Search For:

Displaying 1-50 out of 117 total
U-Garden: An interactive control system for multimodal presentation in museum
Found in: Multimedia and Expo, IEEE International Conference on
By Fu-Song Hsu, Wei-Yang Lin, Geeng-Neng You, Tzu-Wei Tsai, Hsiu-Mei Huang
Issue Date:July 2010
pp. 1016-1021
In this rapid development of advanced computer technology era, the trend for interaction with the input devices has shifted toward the incorporation of intelligent technology gradually. To facilitate the intuitive paradigm for human to use digital equipmen...
Self-crosslinked Fluorinated Acrylic Copolymer with Improved Stability
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Yi-chi Chen,Wei Yang,Jian-gang Qian,Wei Yang,Dong-xiao Han,Xiao-qun Wang,Li-qun Zhu
Issue Date:May 2012
pp. 503-506
Researchers for fluorinated acrylic copolymer latexes have long been puzzled by the relatively poor stability which due to the tremendous polarity difference between the fluorine-containing and the fluorine-free acrylic monomers. A self-cross linked fluori...
Eye Gaze Tracking Based on Pattern Voting Scheme for Mobile Device
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Chiao-Wen Kao,Che-Wei Yang,Yu-Wei Chen,Kuo-Chin Fan,Bor-Jiunn Hwang,Chin-Pan Huang
Issue Date:October 2011
pp. 337-340
In this paper, we proposed a novel and simple gaze calibration procedure, namely Pattern Voting Scheme (PVS), for reducing the computing complex. The proposed method doesn't require multiple spatial coordinates to estimate the inner and outer parameters of...
A Novel Regularized Locality Preserving Projections for Face Recognition
Found in: Information and Computing Science, International Conference on
By Wen-Sheng Chen, Wei Wang, Jian-Wei Yang
Issue Date:April 2011
pp. 110-113
Dimensionality reduction technologies are very important for pattern representation and recognition. Among them, locality preserving projection (LPP) is a manifold dimensionality reduction scheme and has been successfully applied to face recognition. Howev...
A Location-based Mobile Advertisement Publishing System for Vendors
Found in: Information Technology: New Generations, Third International Conference on
By Chyi-Ren Dow, Yu-Hong Lee, Jeremy Liao, Hao-Wei Yang, Wei-Luen Koo
Issue Date:April 2011
pp. 24-29
XAdvertisements or vouchers are commonly used today to attract the attention and the purchase of consumers by providing discount or detailed description to customers. Typically, vendors use text to describe characteristic introductions and images to expres...
Research on the Epidemic Model in P2P File-Sharing System
Found in: Hybrid Intelligent Systems, International Conference on
By Wei Yang, Wei Ying, Gui-ran Chang, Zhuo-qun Zhang
Issue Date:August 2009
pp. 386-390
In this paper an MRESDL dynamic model is proposed for analyzing file diffusion in a node-to-node (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each node not only shares the downloaded parts of the file, but also d...
The Research of System of Systems Requirement Modeling and Toolkits
Found in: Computer Modeling and Simulation, International Conference on
By Ke-wei Yang, Qing-song Zhao, Yan-jing Lu, Wei Huang
Issue Date:March 2009
pp. 107-110
SoSs (System of Systems) is an unpredictable entity for the users who wish to control and utilize it before it has been constructed. How to distill the concept which is buried in people’s brain about the SoSs is a difficult and critical work in the SoSs Re...
Research on Dynamic Model of File Diffusion in P2P File-Sharing Networks
Found in: Business and Information Management, International Seminar on
By Wei Yang, Gui-ran Chang, Wei Ying, Zhi-liang Zhu
Issue Date:December 2008
pp. 44-47
In this paper we propose an IEDL dynamic model for analyzing file diffusion in a peer-to-peer (P2P) file-sharing network. According to the principle of the P2P file diffusion system, each peer not only shares the downloaded parts of the file, but also down...
Fault Diagnosis of Main Engine Shafting System Based oN V-SVM
Found in: Information Science and Engieering, International Symposium on
By Zhan Yulong, Huo Chongfu, Wei Wei, Yang Zhiyuan
Issue Date:December 2008
pp. 673-677
In recent years, many new technologies have been developed for fault diagnosis of marine main engine, including intelligent fault diagnosis. This paper focuses on the application of Support Vector Machine (SVM) on fault diagnosis of marine main engine mech...
Dynamic Load Balancing for Multiple Processors
Found in: Real-Time Computing Systems and Applications, International Workshop on
By Chin-Fu Kuo, Tung-Wei Yang, Tei-Wei Kuo
Issue Date:August 2006
pp. 395-401
This research is motivated by the needs of dwell scheduling over multiple transmitters/receivers in many real radar systems. We propose a linear-programmingbased approach with efficient implementations to minimize the number of radar tasks being dropped fr...
On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading Channel
Found in: International Conference on Networking
By Wei Yang, Yang Wei
Issue Date:April 2007
pp. 6
In this paper, an asynchronous multiple-input multiple-output multitone code division multiple access (MIMO MT-CDMA) scheme for the uplink of the mobile communication in a frequency selective fading channel is analyzed. Maximum ratio combining (MRC) and li...
Study on Three-Dimensional Data Fitting Method
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Wei Yang,Tieli Sun,Zhiming Liu,Kun Hou,Duoxian Li,Fanhua Yu
Issue Date:October 2011
pp. 21-24
We can get three cubic spline function based on regular volume data by extending spline interpolation function from two-dimensional space to three-dimensional space. If we solve the three cubic spline function directly, Ill-posed solution may be generated ...
Reversible Data Hiding for Color BMP Image Based on Block Difference Histogram
Found in: International Conference on Ubi-Media Computing
By Hsien-Wei Yang, Kuo Feng Hwang
Issue Date:July 2011
pp. 257-260
This work proposes a reversible data hiding algorithm for color BMP image that is based on the block difference histogram. The method divides the color BMP image into non-overlapping 3 by 3 pixels blocks. In each block, the specified pixel is selected to c...
Trajectory-based sign language recognition using Discriminant Analysis in higher-dimensional feature space
Found in: Multimedia and Expo, IEEE International Conference on
By Wun-Guang Liou, Chung-Yang Hsieh, Wei-Yang Lin
Issue Date:July 2011
pp. 1-4
This paper presents a method for recognizing sign language using hand movement trajectory. By applying Kernel Principal Component Analysis (KPCA), the motion trajectory data are firstly mapped into a higher-dimensional feature space for analysis. The advan...
Applying Interactive Artificial Bee Colony to Construct the Stock Portfolio
Found in: 2013 Second International Conference on Robot, Vision and Signal Processing (RVSP)
By Jui-Fang Chang,Tsai-Wei Yang,Pei-Wei Tsai
Issue Date:December 2013
pp. 129-132
In recent years, lots of portfolio analysis methods been proposed one after another. The investors care about how much money they can earn, and the companies need to know how much performance they gain. In this paper, a new stock portfolio construction str...
Recognition of Coronary Heart Disease Patients by RBF Neural Network Basing on Contents of Microelements in Human Blood
Found in: Computational Intelligence and Design, International Symposium on
By Wei You, Yang Wang, Baoan Wo, Shuiqing Lv, Aili Zhan, Wenjing Sun
Issue Date:December 2009
pp. 409-412
Radial-Basis-Function (RBF) artificial neural network was developed to recognize the coronary heart disease patients basing on the contents of microelements in human blood. Leave-one out method was used to train the model. After training, the RBF model was...
Linguistic Steganography Detection Algorithm Using Statistical Language Model
Found in: Information Technology and Computer Science, International Conference on
By Peng Meng, Liusheng Hang, Wei Yang, Zhili Chen, Hu Zheng
Issue Date:July 2009
pp. 540-543
Steganography is a technique for embedding secret messages into carriers. Linguistic steganography is a branch of text steganography. Research on attacking methods against linguistic steganography plays an important role in Information Security (IS) area. ...
An MAODV-Based Energy Saving Multicast Routing Algorithm
Found in: Network and Parallel Computing Workshops, IFIP International Conference on
By Guo-feng Zhao, Wei Yang, Hong Tang, Yan-bing Liu
Issue Date:October 2008
pp. 247-250
The wireless Ad Hoc networks (WANET) is an open system that is constituted by fix or mobile nodes. In WANET, each node can be a router or a host. Considering that most nodes may use battery as its energy, it is necessary to improve on energy-saving method....
Effects of Remedial Measures Implemented after Waterlogging on Cotton
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Zhen-Hui Jiang,Jian-Qiang Zhua,Wei Yang,Ming-Feng Lia,Yang Yua
Issue Date:January 2013
pp. 692-695
In south China, water logging occurs frequently in spring and summer which generally affect crops' normal growth and final output, so it is important for agricultural production to effectively prevent water logging damage. A test-pit experiment was made in...
Research on License Plate Detection Based on Salient Feature under Complex Background
Found in: Image and Graphics, International Conference on
By Qun-Wei Yang,Chen-Hui Yang,Cui-Hua Li,Han-Zi Wang
Issue Date:August 2011
pp. 609-615
For plate detection, we found that when the plate is disturbed by complex upright borderlines, location can be inaccurate or even missed. On the basis of this, a new vehicle license plate location algorithm based on salient feature is introduced. It makes ...
Action recognition by learning locally adaptive classifiers
Found in: Multimedia and Expo, IEEE International Conference on
By Jia-Jie Tsai, Chung-Yang Hsieh, Wei-Yang Lin
Issue Date:July 2011
pp. 1-6
In this paper, we propose a novel framework for video-based human action recognition, which can effectively resolve the difficulty caused by large variations within each action category. We first use the cloud of interest points to represent human action, ...
Route Selection Model in Emergency Evacuation Based on Quasi-user Optimum Dynamic Traffic Assignment
Found in: Intelligent Computation Technology and Automation, International Conference on
By Zhaosheng Yang, Manrong Yuan, Wei Yang
Issue Date:May 2010
pp. 240-243
The road network emergency evacuation means evacuating the traffic flow which is trapped to safer areas as immediately as possible, in order to bring the least impact and destruction by emergent catastrophe events. As the critical issue in emergency evacua...
Research on Estimation of Dynamic Link Impedance Based on Information Fusion
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xueying Gao, Zhaosheng Yang, Wei Yang
Issue Date:May 2010
pp. 1158-1162
Dynamic link impedance is an important base for dynamic traffic assignment problem. Link travel time is the main constituent of link impedance and is often directly used as link impedance. Considering the disadvantages of traditional estimation methods bas...
Spatial Encoding Scheme for Protein Supporting Structure Discovery
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Yu-Feng Huang, Chia-Jui Yang, Yi-Wei Yang, Chien-Kang Huang
Issue Date:June 2009
pp. 153-160
Protein function is highly correlated with its three dimensional conformation in order to interact with others proteins, ligands, substrates, inhibitors, etc. Studies on binding site and protein function have been investigated to understand the mechanism o...
Quantum User Authentication with Nonentanglement-Based QKD Protocol
Found in: Convergence Information Technology, International Conference on
By Kan Yang,Liusheng Huang,Wei Yang
Issue Date:November 2007
pp. 1969-1973
In this paper, we propose a secure user authentication protocol with nonentanglement -based QKD on jammable public channels between two parties, Alice and Bob. First, via an arbitrator (Trent), the protocol provides both quantum authentication and quantum ...
The Validation Method of Simulation Model Based on K-Means Clustering and Fisher Discriminant Analysis
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Jiao Song,Li Wei,Yang Ming
Issue Date:September 2013
pp. 313-316
Usually, many simulation models of a system are provided. The most credible model should be selected. When the system only has a single output, some classic validation methods can solve the problem. But they become powerless when the system has multiple ou...
Rules mining in hierarchical rough sets
Found in: 2012 IEEE International Conference on Granular Computing (GrC-2012)
By Wei Yang,Duoqian Miao,Qinrong Feng
Issue Date:August 2012
pp. 605-608
A novel algorithm is proposed in this paper, which can process the higher level of conditional attribute and the decision attribute at the same time. When building the higher level decision table for simplifying the decision table based on concept hierarch...
Application of Precise Integration Algorithm in One-Dimensional Photonic Crystal Containing Left-Handed Materials
Found in: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS)
By Zhen-feng Mu,Hong-wei Yang
Issue Date:August 2012
pp. 164-167
Transmission property of one-dimensional photonic crystal containing left-handed materials is simulated by using precise integration algorithm. Simulation results are also analyzed. Photonic crystal is divided into different sections. The export stiffness ...
Learning contour-fragment-based shape model with And-Or tree representation
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Liang Lin, Xiaolong Wang, Wei Yang, Jianhuang Lai
Issue Date:June 2012
pp. 135-142
This paper proposes a simple yet effective method to learn the hierarchical object shape model consisting of local contour fragments, which represents a category of shapes in the form of an And-Or tree. This model extends the traditional hierarchical tree ...
Tracking and Connecting Topics via Incremental Hierarchical Dirichlet Processes
Found in: Data Mining, IEEE International Conference on
By Zekai J. Gao,Yangqiu Song,Shixia Liu,Haixun Wang,Hao Wei,Yang Chen,Weiwei Cui
Issue Date:December 2011
pp. 1056-1061
Much research has been devoted to topic detection from text, but one major challenge has not been addressed: revealing the rich relationships that exist among the detected topics. Finding such relationships is important since many applications are interest...
Financial Evaluation of Real Estate Corporate Social Responsibility
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Sun Wei,Yang Shuai,Xie Min
Issue Date:November 2011
pp. 437-440
As one of the economic supporting industries, Chinese economy has been greatly booming, - real estate has been paid more attention by society, and also become an important research object. Real estate has close connection with many other industries in Chin...
A Semi-supervised Method for Feature Selection
Found in: Computational and Information Sciences, International Conference on
By Wei Yang,Chenping Hou,Yi Wu
Issue Date:October 2011
pp. 329-332
Feature selection has been widely studied in the literature in both supervised and unsupervised scenario for dimensionality reduction. Supervised methods may cost too much on labeling, while unsupervised ones may lose efficacy because of lack of labels. In...
Human Action Recognition Using Histogram of Oriented Gradient of Motion History Image
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Chin-Pan Huang,Chaur-Heh Hsieh,Kuan-Ting Lai,Wei-Yang Huang
Issue Date:October 2011
pp. 353-356
This paper presents a human action recognition method using histogram of oriented gradient (HOG) of motion history image (MHI). First, the proposed method generates MHI with differential images which are obtained by frame difference of successive frames of...
Parameters optimization for cooperative sensing in multi-channel cognitive radio networks
Found in: Software Maintenance and Reengineering, European Conference on
By Wei Yang, Huanzhong Li, Dongsong Ban, Wenhua Dou
Issue Date:August 2011
pp. 210-215
In this paper, we propose an optimization model under the scenario where multi-channels are cooperatively sensed and used by multi-secondary users (SUs). The model aims to maximize the system throughput and optimize the parameters including the sensing tim...
A Perceptual Rate-Distortion Based Quantization Level Adjustment Algorithm
Found in: Multimedia and Signal Processing, International Conference on
By Jiang Wei, Yang Junjie
Issue Date:May 2011
pp. 175-179
It is desired to obtain the best possible image quality subject a predefined bit rate in video coding. Aiming on improving quantization performance for signals in non-flat region, the fast rate-distortion based quantization level adjustment algorithm (FRDQ...
Pothook of Urban and Rural Construction Land Rationality Assessment: A Case of Hailong Village
Found in: Asia-Pacific Power and Energy Engineering Conference
By Lin Zhu, Wei Yang
Issue Date:March 2011
pp. 1-4
Research on the Effects and Evaluation Method of Transmission Line Tower Grounding Collection Caused by DC Current
Found in: Asia-Pacific Power and Energy Engineering Conference
By Chi Wu, Wei Yang, Ke Zhu, Xiao-hui Dong, Bo Liu, Xi-shan Wen, Lei Lan
Issue Date:March 2011
pp. 1-5
The Simulation Research on Fuzzy PID Control Strategy of Commercial Vehicle EPS System
Found in: Intelligent Systems, WRI Global Congress on
By Wei Yang, Hui Liu, Shuo Zhang, Jingyu Liu
Issue Date:December 2010
pp. 237-240
According to the characteristic of commercial vehicle EPS system, this paper proposes application of the fuzzy PID control strategy to EPS system. This strategy adjusts PID parameters online according to the various operating conditions, and its advantages...
A Fast HITON_PC Algorithm
Found in: Computational Intelligence and Security, International Conference on
By Wei Yang
Issue Date:December 2010
pp. 47-50
The HITON_PC algorithm which is a state-of-the-art local causal discovery algorithm can deal with a dataset with a very small sample-to-variable ratio efficiently. But it cannot perform inefficiently on a dataset with a very large sample. To address this p...
Strategy Optimization of Laser Weapon Intercept Multi-Target Based on an Improved Genetic Algorithm
Found in: Genetic and Evolutionary Computing, International Conference on
By Mao-Rui Zhang, Da-Wei Yang, Yong Sun, Jian-Fei Li
Issue Date:December 2010
pp. 333-336
In order to solve the strategy optimization of Laser weapon intercept multiple in flight targets problem, a reasonable model is constructed and an improved Genetic Algorithm(GA) is proposed. It introduces both global search strategy and local search strate...
A P2P-Based Worm in Next Gernation Network
Found in: Genetic and Evolutionary Computing, International Conference on
By Wei Yang, Xiao-meng Shen, Gui-ran Chang, Yu Yao
Issue Date:December 2010
pp. 418-421
In recent years, many IPv6 networks have been deployed, and the security issues of which arouse more and more public concern. It is commonly believed that IPv6 provides greater security against random-scanning worms by virtue of a very large address space....
Data Acquisition System Based on the Mixed Programming of SQL Language and MATLAB
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Xiaojing Wang, Yahui Wang, Weichao Ma, Wei Yang, Zhijian Jiang
Issue Date:October 2010
pp. 474-477
The design software used in the Matlab interface as the application development platform, and with a SQL Server database as the background data storage tool, in order to achieve efficient human-computer interaction function. From the results of view, the e...
Research and Implementation of Watershed Segmentation Algorithm Based on CCD Infrared Images
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Qiao Sun, Wei Yang, Lina Yu
Issue Date:September 2010
pp. 648-651
In the image, the automatic segmentation of regions that we are interested in is the important issue in image pattern recognition. The concept of watershed in mathematical morphology is applied to the CCD infrared images to achieve a kind of algorithm on a...
Research on CCD Infrared Image Method
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Ye Zhang, Wei Yang, Wendong Zhang, Zhengyan Wang, Xingling Shao, Qiang Yin
Issue Date:September 2010
pp. 696-699
infrared image pattern recognition system consists of image enhancement, segmentation and pattern classification. Image segmentation is realized through Threshold Segmentation. Generally speaking, there are several methods of threshold segmentation such as...
Methodology for Attitudes Precisely Testing of Rolling Projectiles
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Jun Liu, Jie Li, Wei Yang, Xiao-min Duan
Issue Date:September 2010
pp. 644-647
In order to precisely test attitudes of rolling projectiles by using inertial measurement system, a novel method of half-strap down inertial measurement is proposed in this paper. Its key thought is to make inertial measurement system not rotate with rolli...
Model Computing and Merging Algorithm for Anonymous Router in Network Topology
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Zhang Yong, Guo Shize, Niu Wei, Yang Yun
Issue Date:September 2010
pp. 247-250
Anonymous Router (AR) is a key issue of Network Topology. Aiming at the deficiency of previous research, this paper proposes an AR network model based on DM model and quantitatively analyzes the influence on the result of probing by computing network size,...
Generalized Relation Based Knowledge Discovery in Interval-valued Information Systems
Found in: Granular Computing, IEEE International Conference on
By Duoqian Miao, Wei Yang, Nan Zhang
Issue Date:August 2010
pp. 743-748
A novel generalized relation is proposed in this paper to discover the knowledge of an interval-valued information system more objective based on the concept of interaction rates, which are the length of the intersection between two objects divided by the ...
An integral-based curvature estimator and its application in face recognition
Found in: Multimedia and Expo, IEEE International Conference on
By Wei-Yang Lin, Yen-Lin Chiu, Kerry R. Widder, Yu Hen Hu, Nigel Boston
Issue Date:July 2010
pp. 185-190
This paper addresses an old, yet challenging issue — curvature estimation from discrete sampling points over a curve. We introduce a novel algorithm based on performing line integrals. The proposed method is computationally more efficient than the previous...
Relation of PPAtMP and scalar product protocol and their applications
Found in: Computers and Communications, IEEE Symposium on
By Youwen Zhu, Liusheng Huang, Wei Yang
Issue Date:June 2010
pp. 184-189
Scalar product protocol and privacy preserving add to multiply protocol (PPAtMP) are two significant basic secure multiparty computation protocols. In this paper, we claim that the two protocols are equivalent to each other and we can achieve one based on ...
The Solution of Printing on University Human Management System
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Wei Yang, Chen Guo, Xuan Ge Peng
Issue Date:April 2010
pp. 435-437
Three solutions to the common problem of print in the MIS of B/S mode are put forward: use the page printing function of IE to print reports; use control such as Crystal Report to print reports and certificates; use XML to print reports in B/S mode. These ...
 1  2 Next >>