Search For:

Displaying 1-50 out of 174 total
uSD: An SD-Based Mobile Gateway to Wireless Sensor Network
Found in: Future Networks, International Conference on
By Chunxiao Jiang, Xin Zhang, Xin Ma, Yong Ren, Canfeng Chen, Jinfeng Zhang, Jian Ma
Issue Date:January 2010
pp. 34-38
This paper presents an SD-based mobile gateway to wireless sensor network (WSN), named uSD, which aims at helping users with mobile terminals to access WSN conveniently and efficiently. The prefix
 
Command and Control Network Modeling and Efficiency Measure Based on Capability Weighted-Node
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Du Wei,Liu Zhong,Xiu Bao-Xin,Zhang Wei-Ming,Cheng Qing
Issue Date:December 2011
pp. 1072-1077
Command and control (C2) organization and its existing research are introduced, and C2 organization efficiency measure is discussed. The C2 network model is built, and the capability of C2 network is analyzed by the method of weighted-node. The average coo...
 
A Model for Tree Diameter Distribution in Stands Based on Artificial Neural Network
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Shuo Cai, Xin-gang Kang, Li-Xin Zhang, Zhi-wen Gong, Lei Qin, Ping-teng Chen
Issue Date:October 2010
pp. 332-336
We present a model using back-forward feed propagation method for tree diameter distribution in stand based on artificial neural network with three-tier management. This model is able to describe dynamics of diameter distribution in stands with high precis...
 
An Improved Method for Similar Handwritten Chinese Character Recognition
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Fang Yang, Xue-Dong Tian, Xin Zhang, Xin-Biao Jia
Issue Date:April 2010
pp. 419-422
Similar characters existed in Chinese character affect much on enhancing the handwritten Chinese character recognition rate. An improved method is presented in this paper, which combines structural and statistical features for similar handwritten Chinese c...
 
A Novel RS-based Key Frame Representation for Video Mining in Compressed-Domain
Found in: International Workshop on Knowledge Discovery and Data Mining
By Xiang-wei Li, Ming-xin Zhang, Ya-lin Zhu, Jin-hong Xin
Issue Date:January 2009
pp. 199-201
It is a challenging issue to analyze video content for video mining tasks due to lacking of effective representation of video. In this paper, we propose a novel key frame representation algorithm based on Rough Sets (RS) in Discrete Cosine Transform (DCT) ...
 
Intelligent Energy Management Based on Driving Cycle Identification Using Fuzzy Neural Network
Found in: Computational Intelligence and Design, International Symposium on
By Tian Yi, Zhang Xin, Zhang Liang, Zhang Xinn
Issue Date:December 2009
pp. 501-504
Hybrid Electric Vehicles (HEV) is becoming the important develop tendency of the vehicle for its better fuel economy and emission. The parameters of HEV control strategy is always optimized on some one standardized driving cycle, but the different city hav...
 
Intelligent Graph Layout Using Many Users' Input
Found in: IEEE Transactions on Visualization and Computer Graphics
By Xiaoru Yuan, Limei Che, Yifan Hu, Xin Zhang
Issue Date:December 2012
pp. 2699-2708
In this paper, we propose a new strategy for graph drawing utilizing layouts of many sub-graphs supplied by a large group of people in a crowd sourcing manner. We developed an algorithm based on Laplacian constrained distance embedding to merge subgraphs s...
 
Dynamic Taint Analysis with Control Flow Graph for Vulnerability Analysis
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Zhe Chen,Xiao Juan Wang,Xin Xin Zhang
Issue Date:October 2011
pp. 228-231
In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we presen...
 
The Topological Analysis for Undirected Complex Network Based on Enron Email Database
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Xiao Juan Wang,Xin Xin Zhang,Zhen Chen
Issue Date:October 2011
pp. 232-235
In this paper, a new measure of correlation is introduced in undirected network. In order to get accurately degree distribution for the vertex at the end of a randomly chosen edge, we considered the information of edge, rather than just the degree distribu...
 
Design Aspects of Software as a Service to Enable E-Business through Cloud Platform
Found in: E-Business Engineering, IEEE International Conference on
By Wei Sun, ChangJie Guo, Zhongbo Jiang, Xin Zhang, Ning Duan, Ying Huang, Yue Da Xiong
Issue Date:November 2010
pp. 456-461
As a typical form of Cloud service, Software as a Service(SaaS) has been leading the adoption of Cloud to enable e-Business by the industries. There are growing number of SaaS services which could provide different aspects of capability enabling business t...
 
A Novel Compatible Hardware Expansion Method Based on General Memory Interface
Found in: Communications and Mobile Computing, International Conference on
By Xin Zhang, Xiaomu Wang, Yong Ren, Canfeng Chen, Jian Ma
Issue Date:January 2009
pp. 601-605
A new hardware expansion method based on memory card slot has been proposed in this paper, which can make the extended equipment more compatible with hosts that are running on different platforms. The main idea of our method is based on the fact that the l...
 
An Improved Algorithm for Multiclass Text Categorization with Support Vector Machine
Found in: Computational Intelligence and Design, International Symposium on
By Fubo Shao, Guoping He, Xin Zhang
Issue Date:October 2008
pp. 336-339
Automated text categorization is attractive because it frees organizations from the need of manually organizing document bases. Support Vector Machine (SVM) is an efficient technique for text categorization. Computing kernel matrix is the key in text categ...
 
Study of Control Logic for Automobile Anti-lock Braking System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xin Zhang, Yuanyuan Lou, Xiufang Yang
Issue Date:October 2008
pp. 493-497
Searching for an ideal logic principle has been being the key for the research and development of vehicle anti-lock braking system(ABS). Basing on MATLAB/ Simulink development environment, realizes the computer software simulation of vehicle dynamics model...
 
Fuzzy Knowledge for Agent Oriented Knowledge Management in E-commerce
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Wei long Liu, Xin Zhang, Fang Jin
Issue Date:October 2008
pp. 175-179
Knowledge management plays important role for personalized service in e-commerce. However, the incompleteness of knowledge has degraded knowledge collaboration in the context of e-commerce. This paper has addressed issues of knowledge acquisition for servi...
 
Clock: Synchronizing Internal Relational Storage with External XML Documents
Found in: Research Issues in Data Engineering, International Workshop on
By Xin Zhang, Elke A. Rundensteiner, Gail Mitchell, Wang-Chien Lee
Issue Date:April 2001
pp. 0111
Abstract: In many business settings, a relational database system (RDBMS) will serve as the storage manager for data from XML documents. In such a system, once the XML data is dissembled and loaded into the storage system, XML queries posed against the (vi...
 
The Relative Performance of VAR and VECM Model
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Jianfeng Zhang, Wenxiu Hu, Xin Zhang
Issue Date:November 2010
pp. 132-135
Two models are examined in this study: Vector Autoregressive Model (VAR) and Vector Error Correction Model (VECM). Based on three indices: S&P 500, Nikkei 225 (NIKKEI), and Morgan Stanley EAFE (MSCIEAFE or MSCI EAFE) Index, we implement VAR and VECM mo...
 
Research on H.264 Standard Stream Media Files over 3G Wireless Networks Based on DaVinci Platform
Found in: International Conference on E-Business and E-Government
By Zhang Xin,Zhang ZhengPing
Issue Date:May 2010
pp. 4279-4282
For transmission of multimedia over 3G wireless networks, H.264/AVC represents a major step forward in the development of video coding standards. In this paper, firstly, the authors briefly introduce a overview of H.264/AVC standard and propose the related...
 
Notice of Retraction The Exploration and Practice of Multimedia Teaching in Course of Microcomputer Principle and Application
Found in: 2009 International Conference on Education Technology and Training (ETT 2009)
By Xin Zhang, Qun Gao, Shutian Wei, Yanli Zhang
Issue Date:December 2009
pp. 189-191
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
 
Study on Expressing Principles of Semantics in Product Design
Found in: Computer Technology and Development, International Conference on
By Zhang Xin,Zhang Jianwu,Yang Mei
Issue Date:November 2009
pp. 433-436
Product semantics is a tool in product design to generate newer, better and more meaningful forms. Consumer preference and perception of products strongly influence a product's acceptability. Both are expressed by words that may be studied using product se...
 
Fuzzy-Genetic Control Strategy of Hybrid Electric Vehicle
Found in: Intelligent Computation Technology and Automation, International Conference on
By Tian Yi, Zhang Xin, Zhang Liang
Issue Date:October 2009
pp. 720-723
Hybrid Electric Vehicles (HEV) is becoming the important develop tendency of the vehicle for its better fuel economy and emission. And design and implementation of Energy Control Strategy become one of the most important problems of the HEV. A fuzzy contro...
 
Centaur: A Hybrid Approach for Reliable Policy-Based Routing
Found in: Distributed Computing Systems, International Conference on
By Xin Zhang, Adrian Perrig, Hui Zhang
Issue Date:June 2009
pp. 76-84
In this paper, we consider the design of a policy-based routing system and the role that link state might play. Looking at the problem from a link-state perspective, we propose Centaur, a hybrid routing protocol combining the benefits of both link state an...
 
Optimization Design of Four-Bar Linkage of Hydraulic Support Based on ADAMS
Found in: Information and Computing Science, International Conference on
By Xin Zhang, Jianwu Zhang, Qingliang Zeng, Hanzheng Dai
Issue Date:May 2009
pp. 338-341
In designing a large inclined angle hydraulic support, the structure characteristics of four-bar linkage is presented, and ADAMS software is applied to four-bar linkage modeling and simulation. In order to attain optimal results, parameterized modeling and...
 
The Design of Four-Bar Linkage of Large Inclined Angle Hydraulic Support
Found in: Engineering Computation, International Conference on
By Xin Zhang, Qingliang Zeng, Jianwu Zhang, Hanzheng Dai
Issue Date:May 2009
pp. 167-170
Four-bar linkage is one of the most important components of shield-type powered support or chock-shield-type hydraulic support. Parameterized modeling, simulation and optimization of four-bar linkage is firstly accomplished by use of ADAMS software in desi...
 
The Reliability Study of the Single Hydraulic Prop Based on Finite Element Analysis
Found in: Computer Modeling and Simulation, International Conference on
By Xin Zhang, Jianwu Zhang, Qingliang Zeng, Guoshun Sun
Issue Date:February 2009
pp. 315-318
In allusion to the reliability, which exists in the parametric design and optimizing process of the single hydraulic prop, this paper presents the new method in comparison with the traditional calculating and checking method for the reliability. The geomet...
 
Computer Technology on Geological Modeling on the Upper Second Member of Shahejie Formation in the Eastern Pucheng Oilfield
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Shujuan Xu, Jinliang Zhang, Xin Zhang, Xueping Ma
Issue Date:December 2008
pp. 222-225
Facies are important in reservoir modeling because the petrophysical properties of interest are highly correlated with facies type. The knowledge of facies constrains the range of variability in porosity and permeability. This paper presents a stochastic m...
 
An Optimization Method to Develop AAA Architectures with MIPv6 Mobility Support
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Ma Wenjing, Song Mei, Zhang Yong, Lin Xin, Zhang Huan
Issue Date:December 2008
pp. 948-952
With the development of mobile network and computer technology, MIPv6 is brought to the internet. Taking care of the security concerns about network connection, we bring AAA system into the mobile network. In order to be permitted in the integrated archite...
 
Blind Source Separation Using PICA Network
Found in: Computational Intelligence and Design, International Symposium on
By Min Wan, Xinli Zhang, Zhang Yi
Issue Date:October 2008
pp. 491-494
The principal independent component analysis (PICA) network is used to the real-valued source signals blind separation with a reference. It's proved in this paper that when a reference signal $r$ is available, the blind source separation can be transformed...
 
A Constrained Learning Algorithm for Finding Multiple Real Roots of Polynomial
Found in: Computational Intelligence and Design, International Symposium on
By Xinli Zhang, Min Wan, Zhang Yi
Issue Date:October 2008
pp. 38-41
A constrained learning algorithm is proposed for finding the multiple real roots by neural networks based on the complete discrimination system of polynomial. By coupling a constrained condition into the error function of the neural networks, the proposed ...
 
A Computer Aided Diagnosis System in Mammography Using Artificial Neural Networks
Found in: BioMedical Engineering and Informatics, International Conference on
By Guodong Zhang, Peiyu Yan, Hong Zhao, Xin Zhang
Issue Date:May 2008
pp. 823-826
In this paper we present a method for developing a fully automated computer aided diagnosis (CAD) system to help radiologist in detecting and diagnosing micro-calcifications (MCCs) in digital format mammograms. One aim of the CAD system is to increase the ...
 
A Semi-automatic Extraction Algorithm of Lung Lobar Fissures from HRCT Images Using Ridgelet
Found in: BioMedical Engineering and Informatics, International Conference on
By Guodong Zhang, Xin Zhang, Hong Zhao, Peiyu Yan
Issue Date:May 2008
pp. 850-854
The pulmonary fissures are the boundaries between the lobes in the lungs. They are useful for the analysis of pulmonary conformation and the diagnosis of lung disease on a lobar level. This paper introduces a technique for the semi-automatic extraction of ...
 
Route Table Partitioning and Load Balancing for Parallel Searching with TCAMs
Found in: Parallel and Distributed Processing Symposium, International
By Dong Lin, Yue Zhang, Chengchen Hu, Bin Liu, Xin Zhang, Derek Pao
Issue Date:March 2007
pp. 121
With the continuous advances in optical communications technology, the link transmission speed of Internet backbone has been increasing rapidly. This in turn demands more powerful IP address lookup engine. In this paper, we propose a power-efficient parall...
 
Application of Adaptive Particle Swarm Optimization in Portfolio Selection
Found in: Information Science and Engineering, International Conference on
By Xinli Zhang, Kecun Zhang
Issue Date:December 2009
pp. 3977-3980
In this paper, we present an asset allocation model and typical market imperfections such as short sale constraints, proportional transaction costs are considered simultaneously. Another, we use Conditional Value-at-Risk(CVaR) to control the corresponding ...
 
A Multi-dimensional Component Importance Analysis Mechanism for Component Based Systems
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Xin Zhang
Issue Date:July 2014
pp. 468-473
In a component-based system, both the reliability and topological location of each component contribute to the software architecture reliability. Due to the limited resources, it is very crucial to identify the key set of components such that we will be ab...
 
Fast Low-Rank Subspace Segmentation
Found in: IEEE Transactions on Knowledge and Data Engineering
By Xin Zhang,Fuchun Sun,Guangcan Liu,Yi Ma
Issue Date:May 2014
pp. 1-1
Subspace segmentation is the problem of segmenting (or grouping) a set of
 
WeiboEvents: A Crowd Sourcing Weibo Visual Analytic System
Found in: 2014 IEEE Pacific Visualization Symposium (PacificVis)
By Donghao Ren, Xin Zhang, Zhenhuang Wang, Jing Li, Xiaoru Yuan
Issue Date:March 2014
pp. 330-334
In this work, we propose a visual analytic system for analyzing events of Weibo, a Chinese-version microblog service. We build a system which consists of two interfaces: a web-based online visualization interface for public users and an offline expert visu...
 
Study on Digital Radio Mondiale Signal Monitor System for Wireless Communication Security
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Heng-Zhou Wu,Wang-Da Chen,Lin-Yu Fu,Xin Zhang,Hua-Qin Liu
Issue Date:December 2013
pp. 620-623
To meet the need of signal acquisition for Digital Radio Mondiale (DRM) equipment in communication security application, an embedded system is set up by combing signal acquisition and decoding module, host computer monitor module and PC104 bus control modu...
 
A New Writing Experience: Finger Writing in the Air Using a Kinect Sensor
Found in: IEEE MultiMedia
By Xin Zhang,Zhichao Ye,Lianwen Jin,Ziyong Feng,Shaojie Xu
Issue Date:October 2013
pp. 85-93
With the introduction of Microsoft Kinect, there has been considerable interest in creating various attractive and feasible applications in related research fields. Kinect simultaneously captures the depth and color information and provides real-time relia...
 
A Packet Error Rate of AIS Messages Measurement System
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Gong Mingju,Ma Shexiang,Meng Xin,Zhang Shuanggen,Wu Huibo,Rui Xue
Issue Date:September 2013
pp. 667-671
This article discussed a packet error rate of Automatic Identification System messages measurement system. Packet Error Rate is the only verdict conditions of the receive-performance of shipboard AIS, but so far there is no relative equipment. In this pape...
 
A Packet Error Rate of AIS Messages Measurement System
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Gong Mingju,Ma Shexiang,Meng Xin,Zhang Shuanggen,Wu Huibo,Rui Xue
Issue Date:September 2013
pp. 667-671
This article discussed a packet error rate of Automatic Identification System messages measurement system. Packet Error Rate is the only verdict conditions of the receive-performance of shipboard AIS, but so far there is no relative equipment. In this pape...
 
Rectification of Optical Characters as Transform Invariant Low-Rank Textures
Found in: 2013 12th International Conference on Document Analysis and Recognition (ICDAR)
By Xin Zhang,Zhouchen Lin,Fuchun Sun,Yi Ma
Issue Date:August 2013
pp. 393-397
Character rectification is very important for character recognition. Front view standard character images are much easier to recognize since most character recognition algorithms were trained with such data. However, the existing text rectification methods...
 
Multiple Geometry Transform Estimation from Single Camera-Captured Text Image
Found in: 2013 12th International Conference on Document Analysis and Recognition (ICDAR)
By Xin Zhang,Fuchun Sun
Issue Date:August 2013
pp. 538-542
This article proposes a new approach to jointly rectify multi-distorted text image planes using a single image. Without extracting text lines or analyzing the text layout, the algorithm build a Multi-Distortion Dewarping (MDD) model based on modified text ...
 
Audio-Visual Emotion Recognition Using Neural Networks Learned with Hints
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Kun Lu,Xin Zhang
Issue Date:July 2013
pp. 515-519
This paper presents a neural network (NN) based multimodal fusion classifier for automatic emotion recognition. The audio and visual channels provide complementary information, so we utilize features from three behavioral cues: frontal-view facial expressi...
 
PIWI: Visually Exploring Graphs Based on Their Community Structure
Found in: IEEE Transactions on Visualization and Computer Graphics
By Jing Yang, Yujie Liu, Xin Zhang, Xiaoru Yuan, Ye Zhao,S. Barlowe, Shixia Liu
Issue Date:June 2013
pp. 1034-1047
Community structure is an important characteristic of many real networks, which shows high concentrations of edges within special groups of vertices and low concentrations between these groups. Community related graph analysis, such as discovering relation...
 
Jamming-Resilient Multipath Routing
Found in: IEEE Transactions on Dependable and Secure Computing
By Hossen Mustafa,Xin Zhang,Zhenhua Liu,Wenyuan Xu,Adrian Perrig
Issue Date:November 2012
pp. 852-864
Jamming attacks are especially harmful to the reliability of wireless communication, as they can effectively disrupt communication between any node pairs. Existing jamming defenses primarily focus on repairing connectivity between adjacent nodes. In this p...
 
Non-negative low rank and sparse graph for semi-supervised learning
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Liansheng Zhuang, Haoyuan Gao, Zhouchen Lin, Yi Ma, Xin Zhang, Nenghai Yu
Issue Date:June 2012
pp. 2328-2335
Constructing a good graph to represent data structures is critical for many important machine learning tasks such as clustering and classification. This paper proposes a novel non-negative low-rank and sparse (NNLRS) graph for semi-supervised learning. The...
 
Secure and Scalable Fault Localization under Dynamic Traffic Patterns
Found in: 2012 IEEE Symposium on Security and Privacy
By Xin Zhang, Chang Lan,A. Perrig
Issue Date:May 2012
pp. 317-331
Compromised and misconfigured routers are a well-known problem in ISP and enterprise networks. Data-plane fault localization (FL) aims to identify faulty links of compromised and misconfigured routers during packet forwarding, and is recognized as an effec...
   
A Semiautomatic Control Technique for Machinima Virtual Camera
Found in: Computer Science and Electronics Engineering, International Conference on
By Wenfeng Hu,Xin Zhang
Issue Date:March 2012
pp. 112-115
With the rapid development of computer graphic, the graphics real-time rendered by game engines tend gradually towards graphics offline rendered by 3D softwares. The machinima technology receives an increasing attention. This paper proposes a new technique...
 
Code Differential Relative Positioning for GNSS Receivers
Found in: Intelligent System Design and Engineering Application, International Conference on
By Hongliang Xu,Xin Zhang,Xingqun Zhan
Issue Date:January 2012
pp. 205-208
This paper introduces an algorithm to determine relative position between rover GNSS receivers. Other than the simple way of subtracting two coordinates, the proposed method is based on the code-phase differences. Pseudorange measurement differences are ca...
 
A Task-Mapping Algorithm for Performance Simulation Based on Simulated Annealing
Found in: Computational and Information Sciences, International Conference on
By Xiaowei Guo,Yufei Lin,Xinhai Xu,Xin Zhang
Issue Date:October 2011
pp. 337-340
Nowadays, the scale of parallel computer systems is increasing, and simulation technology has become an important tool for performance prediction in the system development process. Task mapping approach is an important aspect affecting the performance of s...
 
Network fault localization with small TCB
Found in: Network Protocols, IEEE International Conference on
By Xin Zhang,Zongwei Zhou,Geoff Hasker,Adrian Perrig,Virgil Gligor
Issue Date:October 2011
pp. 143-154
Clear evidence indicates the existence of compromised routers in ISP and enterprise networks. Fault localization (FL) protocols enable a network to localize specific links of compromised routers sabotaging network data delivery and are recognized as an ess...
 
 1  2 Next >>