Search For:

Displaying 1-50 out of 61 total
Detecting and Visualizing Profile Correlation in Subspace
Found in: Computer and Information Science, ACIS International Conference on
By Xin Xu,Wei Wang,Xin Chen
Issue Date:May 2011
pp. 104-109
In this paper, we propose a novel method for detecting and visualizing profile correlation in subspace. The proposed method is able to (1) detect shifting-and-scaling correlated profiles in subspace, where the correlation can be either positive or negative...
 
Improvement and Application of HAZOP Analysis for Batch Process with SDG
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Xin Xu, Beike Zhang, Xin Ma, Chongguang Wu
Issue Date:October 2010
pp. 390-394
Hazard and Operability (HAZOP) analysis is a systematic procedure for determining the abnormal causes of process deviations from normal behavior and their adverse consequences in a chemical plant. A computer-aided HAZOP analysis software platform based on ...
 
Multiobjective optimization of current waveforms for switched reluctance motors by genetic algorithm
Found in: Computational Intelligence, Proceedings of the World on Congress on
By Jian-Xin Xu, Jian-Xin Xu, Qing Zheng
Issue Date:May 2002
pp. 1860-1865
In this paper a genetic algorithm (GA) is employed to determine the desired current waveforms for switched reluctance motors (SRM) through generating appropriate reference phase torques for a given desired torque using the torque sharing function (TSF). Th...
 
Microwave Dielectric Properties of Al-Substituted Forsterite Ceramics
Found in: Electrical and Control Engineering, International Conference on
By Song Kai-Xin, Xu Jun-Ming, Hu Xiao-Ping, Zheng Liang, Ying Zhi-Hua, Qin Hui-Bin
Issue Date:June 2010
pp. 5862-5864
In this paper, the nominal formula Mg2(SixAl1-x)O4-δ (x≤0.2) ceramics were synthesized by traditional solid phase reaction methods, and the phase evolution and microstructures of that were investigated by XRD and SEM. The testing results of XRD and SEM sho...
 
An Efficient NAND Flash Garbage Collection Algorithm Based on Area and Block Operation
Found in: Intelligent System Design and Engineering Application, International Conference on
By Meng Wang,Kai Bu,Qiyou Xie,Zhaolin Sun,Xin Xu,Hui Xu
Issue Date:January 2012
pp. 1192-1195
Garbage collection as a key technology for solid-state storage (SSD), it's has critical influence for the SSD's performance. This article addressed the low efficiency, high cost problem of the presented Garbage Collection (GC) Algorithm, Proposed a new Eff...
 
High Speed Real-Time Data Acquisition System Based on Solid-State Storage Technique
Found in: Digital Manufacturing and Automation, International Conference on
By Nan Li,Hongshan Nie,Yinan Wang,Haijun Liu,Xin Xu,Zhaolin Sun,Hui Xu
Issue Date:August 2011
pp. 586-589
This paper presented a high speed data acquisition system for real-time appLication. The hardware of system mainly consists of data acquisition, distribution and storage section. A 3Gsps ultra high-speed ADC is appLied in acquisition section. In distributi...
 
Shared Interface Gateway Softway Model in Communication Management
Found in: Software Engineering, World Congress on
By Xin Xu, Jie Xu, Tongxin Xie, Xi Shao
Issue Date:December 2010
pp. 45-52
This paper presents the shared interface gateway software model based on the project of CWPS(Cooperative Workflow Platform Service). Firstly, the shared interface gateway framework is built and the meta-models of shared interface gateway software are given...
 
Research and Design of Solid State RAID Storage System
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Bu Kai, Yin Qinghong, Xu Xin, Xu Hui, Zhang Yumei, Yi Wei
Issue Date:October 2010
pp. 143-145
In view of the current problems and challenges that magnetic disk storage systems faced in the military and other critical applications, this paper put forward a solid-state storage array systems technology as the solution. The paper places most importance...
 
Multi-bit N-Array Asynchronous Counting Circuit Based on Memristor
Found in: 2010 International Conference on Intelligent System Design and Engineering Application (ISDEA 2010)
By Tian XiaoBo, Nie HongShan, Li QingJiang, Xu Xin, Xu Hui, Liu Haijun
Issue Date:October 2010
pp. 968-971
Hewlett Packard laboratory announced that they have found the missing memristor in 2008. One of memristor's characteristics is that it can memorize charges that pass through it without electrical supply. Using that speciality, A kind of Multi-bit N-Array a...
 
Effective Fuzzing Based on Dynamic Taint Analysis
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Guangcheng Liang,Lejian Liao,Xin Xu,Jianguang Du,Guoqiang Li,Henglong Zhao
Issue Date:December 2013
pp. 615-619
In this paper we present a new vulnerability-targeted black box fuzzing approach to effectively detect errors in the program. Unlike the standard fuzzing techniques that randomly change bytes of the input file, our approach remarkably reduces the fuzzing r...
 
DUAL: Reliability-Aware Power Management in Data Centers
Found in: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)
By Xin Xu,Kayo Teramoto,Allan Morales,H. Howie Huang
Issue Date:May 2013
pp. 530-537
A virtualized data center hosts users and applications within a large number of virtual machines (VM) to achieve easy provisioning and high utilization of physical resources. Energy efficiency and reliability are two primary concerns for operating a data c...
 
Visual Saliency Based on Scale-Space Analysis in the Frequency Domain
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Jian Li,M. D. Levine, Xiangjing An, Xin Xu, Hangen He
Issue Date:April 2013
pp. 996-1010
We address the issue of visual saliency from three perspectives. First, we consider saliency detection as a frequency domain analysis problem. Second, we achieve this by employing the concept of nonsaliency. Third, we simultaneously consider the detection ...
 
Research on the Financial Accounting System of Commonweal Organization Based on Social Responsibility Concept
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Liao Xin,Xu Liping
Issue Date:January 2013
pp. 1201-1204
Based on the property right theory, stakeholder theory, organization theory and governance theory, this article takes the social responsibility of commonweal organization as basic point, and suggests establishing a specific financial accounting system for ...
 
Framework of an Adaptive Concept Model Based on Domain Theory
Found in: 2012 Fourth International Symposium on Information Science and Engineering (ISISE)
By Xin Xu
Issue Date:December 2012
pp. 127-130
Domain theory provides the basis for the ontology based concept model, which has been proved to be effective in building the enterprise information system. However, most of existing enterprise information system poses great difficult in solving the changin...
 
Coordination between the Intellectual Property Enforcement in the Digital Environment and the Data Security
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Xin Xu
Issue Date:October 2012
pp. 804-807
As an increasing number of intellectual property (IP) infringements have been done through internet, to strengthen the IP enforcement rules in the digital environment is increasingly becoming a national consensus. The Anti-Counterfeiting Trade Agreement (A...
 
Understanding soft error propagation using Efficient vulnerability-driven fault injection
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Xin Xu, Man-Lap Li
Issue Date:June 2012
pp. 1-12
Extreme CMOS scaling is expected to significantly impact the reliability of future microprocessors, prompting recent research effort on low-cost hardware-software cross-layer reliability solutions. To evaluate, statistical fault injection (SFI) is often us...
   
Advanced Framework for Iterative Hash Functions
Found in: Computer Science and Electronics Engineering, International Conference on
By Xin Xu,Qisheng Zhao,Cunhua Li
Issue Date:March 2012
pp. 599-602
The well-known Merkle-Damgârd construction could not preserve all of the properties of the compression function, such as the second preimage resistance property, pseudo random property etc. To improve the security of the iterative Hash function, an enhance...
 
CriticalFault: Amplifying Soft Error Effect Using Vulnerability-Driven Injection
Found in: Parallel Architectures and Compilation Techniques, International Conference on
By Xin Xu,Man-Lap Li
Issue Date:October 2011
pp. 173-174
As future microprocessors will be prone to various types of errors, researchers have looked into cross-layer hardware-software reliability solutions to reduce overheads. These mechanisms are shown to be effective when evaluated with statistical fault injec...
 
Design and Implementation of the Accumulating Algorithm of Digital Signal Averager
Found in: Digital Manufacturing and Automation, International Conference on
By Jietao Diao,Qingjiang Li,Wei Yi,Meng Wang,Haijun Liu,Honhqi Yu,Zhaolin Sun,Xin Xu
Issue Date:August 2011
pp. 377-380
To satisfy the need of on-board accumulation in time-of-fLight mass spectrometer (TOF-MS) appLications, the paper presents an accumulation algorithm in FPGA based on PipeLine and ping-pong operation. The accumulation algorithm is verified on a signal avera...
 
Compensative mechanism based on steerable antennas for High Altitude Platform movement
Found in: Software Maintenance and Reengineering, European Conference on
By Hui Li, Xin Xu, Mingchuan Yang, Qing Guo
Issue Date:August 2011
pp. 870-874
Because of the complexity of stratosphere, HAPs might inevitably encounter relative motion with respect to the ground, which leads to variation of quality of service in the intended coverage area. Models for predicting the geographical coverage in the case...
 
Mode Classification for E-commerce under GATs
Found in: Business Computing and Global Informatization, International Conference on
By Xin Xu
Issue Date:July 2011
pp. 220-222
Although it is basically agreed that the E-commerce is to be regulated by GATs in WTO, a consequent issue to be settled is then how to put the different styles of E-commerce into the corresponding modes of trade in services stated in the GATs for the prope...
 
The Structure and Substance of Student Asynchronous Communication in Hybrid STEM Courses
Found in: Advanced Learning Technologies, IEEE International Conference on
By Zhongxiao Li,Kairui Chen,Xin Xu
Issue Date:July 2011
pp. 532-533
Hybrid learning usually incorporate online learning activities since face-to-face class time has been reduces significantly. One of the major challenges in hybrid course is to maintain the same level of student-to-student and student to-instructor interact...
 
An Improved Real Coded Quantum Genetic Algorithm and its Applications
Found in: Computational Aspects of Social Networks, International Conference on
By Xinli Xu, Jiajing Jiang, Jing Jie, Haiyan Wang, Wanliang Wang
Issue Date:September 2010
pp. 307-310
In this paper, an new quantum genetic algorithm (RQGA) is presented to enhance the global optimization capability. Different from previous quantum genetic algorithm, the proposed RQGA uses real-coded replacing binary code, and uses approximation operator r...
 
A Novel Hybrid Algorithm Based on Baldwinian Learning and PSO
Found in: Computational Aspects of Social Networks, International Conference on
By Wanliang Wang, Lili Chen, Jing Jie, Haiyan Wang, Xinli Xu
Issue Date:September 2010
pp. 299-302
In the paper, a novel hybrid algorithm based on Baldwinian learning and PSO (BLPSO) is proposed to increase the diversity of the particles and to prevent premature convergence of PSO. Firstly, BLPSO adopts the Baldwinian operator to simulate the learning m...
 
A Hybrid Discrete Particle Swarm Optimization for Job Shop Scheduling
Found in: Computational Aspects of Social Networks, International Conference on
By Wanliang Wang, Jing Zhang, Xinli Xu, Jing Jie, Haiyan Wang
Issue Date:September 2010
pp. 303-306
The job shop scheduling problem (JSSP) is a well known NP-hard problem, and many algorithms have been presented to solve it, but the results are still unsatisfactory. In this paper, a hybrid discrete particle swarm optimization algorithm based on a two lay...
 
An Adaptable Anycast Routing Algorithm Based on Density and Proximity
Found in: Information Engineering, International Conference on
By Xin Xu, Yun-li Gu, Jie Du, Huan-yan Qian
Issue Date:July 2009
pp. 66-69
Most existing anycast routing algorithms are basedon shortest path algorithm. In this paper, an adaptable anycast routing algorithm based on density and proximity is proposed. While determining anycast member, both the proximity factor and nearby anycast m...
 
Optimization Algorithm Based on Artificial Life Algorithm and Particle Swarm Optimization
Found in: Information and Computing Science, International Conference on
By Yun-li Gu, Xin Xu, Jie Du, Huan-yan Qian
Issue Date:May 2009
pp. 173-176
An optimization algorithm based on artificial life algorithm and particle swarm optimization (PSO) is proposed. The optimization includes two stages. In the first stage, artificial life system is created. As artificial life organisms have a sensing system,...
 
The Research on Routing Protocol of Sense Wireless Network Based on the Greedy Algorithm
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Yuan Xin, Xu Guang-hua, Chen Xiao-jun
Issue Date:April 2009
pp. 558-561
In the application of wireless sensor networks (WSN), the balance of energy consumption plays an important role in extending the life cycle of WSN. Aim at energy consumption of Wireless sensors network, a dynamic cluster-based routing protocol based on the...
 
Finding Time-Lagged 3D Clusters
Found in: Data Engineering, International Conference on
By Xin Xu, Ying Lu, Kian-Lee Tan, Anthony K. H. Tung
Issue Date:April 2009
pp. 445-456
Existing 3D clustering algorithms on gene
 
Minimising Native Interference in Still Image Data Hiding
Found in: Communications and Mobile Computing, International Conference on
By Jian Jun Guo, Xin Xu, Zhao Feng Ma, Jian Yin Zhang
Issue Date:January 2009
pp. 423-429
The technique of using orthogonal sequences to embed digital watermarks is described. It is shown that embedding with sequences which are orthogonal to the cover image can enhance the detection reliability and improve the system performance and robustness ...
 
Finite elements study of high mechanical stress in nanostructures for innovative NEMS sensors
Found in: International Conference on Nano/Micro Engineered and Molecular Systems
By Xin Xu, Bogdan Bercu, Francois Lime, Laurent Montes
Issue Date:January 2009
pp. 676-681
Mechanical stress is increasingly applied in micro-electronics. For instance, strained silicon technology is widely used to improve carrier mobility and therefore driver current for advanced MOS transistors. For micro-electromechanical systems, piezoresist...
 
A Security Architecture for Grid-Based Distributed Simulation Platform
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Heng He, Li Chen, Pingpeng Yuan, Xin Xu, Xiaofeng Wang
Issue Date:December 2008
pp. 207-212
To meet the requirements in developing distributed simulation technology, a grid-based distributed simulation platform (GDSP), which was based on latest grid technology and High Level Architecture (HLA), was proposed. GDSP is the base infrastructure of ser...
 
A Simulation for MPLS Global Recovery Model
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Yimin Qiu, Jianxun Chen, Jinguang Gu, Xin Xu
Issue Date:November 2008
pp. 259-262
Researching on more reliable network becomes an inevitable trend presently. As one of the best powerful method to construct a high credibility system, fault-tolerant technique provides fault recovery mechanism which not only assures resuming data’s transmi...
 
An Escaping Method from Local Dead Region in Rolling Path Planning
Found in: Intelligent Computation Technology and Automation, International Conference on
By JinZe Song, YanFeng Cong, Hong Chen, Xin Xu
Issue Date:October 2008
pp. 338-343
A path planning method of mobile robot based on rolling windows is proposed in this paper. Actually rolling path planning has high speed and high efficiency. But this method still has local dead region in the process of planning. For the problem, a method ...
 
Information Technology and the Number of Suppliers in a Supply Chain: Is There a Relationship?
Found in: Hawaii International Conference on System Sciences
By Jason Dedrick, Sean Xin Xu, Kevin Zhu
Issue Date:January 2008
pp. 390
This work addresses how the number of suppliers employed by a manufacturer relates to its use of electronic procurement (e-procurement). Using data from the U.S. manufacturing industry, we find a surprising result that there is non-correlation between e-pr...
   
Visual Protractor Based Localization Algorithm for Mobile Robot
Found in: Intelligent Systems Design and Applications, International Conference on
By Wei Chen, Xuening Wang, Tao Wu, Xin Xu
Issue Date:October 2006
pp. 67-71
Data fusion is an effective tool to improve the localization precision of a mobile robot. This paper presents a new algorithm to improve the precision of robot localization by fusing data from three kinds of sensors: encoders, a gyroscope and a camera. In ...
 
An Optimal Level Sets Method for Lung Nodules Detection in CT Images
Found in: Intelligent Systems Design and Applications, International Conference on
By Ying Wei, Xin-he Xu, Tong Jia, Da-zhe Zhao
Issue Date:October 2006
pp. 251-255
Chan-Vese?s image segmentation method proposed based on level sets method is studied and improved in this paper. A new level set method has been presented, which combines the average values of global regions and local boundary information, and it is used f...
 
Mining Shifting-and-Scaling Co-Regulation Patterns on Gene Expression Profiles
Found in: Data Engineering, International Conference on
By Xin Xu, Ying Lu, Anthony K. H. Tung, Wei Wang
Issue Date:April 2006
pp. 89
In this paper, we propose a new model for coherent clustering of gene expression data called reg-cluster. The proposed model allows (1) the expression profiles of genes in a cluster to follow any shifting-and-scaling patterns in subspace, where the scaling...
 
The HMM-Based Model for Evaluating Recommender's Reputation
Found in: E-Commerce Technology for Dynamic E-Business, IEEE International Conference on
By Weihua Song, Vir V. Phoha, Xin Xu
Issue Date:September 2004
pp. 209-215
There is limited research on evaluating an agent's reputation as a recommender. A key challenge is that a recommender's reputation is affected by both the recommender's trustworthiness and the recommender's expertise, including the recommender's trust know...
 
An Adaptive Recommendation Trust Model in Multiagent System
Found in: Intelligent Agent Technology, IEEE / WIC / ACM International Conference on
By Weihua Song, Vir V. Phoha, Xin Xu
Issue Date:September 2004
pp. 462-465
This paper presents the design of a trust model to derive recommendation trust from heterogeneous agents. The model is a novel application of neural network in evaluating multiple recommendations of various trust standards with and without deceptions. The ...
 
A Hybrid SOM-SVM Method for Analyzing Zebra Fish Gene Expression
Found in: Pattern Recognition, International Conference on
By Wu Wei, Liu Xin, Xu Min, Peng Jinrong, Rudy Setiono
Issue Date:August 2004
pp. 323-326
Microarray technology can be employed to quantitatively measure the expression of thousands of genes in a single experiment. It has become one of the main tools for global gene expression analysis in molecular biology research in recent years. The large am...
 
COBBLER: Combining Column and Row Enumeration for Closed Pattern Discovery
Found in: Scientific and Statistical Database Management, International Conference on
By Feng Pan, Anthony K. H. Tung, Gao Cong, Xin Xu
Issue Date:June 2004
pp. 21
The problem of mining frequent closed patterns has received considerable attention recently as it promises to have much less redundancy compared to discovering all frequent patterns. Existing algorithms can presently be separated into two groups, feature (...
 
Abstract Device Platform
Found in: Research Challenges, Academia/Industry Working Conference on
By Naveen Sharma, Xin Xu, Dipak Pravin
Issue Date:April 2000
pp. 205
No summary available.
   
Investigation on the Construction Mode of the Charging Station and Battery-Exchange Station
Found in: Asia-Pacific Power and Energy Engineering Conference
By Yongxiang Liu, Fuhui Hui, Ruilin Xu, Tao Chen, Xin Xu, Jie Li
Issue Date:March 2011
pp. 1-2
NA
 
Design and Implementation of Embedded Data Acquisition System for Mobile Vehicle
Found in: Optoelectronics and Image Processing, International Conference on
By Li Nan, Zhou Zhou, Li Qingjiang, Yin Qinghong, Sun Zhaolin, Xu Xin, Xu Hui
Issue Date:November 2010
pp. 380-383
The article presents a FPGA based novel embedded automobile data acquisition system, which records vehicle’s, environment’s and driver’s operation information intuitively. The data acquisition system is useful in the fields of traffic accident analyze and ...
 
Seamless handover scheme for real-time multimedia services in PMIPv6
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Xin Xu, Yong Cui, Jiangchuan Liu, Wendong Wang, Yalei Tan, Guoyan Liu, Chunhui Zhu
Issue Date:August 2013
pp. 834-839
Proxy Mobile IPv6 (PMIPv6) is one of the most promising technologies for next generation IP network. Fast Handover for PMIPv6 (FPMIPv6) was standardized to improve the handover performance of PMIPv6. However, the long interruption of Lay 2/lay 3 handover i...
   
Coal Enterprise Safety Production Assessment Based on Fuzzy Comprehensive Evaluation
Found in: Business Computing and Global Informatization, International Conference on
By Zhang Xin, Xu Lina
Issue Date:July 2011
pp. 554-555
Many index factors constitute safety production assessment of coal enterprises, and most of them are fuzzy. By the method of fuzzy comprehensive evaluation, people can analyze the linkages between the various factors from both internal and external to dete...
 
The Study of Particulate Emissions of Engine Fuelled with Biodiesel-Diesel Blends Using Thermo-gravimetric Analysis
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Ma Zhihao, Zhang Xiaoyu, Wang Xin, Xu Bin, Wu Jian
Issue Date:February 2011
pp. 1903-1906
Particulate emissions of engine fuelled different proportions of Pistacia chinensis Bunge seed biodiesel-dieselblends were collected under different fuel supplying advance dangles and different operating conditions. The change of volatile organic fractions...
 
Creating Realistic Human Motions with PBSO
Found in: Visualisation, International Conference in
By Zhihua Chen, Shengxi Wu, Hong Zheng, Wei Meng, Xin Xu
Issue Date:July 2009
pp. 67-71
It is a difficult task to create a realistic human animation because of the high complexity of human motion. To address this problem, a new method is presented for producing physically valid motion with example motions. The core of our method is physics-ba...
 
Novel Efficient Check Node Update Implementations for Row Weight Matched Min-Sum Algorithm
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Lu Xin, Xu Jun
Issue Date:August 2007
pp. 560-563
This paper has presented various Min-Sum related LDPC decoding algorithms and their typical hardware architectures of check node update in the scenario of parallel implementation. For one check node update of Normalized Min-Sum algorithm, if the current ro...
 
 1  2 Next >>