence the overall performance of ADC directly. This paper describes an ultra high speed and low offset preamplifier-latch comparator. The comparator use two negative resistors parallel with positive resistors as load resis...
Query Structural Information of BPEL Processes
Found in: Internet and Web Applications and Services, International Conference on
By Zhilei Ma, Wei Lu, Frank Leymann
Issue Date:May 2009
pp. 401-406
Reuse of proven process models increases modeling efficiency and ensure the quality of process models. To provide a better support for reuse, the retrieval mechanisms of process repositories should be able to propose similar process models that ranked acco...
Online Classification of Network Flows
Found in: Communication Networks and Services Research, Annual Conference on
By Mahbod Tavallaee, Wei Lu, Ali A. Ghorbani
Issue Date:May 2009
pp. 78-85
Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we propose a hybrid mechanism for online classification of network traffic, in which...
BotCop: An Online Botnet Traffic Classifier
Found in: Communication Networks and Services Research, Annual Conference on
By Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi, Ali A. Ghorbani
Issue Date:May 2009
pp. 70-77
A botnet is a network of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. As one the most serious security threats to the Internet, a botnet cannot only be implemented ...
Research on Web Services Oriented Power Marketing Workflow Model
Found in: Information Technology and Applications, International Forum on
By Li Wei, Lu Hui, Li Jing
Issue Date:May 2009
pp. 7-10
Based on research on the a power company Power Marketing MIS (Management Information System) and for the purpose of enhancing the management level of the marketing of electricity power companies, the Web Services oriented power marketing workflow model is ...
Real-time dynamic MR image reconstruction using Kalman Filtered Compressed Sensing
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Chenlu Qiu, Wei Lu, Namrata Vaswani
Issue Date:April 2009
pp. 393-396
In recent work, Kalman Filtered Compressed Sensing (KF-CS) was proposed to causally reconstruct time sequences of sparse signals, from a limited number of “incoherent” measurements. In this work, we develop the KF-CS idea for causal reconstruction of medic...
A Study on Information Throughput of Inter-vehicle Communications in a Unidirectional Traffic Stream
Found in: Communications and Mobile Computing, International Conference on
By Zhe Wang, Wei Lu, Wenlong Jin
Issue Date:January 2009
pp. 396-401
Inter-vehicle communications (IVC) based on mobile ad hoc networks have drawn increasing research interests in recent years. In this paper, we study throughput in an IVC system along a unidirectional traffic for different traffic conditions and transmissio...
Design of Virtual Learning Community Applied to Further Education for Teachers
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Wei Lu, Chengling Zhao
Issue Date:December 2008
pp. 508-511
In the times of
A Library for Asynchronous Concurrent Service Orchestration
Found in: eScience, IEEE International Conference on
By Wei Lu, Dennis Gannon
Issue Date:December 2008
pp. 230-237
With the emergence of service oriented architecture, service orchestration has been an important paradigm of building large-scale distribute systems. The performance of orchestrating services is critical to the entire system. Meanwhile,with the growing com...
 1  2 Next >>