Search For:

Displaying 1-50 out of 58 total
Bacterial Colony Chemotaxis Algorithm for Guillotine Rectangle Cutting Problem
Found in: Intelligent Systems, WRI Global Congress on
By Peng Wen, Liu Wen-xia
Issue Date:May 2009
pp. 168-172
Bacterial Colony Chemotaxis (BCC), which has good performance of global convergence and better convergence speed, is one of the new heuristic algorithms based on colony intelligence. In this paper, it is applied to the problem of guillotine rectangle cutti...
 
The micropatterns of glutaraldehyde-crosslinked gelatin as ECM for attachment of tumor cells
Found in: International Conference on Nano/Micro Engineered and Molecular Systems
By Yu-Cheng Ou, Chih-Wen Hsu, Lung-Jieh Yang, Hsieh-Cheng Han, Yi-Wen Liu, Chien-Yuan Chen
Issue Date:January 2009
pp. 314-318
Use This work proposes a novel technique to induce the attachment of tumor cells to the micropatterns of glutaraldehyde (GA)-crosslinked gelatin. It provides another method to crosslink gelatin other than using the photo-sensitizing agents or selective GA-...
 
Enhancive Index for Structured Document Retrieval
Found in: Research Issues in Data Engineering, International Workshop on
By Xiao-Ling Wang, Yi-Sheng Dong, Ji-Rong Wen, Liu Wen-Yin
Issue Date:February 2002
pp. 0034
Structured documents, especially the XML documents, are made up of a few logical components, such as title, sections, subsections and paragraphs. The components in each structured document can be represented by an ordered tree model, which can also be view...
 
Niche Genetic Algorithm and Minimum Spanning Tree for Substation Planning
Found in: Intelligent Systems, WRI Global Congress on
By Peng Wen, Liu Wenxia
Issue Date:May 2009
pp. 61-65
This paper presents a method based on Niche Genetic Algorithm (NGA) and Minimum Spanning Tree (MST) for substation planning. The problem of substation planning is divided into two parts: one is the capacity-determining and another is location-determining. ...
 
A Fuzzy-PID Controller Based on Particle Swarm Algorithm
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Xiao-yi Wang, Zai-wen Liu, Yang Jiang, Long-hou Sun
Issue Date:October 2008
pp. 107-110
According to the characteristics of servo control system, a kind of compound fuzzy-PID controller based on Particle Swarm Algorithm (PSO) used for servo control system has been designed in this paper which can realize no-overshoot control under the conditi...
 
A Cubic Spline Method for Solving Singularly-Perturbed Boundary-Value Problems
Found in: Computational Sciences and Optimization, International Joint Conference on
By Li-Bin Liu, Huan-Wen Liu
Issue Date:April 2009
pp. 556-559
In this paper, a new difference scheme by using cubic splines for solving a singularly-perturbed two-point boundary-value problem for second-order ordinary differential equations is derived. The proposed scheme is fourth order accurate, which is better tha...
 
A Difference Scheme Based on Spline Approximations to Solve the Singularly-perturbed Neumann Problems
Found in: Computer Modeling and Simulation, International Conference on
By Huan-Wen Liu, Li-Bin Liu
Issue Date:February 2009
pp. 209-212
In this paper, a difference scheme based on the quartic splines for solving the singularly-perturbed two-point boundary-value problem of second-order ordinary differential equations subject to Neumann-type boundary conditions are derived. The accuracy orde...
 
A Non-polynomial Spline Method for Solving the One-Dimensional Heat Equation
Found in: Information Science and Engieering, International Symposium on
By Huan-Wen Liu, Li-Bin Liu
Issue Date:December 2008
pp. 782-785
In this paper, a numerical method based on non-polynomial spline functions is presented to solve the one-dimensional heat equation. The new method is unconditionally stable. The accuracy order of the new method is of O(k^5+h^4),where k and h denote the mes...
 
Event-Based Knowledge Acquisition for Ontology Learning
Found in: Cognitive Informatics, IEEE International Conference on
By Zhou Wen, Liu Zongtian, Liu Ying, Zhao Yan
Issue Date:August 2007
pp. 498-501
For the bottleneck of ontology learning is the acquisition of relations between concept especially non-taxonomy relations. Event-based knowledge acquisition technologies are proposed and first introduced to ontology learning to overcome this problem. It st...
 
Traffic Congestion and Social Media in China
Found in: IEEE Intelligent Systems
By Ke Zeng,Wenli Liu,Xiao Wang,Songhang Chen
Issue Date:January 2013
pp. 72-77
Research on social media has been applied to various academic fields. During this year's Chinese National Holiday traffic congestion event, online users showed great enthusiasm on social media, such as forums, Weibo, communities, and other platforms. This ...
 
Non-interactive Exponential Homomorphic Encryption Algorithm
Found in: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
By Liang Chen,Zhang Tong,Wen Liu,Chengmin Gao
Issue Date:October 2012
pp. 224-227
Homomorphic encryption can be applied to non-interactive evaluation of encrypted functions. The known homomorphism includes homomorphism of addition, subtraction, multiplication, division, and so on. They are able to encrypt coefficients of polynomial func...
 
The Effects of Innovation Alliance on Network Structure and Association Rules
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Fei Shengnan,Zhou Wen,Liu Zongtian,Zhao Yan,Zhu Ying,Lu Xiaolong
Issue Date:October 2011
pp. 479-482
Social network structure affects the spread and penetration of information, thus to a large extent is advantageous to the promotion of knowledge innovation. This paper analyzes the network structure of the alliance network among Chinese enterprises, and th...
 
Discriminative language modeling for speech recognition with relevance information
Found in: Multimedia and Expo, IEEE International Conference on
By Berlin Chen, Jia-Wen Liu
Issue Date:July 2011
pp. 1-4
Discriminative language modeling (DLM) attempts to improve speech recognition performance by reranking the recognition hypotheses output from a baseline system. Most of the existing DLM methods assume that the reranking task can be treated as a linear disc...
 
A Protocol of Secure Multi-party Multi-data Ranking and Its Application in Privacy Preserving Sequential Pattern Mining
Found in: Computational Sciences and Optimization, International Joint Conference on
By Wen Liu, Shou-shan Luo, Yong-bin Wang, Zhen-tao Jiang
Issue Date:April 2011
pp. 272-275
A secure multi-party multi-data ranking protocol was proposed, which was not related to any specific encryption algorithm. And it was shown that the protocol was correct and secure in the semi-honest model. A privacy-preserving sequential pattern mining so...
 
Separation Mechanism and Design Principles of the Teetered Bed Separator for Cleaning Fine Coal
Found in: Asia-Pacific Power and Energy Engineering Conference
By Youliang Chen, Wenli Liu, Jiayin Yao, Jinming Zhang
Issue Date:March 2011
pp. 1-4
NA
 
High temperature brazing of porous tungsten with nano structured Mo-Ni for a dispenser cathode application
Found in: IEEE International Vacuum Electronics Conference
By Daniel Busbaher, Wen Liu, David Mocher, Dusan P. Sekulic
Issue Date:February 2011
pp. 323-324
This paper offers an insight into a comprehensive study of liquid nano-composite braze filler spreading during bonding of porous tungsten to molybdenum. The considered application involves structural elements of a dispenser cathode. A new formulation of Mo...
 
The Optimal Design of 2500km-10Gbps Optical Communication Dispersion Compensation Systems Based on FBG without Electric Regenerator
Found in: Electrical and Control Engineering, International Conference on
By Wen Liu, Shu-qin Guo, Li-ping Chang, Fu-mei Sun
Issue Date:June 2010
pp. 4439-4442
An optimization scheme of long-haul optical communication systems based on dispersion compensation fiber Bragg grating (FBG) was presented. Employing FBG for the dispersion compensation in modern communication system has certain upgrade issues. According t...
 
Efficiently CCA Secure HIBE Schemes under Double Models with Constant Ciphersize
Found in: Computational Sciences and Optimization, International Joint Conference on
By Zheng-tao Jiang, Yong-bin Wang, Wen Liu, Chen Yang
Issue Date:May 2010
pp. 400-404
Identity-based encryption schemes simplify the problem of the management and maintenance of digital certificates in the PKI environment. If the number of identities is large enough in a KGC (key generation center) domain, a single KGC will be a bottleneck ...
 
An Unconditionally Stable Spline Difference Scheme for Solving the Second 2D Linear Hyperbolic Equation
Found in: Computer Modeling and Simulation, International Conference on
By Yu-Yan Hu, Huan-Wen Liu
Issue Date:January 2010
pp. 375-378
In this paper, an unconditionally stable implicit difference scheme based on quartic spline interpolations in space direction and finite difference discretization in time direction for the numerical solution of two-dimensional linear hyperbolic equation is...
 
A Kind of Difference Method for Solving Linear System of Second-Order Boundary Value Problems
Found in: Computer Modeling and Simulation, International Conference on
By Cong Huang, Huan-Wen Liu
Issue Date:January 2010
pp. 371-374
The linear system of second-order boundary value problems is considered in this paper. By using the compact operator and the Richardson extrapolation, a finite difference scheme with the local truncation errors being fourth-order is constructed. Several nu...
 
Local Lagrange Interpolation by Bivariate Cubic Splines with Boundary Conditions on Nonuniform Type-2 Triangulations
Found in: Computational Sciences and Optimization, International Joint Conference on
By Jinhong Yu, Huan-wen Liu
Issue Date:April 2009
pp. 140-144
In this paper, by using the coloring method, the Bézier-net method and the technique of minimal determining set, a kind of Lagrange interpolation schemes by bivariate C^1cubic splines with boundary conditions on nonuniform type-2triangulations is construct...
 
Dimensions of Bivariate Sextic C^2 Spline Spaces over Generalized Type-II Triangulations
Found in: Computational Sciences and Optimization, International Joint Conference on
By Huan-Wen Liu, Juxia Xiong
Issue Date:April 2009
pp. 145-148
It is well-known that, the algebraic structure of bivariate spline spaces over arbitrary regular triangulations is an extremely complicated problem. Therefore, people turned to study bivariate spline spaces over some special triangulations. In this paper, ...
 
The Dimension of Bivariate Weak Spline Space W^1_2 (I_1 ?)
Found in: Computational Sciences and Optimization, International Joint Conference on
By Wei Wang, Huan-Wen Liu
Issue Date:April 2009
pp. 149-153
No summary available.
 
A Construction of an Error-Correcting Pooling Design
Found in: Computer Science and Information Engineering, World Congress on
By Wen Liu, Yafan Yue
Issue Date:April 2009
pp. 324-326
A non-adaptive group testing(NGT) algorithm is useful in many areas. One of the examples is the problem of DNA library screening. While a mathematical model of NGT algorithm is a $d-$disjunct matrix. In this paper, we construct a $d-$disjunct matrix in a s...
 
A Bivariate C1 Cubic Spline Space on Wang's Refinement
Found in: Computer Engineering and Technology, International Conference on
By Huan-Wen Liu, Wei-Ping Lu
Issue Date:January 2009
pp. 243-246
In this paper, by using the technique of B-net method and the minimal determining set, the dimension of the space of bivariate C1 cubic spline functions on a kind of refined triangulation, called Wang's refinement, is determined, and a set of dual basis wi...
 
Solving the Shortest Path Routing Problem Using Noisy Hopfield Neural Networks
Found in: Communications and Mobile Computing, International Conference on
By Wen Liu, Lipo Wang
Issue Date:January 2009
pp. 299-302
To improve neural network algorithms for the shortest path routing problem (SPRP), we propose a solution using a noisy Hopfield neural network (NHNN), i.e., by adding decaying stochastic noise to the continuous Hopfield neural network (HNN). We also modify...
 
A Bivariate B-spline Finite Element Method for Bending of Rectangular Plates
Found in: Information Science and Engieering, International Symposium on
By Huan-Wen Liu, Dun-Qian Cao, Yong-Xiang Mo
Issue Date:December 2008
pp. 744-748
In this paper, by employing bivariate cubic C^1 B-splines, a bivariate B-spline finite element method is presented to solve bending problems of rectangular plates. In comparison with analytical solutions, it is found that, for various boundary conditions a...
 
Static Web Protection Algorithm based on Chord Ring
Found in: Semantics, Knowledge and Grid, International Conference on
By Ma Yong, Tian Yumin, Liang Wen, Liu Xianming, Fu Pingping
Issue Date:December 2008
pp. 491-492
Web protection algorithm in P2P network is presented to store page duplication utilizing DHT. Compared with C/S, this method is characterized by self-government and dynamic participation and exit of any peer, avoiding the collapse of whole web protection s...
 
Research of AQM Strategy Based on Improved Neuron Adaptive PID
Found in: Computer Science and Information Technology, International Conference on
By Xiao-Wen Liu,Jing-Jun Hu,Song Wang,Hong Li,Hai-Deng Zhao
Issue Date:September 2008
pp. 147-151
In this paper, we use a previously developed nonlinear dynamic model of TCP to design Active Queue Management (AQM) controllers based on Improved Neuron Adaptive PID for network congestion control. We introduce new type of Neural Networks controller based ...
 
Delay-Constrained Multicast Routing Using the Noisy Chaotic Neural Networks
Found in: IEEE Transactions on Computers
By Lipo Wang, Wen Liu, Haixiang Shi
Issue Date:January 2009
pp. 82-89
We present a method to compute the delay constrained multicast routing tree by employing chaotic neural networks. Experimental result shows that the noisy chaotic neural network (NCNN) provides optimal solution more often compared to the transiently chaoti...
 
Automation of Look-Up Tables for System Integrity Protection Systems in Taiwan Power System
Found in: Secure System Integration and Reliability Improvement
By Shih-En Chien, I-Ta Cherng, Chih-Wen Liu
Issue Date:July 2008
pp. 228-229
Taiwan Power Company (TPC) has implemented an event-based system integrity protection system (SIPS) to increase power system reliability against extreme contingencies. The decision making mechanism of the event-based SIPS is based on look-up tables. In thi...
 
A thermodynamic metric for process quality assessment in manufacturing: Pb vs. Pb-free solders spreading case study
Found in: Electronics and the Environment, International Symposium on
By Dusan P. Sekulic, Hui Zhao, Wen Liu
Issue Date:May 2008
pp. 1-6
Sustainability issues involving materials processing and manufacturing are still very poorly investigated. This is true in particular for non-energy parts of such systems. Thermodynamics approaches attract an increasing attention due to general applicabili...
 
Minimizing Interference in Satellite Communications Using Chaotic Neural Networks
Found in: International Conference on Natural Computation
By Wen Liu, Haixiang Shi, Lipo Wang
Issue Date:August 2007
pp. 441-444
We solve the frequency assignment problem (FAP) in satellite communications with transiently chaotic neural networks (TCNN). The objective of this optimization problem is to minimize cochannel interference between two satellite systems by rearranging the f...
 
A Study of Secure Multi-party Ranking Problem
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Wen Liu, Shou-Shan Luo, Ping Chen
Issue Date:August 2007
pp. 727-732
In this paper, we study a secure multi-party ranking problem: there are n parties, P_1, P_2, ., P_n. Each party P_i has a secret input m_i \in {1, 2, .,N}. He wants to get the order of mi in the ascending ranking sequence of the n parties' inputs, while no...
 
Sub-Microfabrication of Protein Micropatterns for Cell Biology Applications
Found in: MEMS, NANO, and Smart Systems, International Conference on
By Yi-Chung Lo, Yuan-Hsun Wu, Chia-Sheng Huang, Hong-Wen Liu, Chi-Hung Lin, Jengping Lin, Wensyang Hsu, Chaoen Wang
Issue Date:August 2004
pp. 226-232
We successfully demonstrated the realization of fabricating protein sub-micro patterns for cell biology applications. To successfully generate the protein sub-micro patterns, some new designed procedures were involved into the DUV photolithography with mic...
 
Robust chirp parameter estimation for Hann windowed signals
Found in: Multimedia and Expo, IEEE International Conference on
By A.S. Master, Yi-Wen Liu
Issue Date:July 2003
pp. 717-720
The sinusoidal model has been a fundamentally important signal representation for coding and analysis of audio. We present an enhancement to sinusoidal modeling in the form of a linear frequency chirp parameter estimator applicable to Hann-windowed quasi-s...
 
The autocorrelation matching method for distributed MIMO communications over unknown FIR channels
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Hui Luo, Ruey-Wen Liu, Xieting Lin, Xin Li
Issue Date:May 2001
pp. 2161-2164
The autocorrelation matching method is a blind signal separation and channel equalization technique for distributed MIMO communication systems over unknown FIR channels using only second order statistics. This method is based on a theoretical discovery, ie...
 
Exploring Texture Ensembles by Efficient Markov Chain Monte Carlo-Toward a 'Trichromacy' Theory of Texture
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Song Chun Zhu, Xiu Wen Liu, Ying Nian Wu
Issue Date:June 2000
pp. 554-569
<p><b>Abstract</b>—This article presents a mathematical definition of texture—the <it>Julesz ensemble</it><tmath>$\Omega({\bf{h}})$</tmath>, which is the set of all images (defined on <tmath>${\rm{Z}}^2$</...
 
Critera for direct blind deconvolution of MIMO FIR systems driven by white source signals
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Y. Inouye, Ruey-Wen Liu
Issue Date:March 1999
pp. 2889-2892
This paper addresses the blind deconvolution of multi-input-multi-output (MIMO) FIR systems driven by white non-Gaussian source signals. First, we present a weaker condition on source signals than the so-called i.i.d. condition so that blind deconvolution ...
 
Blind equalizers for multipath channels with best equalization delay
Found in: Acoustics, Speech, and Signal Processing, IEEE International Conference on
By Hui Luo, Ruey-Wen Liu
Issue Date:March 1999
pp. 2511-2514
Previous studies show that equalizers with different equalization delays achieve different performances. The best performed equalizer is not necessarily the one with 0-delay, and often not the case when the channel is non-minimum-phase. In this paper, a bl...
 
Distributed Computing: New Power for Scientific Visualization
Found in: IEEE Computer Graphics and Applications
By Pei-Wen Liu, Lih-Shyang Chen, Su-Chou Chen, Jong-Ping Chen, Fang-Yi Lin, Shy-Shang Hwang
Issue Date:May 1996
pp. 42-51
Interactive scientific visualization and distributed computing are emerging as increasingly important research areas. In the computer graphics community, most attention has bee focused on rendering algorithms. The distributed software architecture of a gra...
 
Collaboration Pattern and Topic Analysis on Intelligence and Security Informatics Research
Found in: IEEE Intelligent Systems
By Wenli Liu,Xiaolong Zheng,Tao Wang,Hui Wang
Issue Date:May 2014
pp. 39-46
In this article, researcher collaboration patterns and research topics on Intelligence and Security Informatics (ISI) are investigated using social network analysis approaches. The collaboration networks exhibit scale-free property and small-world effect. ...
 
UBM-based incremental speaker adaptation
Found in: Multimedia and Expo, IEEE International Conference on
By Yi-Wen Liu, Lie Lu, Ke Chen, Hong-Jiang Zhang
Issue Date:July 2003
pp. 721-724
This paper addresses a novel algorithm of incremental speaker adaptation (ISA) based on universal background model (UBM) for saving storage and real-time processing. This algorithm can be seen as an extension of traditional speaker adaptation. It consists ...
 
Modelling Dynamic Distributed System Structures in PARSE
Found in: Parallel, Distributed, and Network-Based Processing, Euromicro Conference on
By Anna Yun-Wen Liu
Issue Date:January 1996
pp. 0352
With the increasing availability of parallel and networked computers, applications based on distributed systems are gradually becoming commonplace. It is therefore important for software professionals to practice sound parallel software engineering methods...
 
A search-based Chinese word segmentation method
Found in: Proceedings of the 16th international conference on World Wide Web (WWW '07)
By Wen Liu, Xin-Jing Wang, Yong Qin
Issue Date:May 2007
pp. 1129-1130
In this paper, we propose a novel Chinese word segmentation method which leverages the huge deposit of Web documents and search technology. It simultaneously solves ambiguous phrase boundary resolution and unknown word identification problems. Evaluations ...
     
Improved Analysis of Energy Hole for Wireless Sensor Networks
Found in: Communications and Mobile Computing, International Conference on
By Zeng Zhi-wen, Liu An-Feng, Chen Zhi-gang, Wu Xian-you, Long Jun
Issue Date:January 2009
pp. 533-537
Through analysis of energy consumption of wireless sensor networks with uniform node distribution, this paper finds that energy hole in the wireless sensor networks with uniform node distribution can not be avoided. When network lifetime ends, as much as 9...
 
Numerical Research on LNG Tank Leakage Effect on Environment for LNG Bus
Found in: Asia-Pacific Power and Energy Engineering Conference
By Lei Zhang, Ying Gao, Da-wen Liu, Peng Liu
Issue Date:March 2011
pp. 1-4
NA
 
Distributed Reactive Power Optimization Computing in Multi-area Power Systems Using Ward Equivalent
Found in: Electrical and Control Engineering, International Conference on
By Zhi-wen Liu, Ming-bo Liu
Issue Date:June 2010
pp. 3659-3663
This paper presents a new decomposition and coordination algorithm based on Ward equivalent to solve distributed reactive-power optimization problem in multi-area power system. At first, multi-area interconnected power system is partitioned into master and...
 
A RP(k)-Based Educational Resource Grid and Resource Awareness Model
Found in: Computer Science and Computational Technology, International Symposium on
By Nai wen Liu, Fang ai Liu
Issue Date:December 2008
pp. 25-30
Grid and peer-to-peer technology are widely applied to file sharing system. P2P overlay network topology and search algorithm have always got much attention of researchers. A mismatch between overlay and the Internet infrastructure has critical performance...
 
Search and Replication in a Hybrid Topology Architecture Based on RP(k)
Found in: Computer Science and Software Engineering, International Conference on
By Nai wen Liu, Fang ai Liu
Issue Date:December 2008
pp. 925-928
RP(k) is a steady interconnection networks topology. It has a lot of advantages, such as smaller diameter, high efficient routing and good scalability. In this paper, we propose RP(k)C-Grid—a novel file sharing system. RP(k)C-Grid, a hybrid topology overla...
 
 1  2 Next >>