Search For:

Displaying 1-31 out of 31 total
Brand Image Detection in Broadcast Video Streams
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Xian Wang,Jinqiao Wang
Issue Date:July 2013
pp. 852-856
Ads exist everywhere and all the time of our daily lives. Semantic analysis of ad videos is a challenge task for its creative design and dynamic content. In this paper, we put forward a novel semantic concept - brand image shared by most ad videos, which h...
 
Design of Traceability System for Pork Safety Production Based on RFID
Found in: Intelligent Computation Technology and Automation, International Conference on
By Zhao De-an, Teng Cui-feng, Wang Xian-wang
Issue Date:October 2009
pp. 562-565
With the development of society and the improvement of living standards, consumers’ demand for high quality meat products is constantly increasing.Traceability for livestock products is widely recognized to be an effective measure for any modern and integr...
 
Diagonal-Flip Distance Algorithms of Three Type Triangulations
Found in: Computer Science and Software Engineering, International Conference on
By Deqiang Wang, Xian Wang, Shaoxi Li, Shaofang Zhang
Issue Date:December 2008
pp. 980-983
In this paper we study the diagonal flipping problem in three special type triangulations of $n$ ($n>7$) vertex convex polygons (and rotations in three type binary trees). By labeling vertices of the triangulations, we propose six linear time algorithms...
 
Nearest Neighbor Algorithm for Prediction of Protein Domain Structural Class
Found in: High Performance Computing and Grid in Asia Pacific Region, International Conference on
By Zhen-Hui Zhang, Zheng-Hua Wang, Yong-Xian Wang
Issue Date:December 2005
pp. 617-620
The Nearest Neighbor Algorithm (NNA) was proposed to predict the structural class of a protein domain according to its amino acid composition. Results obtained through Resubstitution test, Jackknife test and independent dataset test are quite high. Accordi...
 
Software Design Improvement through Anti-Patterns Identification
Found in: Software Maintenance, IEEE International Conference on
By Tie Feng, Jiachen Zhang, Hongyuan Wang, Xian Wang
Issue Date:September 2004
pp. 524
In this paper, a software design improvement approach through anti-pattern identification by case based reasoning is proposed to improve software quality and maintainability. First of all, XML based design template at micro-architecture level is presented ...
   
Analog Sensor Based Testing of Phase-Locked Loop Dynamic Performance Parameters
Found in: 2013 22nd Asian Test Symposium (ATS)
By Sen-Wen Hsiao,Xian Wang,Abhijit Chatterjee
Issue Date:November 2013
pp. 50-55
Phase-locked loops are used to synthesize frequency sources for RF conversion and IO clocks for data synchronization, and serve as core building blocks for communication systems. Consequently, testing of PLL loop performance is critical for guaranteeing th...
 
Built-In Test of Switched-Mode Power Converters: Avoiding DUT Damage Using Alternative Safe Measurements
Found in: 2013 22nd Asian Test Symposium (ATS)
By Xian Wang,Blanchard Kenfack,Estella Silva,Abhijit Chatterjee
Issue Date:November 2013
pp. 56-61
This paper proposes a novel test method for the line and load regulation specifications of switched mode power converters (SMPCs) using alternative safe measurements. These specifications are not tested for many power converters because they cause voltage ...
 
Higher than Nyquist test waveform synthesis and digital phase noise injection using time-interleaved mixed-mode data converters
Found in: 2012 IEEE International Test Conference (ITC)
By Xian Wang,Hyun Woo Choi,Thomas Moon,Nicholas Tzou,Abhijit Chatterjee
Issue Date:November 2012
pp. 1-10
In this paper, a higher than Nyquist RF test waveform synthesizer with digital phase noise injection is proposed. The proposed system uses time-interleaved digital-to-analog converters (DACs) and associated digital signal processing algorithms to enhance t...
 
Copyright Protection for E-Government Document Images
Found in: IEEE MultiMedia
By Didi Rosiyadi,Shi-Jinn Horng,Pingzhi Fan,Xian Wang,Muhammad Khurram Khan,Yi Pan
Issue Date:July 2012
pp. 62-73
The proposed copyright protection scheme combines the discrete cosine transform (DCT) and singular value decomposition (SVD) using a control parameter to avoid the false-positive problem.
 
An Efficient Run Time Control Flow Errors Detection by DCT Technique
Found in: Biometrics and Security Technologies, International Symposium on
By Hung-Chuan Lai,Shi-Jinn Horng,Pingzhi Fan,Xian Wang,Yi Pan
Issue Date:March 2012
pp. 134-150
DCT is usually used in image processing but in this paper we use it to detect the run time control errors. In this paper, using the branch instruction, a program is first divided into several data computing blocks (DCBs), each DCB can then be recognized as...
 
Call dropping performance analysis of the eNB-first channel access policy in LTE-Advanced relay networks
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Xian Wang, Shi-Jinn Horng, Ray-Guang Cheng, Pingzhi Fan
Issue Date:October 2011
pp. 43-50
Relay is one of the key technologies used by both the Third Generation Partnership Project (3GPP) Long Term Evolution-Advanced (LTE-Advanced) and IEEE 802.16m to ameliorate cell edge throughput. Despite the throughput enhancement achieved by deploying rela...
 
Risk Modeling in Strategic Behavior and Equilibrium of Electricity Markets with Wind Power
Found in: Asia-Pacific Power and Energy Engineering Conference
By Xiaoning Kang, Xian Wang, Shaohua Zhang
Issue Date:March 2011
pp. 1-5
NA
 
On Dynamic Weighting of Data in Clustering with K-Alpha Means
Found in: Pattern Recognition, International Conference on
By Si-Bao Chen, Hai-Xian Wang, Bin Luo
Issue Date:August 2010
pp. 774-777
Although many methods of refining initialization have appeared, the sensitivity of K-Means to initial centers is still an obstacle in applications. In this paper, we investigate a new class of clustering algorithm, K-Alpha Means (KAM), which is insensitive...
 
A Method of Measurement and Control about Automatically Tracing Intelligent Vehicle Based on Infrared Photoelectric Sensor
Found in: Intelligent Computation Technology and Automation, International Conference on
By Liu Feng Xian, Wang Ling, Sun Bo
Issue Date:May 2010
pp. 164-167
The design is automatic tracing intelligent vehicle control system. In the design, simplifies external locus analysis of the kinetic model as a built-in model, In order to ensure the model perturbation or random interference when uncertainty functions to m...
 
Sandbox System Based on Role and Virtualization
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Zhen Li, Jun-Feng Tian, Feng-Xian Wang
Issue Date:May 2009
pp. 342-346
We present a sandbox system based on role and virtualization applied to intrusion detection, which overcomes some drawbacks of traditional sandbox system: heavy workload of administrating user’s access control information, imprecision of access control, se...
 
A More Realistic Thinning Scheme for Call Admission Control in Multimedia Wireless Networks
Found in: IEEE Transactions on Computers
By Xian Wang, Pingzhi Fan, Yi Pan
Issue Date:August 2008
pp. 1143-1147
In [7], Fang proposed a call admission control scheme called thinning scheme. For tractability, Fang made some restrict assumptions on the mobility and traffic models. The characteristics of multimedia services are not differentiated. In this paper, we stu...
 
Multi-Experts for Touching Digit String Recognition
Found in: Document Analysis and Recognition, International Conference on
By Xian Wang, Venu Govindaraju, Sargur Srihari
Issue Date:September 1999
pp. 800
84.6% of touching digit strings have only two digits touching, 12.3% have three digits touching, and 3.1% have more than three digits touching. We present a multi-experts approach to recognize touching digit pairs (TDP) and touching digit triples (TDT). We...
 
A New Method of Character Line Extraction from Mixed-Unformatted Document Image for Japanese Mail Address Recognition
Found in: Document Analysis and Recognition, International Conference on
By Xian Wang, Toshio Tsutsumida
Issue Date:September 1999
pp. 769
This paper presents a new method of horizontal and vertical character line extraction in mixed-unformatted document images: handwritten or printed, in various character sizes, gaps and orientations nested among advertisement characters, drawings and photog...
 
A Novel Real-Time Information Hiding Technique in VLC Domain
Found in: Innovative Computing ,Information and Control, International Conference on
By Hao-Xian Wang, Zhuo-Zhi Diao
Issue Date:December 2009
pp. 624-626
Unlike still image, video watermarking technology must meet the real-time requirement. In this paper, we present a novel real-time information hiding technique in VLC domain, watermarking is performed entirely in the compressed domain with partial decompre...
 
Study on a Passive Control System of Structural Seismic Responses
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Zou Ying-Xian,Wang She-Liang,Lv Gang
Issue Date:January 2013
pp. 1036-1038
The intention of this paper was to design an effective and feasible method to control the seismic responses of structures within a safe range. Through the Shape Memory Alloy, this is achieved. In this paper, several tests were made to find out the impacts ...
 
Study on Emergency Management Evaluation for Super-long Tunnel on the Basis of GIS
Found in: International Conference on E-Business and E-Government
By Tang Xian,Wang She-liang,Han Ding-hai
Issue Date:May 2010
pp. 2969-2972
The number of super-long road constructing tunnels are increased sharply. How to improve service manage and damage prevention. It is a hot problem that the department of expressway road tunnel and service are concerned. Damage prevention of super-long road...
 
Research on Capacity Decision in a Dual-channel Supply Chain under Random Demand
Found in: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing (ICCC '13)
By Liang Xu, Xian Wang
Issue Date:December 2013
pp. 30-35
With the uncertainty of the market demand, we consider the capacity and order problems by a single period dual-channel supply chain game model with one manufacturer and one retailer. The paper discusses whether ordering goods before the sale's season or no...
     
Using a platform for mobile gesture-based interaction to control smart objects
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By José R. Casar, Ana M. Bernardos, Enrique García, Javier Portillo, Xian Wang
Issue Date:November 2013
pp. 1-2
This paper presents a mobile-instrumented Platform to interact with smart objects by using gestures. The system relies on a Dynamic Time Warping algorithm, which serve to train personalized gestures and also to recognize them real-time. The trained set of ...
     
Exploring Centrality-Lethality Rule from Evolution Constraint on Essential Hub and Nonessential Hub in Yeast Protein-Protein Interaction Network
Found in: Computational Intelligence and Security, International Conference on
By Dong Yun-yuan,Yang Jun,Liu Qi-jun,Wang Yong-xian,Wang Zheng-hua
Issue Date:December 2011
pp. 63-65
In the analysis of Protein-Protein Interaction (PPI) network, one intriguing problem is the reason for centrality-lethality rule. To discover the relationship between topological properties and functional features of proteins in PPI network, we classified ...
 
An Improved Face Recognition Algorithm Based on Skin-Color Detection
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Wang Hao-xian,Wang Chang-shuai,Zhang Yong,Mao Xing-peng
Issue Date:October 2011
pp. 334-336
As an important image processing technology, face recognition is an active subject in the fields of biometrics, but the low recognition rate hampers its wider use. In order to improve the operation speed and precision, a modified PCA(Principal Component An...
 
Joint Filtering of Space-frequency-polarization Domain Based on Vector Sensitive Array
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Hong Hong,Xing-peng Mao,Cui Hu,Hui-jun Hou,Hao-xian Wang
Issue Date:October 2011
pp. 670-673
Multi-domain signal filtering is a perspective technology in both radar and wireless communication systems. To obtain extra benefits compared with conventional methods, a novel joint space-frequency-polarization filter (SFPF) based on vector sensitive arra...
 
A DoS Attack Effect Evaluation Method Based on Multi-source Data Fusion
Found in: Communications and Mobile Computing, International Conference on
By Li-juan Zhang, Yan Cao, Qing-xian Wang
Issue Date:April 2010
pp. 91-96
Existing DoS attack effect evaluation methods can be classified to two types based on attack types and attacked targets. We discuss their deficiencies on realisability, genaralization and index-relativity. From service requester's point of view, a new eval...
 
A Network-Integrated Feature-Driven Engineering Environment: Information Modeling and Process Management
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Guo-xian Wang, Wen-zu Zhang, Andrew Yeh-Ching Nee
Issue Date:April 2009
pp. 431-435
Conventional data-centric integration approaches assume that the end-users are fully responsible for work-flow control, data consistency and integrity maintenance and inter-process coordination, generally without computer augmentation. The objective of thi...
 
A Design Versioning Scheme Supporting Management of Design Change Propagations
Found in: Intelligent Computation Technology and Automation, International Conference on
By Guo-xian Wang, Wen-zu Zhang, Andrew Yeh-Ching Nee
Issue Date:October 2008
pp. 943-948
A design change made on a design object does not necessarily make the new design replace the old one immediately: they should co-exist in a logically centralized PDM (Product Data Management) system until the design change is fully propagated upwards and d...
 
Exploring the basic laws of acupoints of ischemie cerebrovascular disease in acupuncture treatment through text mining
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Miao Jiang,Zhong-di Liu,Jing Sun,Hong-ming Ma,Na Qi,Hong-tao Guo,Guang Zheng,Ning Zhao,Su-yun Wang,Jing-rong Zhang,Rong-fen Dong,Ai-ping Lv,Miao Jiang,Yao-xian Wang
Issue Date:December 2013
pp. 90-95
It is well known that acupuncture treatment has an effect on patients with ischemie cerebrovascular disease. This study was aimed to summarize the basic laws of acupoints of ischemie cerebrovascular disease in acupuncture treatment using text mining techni...
   
Decision Tree?s Pruning Algorithm Based on Deficient Data Sets
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By ZHANG Yong, CHI Zhong-xian, WANG Da-gong
Issue Date:December 2005
pp. 1030-1032
ID3 algorithm is a decision tree induction algorithm, but its pruning method (EEP) is an ineffective method when the data sets are deficient, uncertain. In this paper we analyze and study the ID3 algorithm and its pruning methods, then improve on EEP algor...
 
 1