Search For:

Displaying 1-50 out of 81 total
A Numerical Approach of Direct-SIMPLE Deduced Pressure Equations to Simulations of Transport Phenomena During Shaped Casting
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Daming Xu, Jun Ni
Issue Date:June 2006
pp. 815-821
The properties of a LPAPI-matrix derived from an extended Direct-SIMPLE scheme are demonstrated. It is shown that such LPAPI-matrix for a 3D strong P.V coupling problem is difficult to numerically solve by nature, though the Direct-SIMPLE algorithm is theo...
Reproducing kernel Banach spaces for machine learning
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Haizhang Zhang, Yuesheng Xu, Jun Zhang
Issue Date:June 2009
pp. 3520-3527
Reproducing kernel Hilbert space (RKHS) methods have become powerful tools in machine learning. However, their kernels, which measure similarity of inputs, are required to be symmetric, constraining certain applications in practice. Furthermore, the celebr...
Construction and Realization of a New Class M-Sequence
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Hong Lv, Min Xu, Gang Xu, Jun-chu Fang
Issue Date:August 2008
pp. 322-326
The M-Sequences have been widely used in many areas such as telecommunication, cryptology, navigation and radar. Due to the difficulties of constructing the feedback functions of M-sequences, a new method of constructing one class M-sequence and its feedba...
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
Found in: ACM Transactions on Information and System Security (TISSEC)
By Chongkyung Kil, Jong Youl Choi, Jong Youl Choi, Jong Youl Choi, Jun Xu, Jun Xu, Jun Xu, Michael K. Reiter, Michael K. Reiter, Michael K. Reiter, Xiaofeng Wang, Xiaofeng Wang, Xiaofeng Wang, Zhuowei Li, Zhuowei Li, Zhuowei Li
Issue Date:December 2008
pp. 1-35
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by this idea, we propose a packet vaccine mechanism that randomizes address-like st...
Quantum-behaved Particle Swarm Optimization with Crossover Operator
Found in: Wireless Networks and Information Systems, International Conference on
By Dianbo Su, Wenbo Xu, Jun Sun
Issue Date:December 2009
pp. 399-402
This paper describes a variant of Quantum-behaved Particle Swarm Optimization (QPSO) algorithm named C-QPSO for solving global optimization problems. In C-QPSO the QPSO is revised by including a novel crossover operator to enhance the algorithm’s ability t...
Short Text Feature Extraction and Clustering for Web Topic Mining
Found in: Semantics, Knowledge and Grid, International Conference on
By Hui He, Bo Chen, Weiran Xu, Jun Guo
Issue Date:October 2007
pp. 382-385
This paper is to introduce an algorithm to cluster Chinese short texts for mining web topics based on Chinese chunks. Aiming at the characteristics of Chinese short texts, the algorithm employs N-gram feature extraction to capture Chinese chunks from texts...
A Test-bed for Above-knee Intelligent Prosthesis
Found in: Robotics and Biomimetics, IEEE International Conference on
By Lina Hao, Xinhe Xu, Jun Cheng
Issue Date:December 2006
pp. 1311-1315
In order to develop an advanced intelligent prosthesis which can help above-knee amputee to walk like healthy people, a test-bed for above-knee intelligent prosthesis has been set up. Mechanism and virtual prototype model are all built. The test-bed consis...
Design of the Control System for the Self-Propelled Electrostatic Sprayer
Found in: 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)
By Li Yang,Xue Xiaole,Xu Jun,Wen Xu
Issue Date:November 2013
pp. 259-263
An adaptive neural network control lerwitn both feed-forward and feedback is designed to improve the yaw stability of vehicle by compound control of direct yaw moment and active front steering. The feedback controller takes the deviation of actual yaw rate...
A Smart Home System Based on ZigBee and IOS Software
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Hui-Liang Shang,Ren-Mei Xu,Jun-Kang Yuan
Issue Date:December 2012
pp. 940-944
A smart home system based on ZigBee and iOS is proposed. ZigBee is a low-power personal area network. This technology is combined with the mainstream IOS operational system, which established a wireless smart home system. The system uses CC2430 chip and Zi...
Research on optimal Traditional Chinese Medicine treatment of knee ostarthritis with data mining algorithms
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Da Guo,Jian Li,Gang Zhang,Weixiang Lu,Shaojian Xu,Jun Liu
Issue Date:October 2012
pp. 406-409
At present, more and more patients suffering from knee OA (Ostarthritis) are treated with complementary and alternative medicine, such as herbal drugs, herbal patches, acupuncture and manipulation etc, as an effective therapy. However, traditional statisti...
Model of Cluster Green Supply Chain Performance Evaluation Based on Circular Economy
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xu Jun
Issue Date:October 2009
pp. 941-944
Cluster supply chain, act as a new kind of the development of supply chain, was a kind of more complex supply chain network. The management of cluster green supply-chain was a model of modern management, proposed to meet the need of the target of sustainab...
Scalability of Hybrid Fuzzy C-Means Algorithm Based on Quantum-Behaved PSO
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Hao Wang, Shiqin Yang, Wenbo Xu, Jun Sun
Issue Date:August 2007
pp. 261-265
A new hybrid fuzzy clustering algorithm that incorporates the Fuzzy C-means (FCM) into the Quantum-behaved Particle Swarm Optimization (QPSO) algorithm is proposed in this paper (QPSO+FCM). The QPSO has less parameters and higher convergent capability of t...
Novel Efficient Check Node Update Implementations for Row Weight Matched Min-Sum Algorithm
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Lu Xin, Xu Jun
Issue Date:August 2007
pp. 560-563
This paper has presented various Min-Sum related LDPC decoding algorithms and their typical hardware architectures of check node update in the scenario of parallel implementation. For one check node update of Normalized Min-Sum algorithm, if the current ro...
Simulation for Land Use Dynamic Change of Dian-Chi Lake Watershed Using Agent-Based Modeling
Found in: 2013 Fourth Global Congress on Intelligent Systems (GCIS)
By Quan-li Xu,Jun-hua Yi,Kun Yang,Gui-lin Wang
Issue Date:December 2013
pp. 40-44
The land use structure and biological service function of Dian-chi lake watershed are being changed by the rapid development of social economy and urbanization, which finally leads to the generation and aggravation of agriculture and urban non-point source...
An Efficient Image Encryption and Hiding Method Applied by Double Random Phase Encoding
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Hongsheng Xu,Jun Lei
Issue Date:June 2013
pp. 302-305
Compared with digital methods, image hiding methods by optical ways have many advantages such as high processing speed, high parallel, high encryption dimension etc al. A novel efficient image encryption and hiding method applied by double random phase enc...
Research of a ZVT-Boost PFC Circuit Based on SABER
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Xu Jun,Yang Shuoliang
Issue Date:January 2013
pp. 858-860
The operating principle is full analyzed in a Zero Voltage Transition (ZVT) Boost power factor correction circuit. A double closed-loop circuit simulation model is put up, which is based on the SABER simulation software, and the dual closed-loop includes a...
GIS-Based Evaluating and Analysis for Farmland Fertility of Men-hai County
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Quan-Li Xu,Jun-Hua Yi,Kun Yang,Li-Yang Li
Issue Date:November 2012
pp. 373-377
Through using the ArcGIS software as the platform, and taking DEM analysis, raster calculation and spatial interpolation of spatial analysis technology as the core method, this paper selects Menghai County as the study area, combines with the Delphi method...
Multiple clustered instance learning for histopathology cancer image classification, segmentation and clustering
Found in: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Yan Xu, Jun-Yan Zhu,E. Chang, Zhuowen Tu
Issue Date:June 2012
pp. 964-971
Cancer tissues in histopathology images exhibit abnormal patterns; it is of great clinical importance to label a histopathology image as having cancerous regions or not and perform the corresponding image segmentation. However, the detailed annotation of c...
FBctlr - A Novel Approach for Storage Performance Virtualization
Found in: Computational Intelligence and Security, International Conference on
By Liu Liu,Zhen Han Liu,Lu Xu,Jun Wei Zhang
Issue Date:December 2011
pp. 268-272
I/O consolidation is a growing trend in production environments due to increasing complexity in tuning and managing storage systems. A consequence of this trend is the need to serve multiple users and/or workloads simultaneously. It is imperative to ensure...
Echo State Networks Based Method for Harmonic Extraction in Shunt Active Power Filters
Found in: Bio-Inspired Computing: Theories and Applications, International Conference on
By Jinbang Xu,Jun Yang,Feng Liu,Zhixiong Zhang,Anwen Shen
Issue Date:September 2011
pp. 135-139
With the wide use of power conversion devices, harmonic currents are being injected into the power grid. Shunt Active Power Filters (SAPF) is a power electronic device to compensate the harmonic currents caused by nonlinear loads. As the foundation of the ...
The Situation Analysis of the Network Public Opinion Based on the Variable-Weighted Choquet Fuzzy Integral
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Yan Su,Yujun Liu,Wenfeng Xu,Jun Wang
Issue Date:September 2011
pp. 219-225
In order to more accurately judge the influence the attributes of the public network opinion play on the situation of the public network opinion, this paper puts forward a method of situation analysis of the network public opinion which is based on the var...
A Study of MPSO-based PID Controller on Boiler Drum Water Level
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Han Wenhua, Xu Jun, Sun Jianpeng, Yang Ping, Ren Haixia
Issue Date:January 2011
pp. 275-278
In this paper, a modified particle swarm optimization (MPSO) was introduced for tuning the parameters of PID controller on boiler drum water level. Compared with basic particle swarm optimization (BPSO), MPSO enhances the searching ability, escapes particl...
A High-Confidence Cyber-Physical Alarm System: Design and Implementation
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Longhua Ma, Tengkai Yuan, Feng Xia, Ming Xu, Jun Yao, Meng Shao
Issue Date:December 2010
pp. 516-520
Most traditional alarm systems cannot address security threats in a satisfactory manner. To alleviate this problem, we developed a high-confidence cyber-physical alarm system (CPAS), a new kind of alarm systems. This system establishes the connection of th...
An Estimation of Distribution Algorithm Based Portfolio Selection Approach
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Rui-tian Xu, Jun Zhang, Ou Liu, Rui-zhang Huang
Issue Date:November 2010
pp. 305-313
A portfolio selection problem is about finding an optimal scheme to allocate a fixed amount of capital to a set of available assets. The optimal scheme is very helpful for investors in making decisions. However, finding the optimal scheme is difficult and ...
Research on Detector Generating Algorithm Based on Artificial Immune
Found in: Multimedia Information Networking and Security, International Conference on
By Zhen Liu, Su Xu, Jun Li
Issue Date:November 2010
pp. 452-455
The key of intrusion detection system based on artificial immune is generating the Detector set. To generate highly efficient one, we adopt the mutated Nonself-body set to generate candidate detectors and variable threshold R- continues bits matching rule ...
Second Order Duality in Vector Optimization Involving (F,alpha)-V-Type Functions
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Shuli Xu, Jun Jiang
Issue Date:October 2010
pp. 538-541
In this paper, we introduced a new class of generalized invex functions, called second order (F,α)-V-type function. And prove weak, strong, and strict converse duality theorems for Wolfe and Mond-Weir type vector optimization dual programs.
Matching Image with Multiple Local Features
Found in: Pattern Recognition, International Conference on
By Yudong Cao, Honggang Zhang, Yanyan Gao, Xiaojun Xu, Jun Guo
Issue Date:August 2010
pp. 519-522
In this paper, we present the fusional feature composed of Affine-SIFT, MSER and color moment invariants. The fusional feature is more robust and distinctive than a single local feature. Instead of adding three local features together simply, an efficient ...
Web QoS Control Using Fuzzy Adaptive PI Controller
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Fuquan Tian, Wenbo Xu, Jun Sun
Issue Date:August 2010
pp. 72-75
This paper researches on QoS (Quality of Service) control problems for web servers. A Fuzzy Adaptive PI Control system is proposed in this paper. Via a basic PI controller, the system can dynamically adjust the ratio of request-accepting time in a control ...
Microwave Dielectric Properties of Al-Substituted Forsterite Ceramics
Found in: Electrical and Control Engineering, International Conference on
By Song Kai-Xin, Xu Jun-Ming, Hu Xiao-Ping, Zheng Liang, Ying Zhi-Hua, Qin Hui-Bin
Issue Date:June 2010
pp. 5862-5864
In this paper, the nominal formula Mg2(SixAl1-x)O4-δ (x≤0.2) ceramics were synthesized by traditional solid phase reaction methods, and the phase evolution and microstructures of that were investigated by XRD and SEM. The testing results of XRD and SEM sho...
New Thoughts of Urban Power Network Planning which Building the Urban Power Network Structure System
Found in: Electrical and Control Engineering, International Conference on
By Yang Weihong, Xu Jun
Issue Date:June 2010
pp. 3601-3604
Urban power network structure planning is an important aspect of urban power network planning. In this paper, for adapting to the urban power requirements development of the new stage, the views which building the city power network structure system is put...
Optimization Models for Power Grid Expansion Cost Allocation Based on Cooperative Game Theory
Found in: Electrical and Control Engineering, International Conference on
By Xu Jun, Tan Zhongfu
Issue Date:June 2010
pp. 3953-3956
In this paper, the cost allocation methods for power grid investment are discussed in two conditions according to the benefit of each participant after the gird expansion. In the case that each player gets a net profit, Core and Nucleolus value concepts in...
Power Generation Exchange Optimization Model under Constrains of Energy-Saving and Emission-Reducing Among Regions
Found in: Electrical and Control Engineering, International Conference on
By Xu Jun, Tan Zhongfu
Issue Date:June 2010
pp. 5405-5408
Energy-saving and emission -reducing has become the strategic focus of China's economic development. Power generation industry, with characteristics of high energy consumption and high pollution, has great potential in energy-saving and emission- reducing ...
An Access Control Scheme for Mobile Agents System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Dawei Xu, Jun Lv
Issue Date:May 2010
pp. 457-460
Based on the security requirement of mobile agent system, especially for the access control problem, we study the characterister of present mobile agent system, and find out its limitation. Using the advantage of PKI/PMI, we introduced attribute certificat...
Research on Indication System and Appraisal Method of University Sustainable Development
Found in: Education Technology and Computer Science, International Workshop on
By Xu Jun
Issue Date:March 2010
pp. 597-600
On base of establishing the principle of indication system, this paper analyses the types and functions of sustainable development about university SPREET system, builds up indication system of university’s sustainable development, and explains the indicat...
The Research on the IP Parameters Extraction from MT Data
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wendong Xu, Jun Lin
Issue Date:March 2010
pp. 979-981
In polarized layer the formation resistivity is a complex number that depends on the frequency, but in conventional MT method the formation resistivity is usually considered as a real parameter that is independent of the frequency. Based on Dias model, Stu...
Intelligent Development and Implementation of Coal Enterprise Recycling Economy Application System
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Xu Jun
Issue Date:March 2010
pp. 497-500
The development of recycling economy in coal enterprise is man-machine system involving many industries, large range, omni directional and hierarchical support system, it provides information collection, information processing, information query and inform...
Cross-Document Coreference Resolution Based on Automatic Text Summary
Found in: International Workshop on Knowledge Discovery and Data Mining
By Sanyuan Gao, Si Li, Weiran Xu, Jun Guo
Issue Date:January 2010
pp. 306-309
Cross-document coreference resolution plays an import part in the filed of natural language processing (NLP). It captures the ability of gathering documents for information about a certain entity. Most previous algorithms identify the underlying entity of ...
Agile Manufacturing Model of Small and Medium-Sized Manufacturing Enterprises
Found in: Future Information Technology and Management Engineering, International Seminar on
By Xu Jun
Issue Date:December 2009
pp. 444-447
Through the actuality analysis of the medium and small-scale manufacturing industry production mode in our country, in which the agile manufacturing is implemented, the conclusion shows that it is very necessary for the medium and small-sized manufacturing...
A Modified System for Weblog Topic Relevance Retrieval
Found in: Future Information Technology and Management Engineering, International Seminar on
By Si Li, Lei Du, Weiran Xu, Jun Guo
Issue Date:December 2009
pp. 392-395
Weblog is widely used, and the number of users is increasing rapidly. Weblog reflects every aspect of the society, such as politics, economy and culture, so the topic relevance retrieval research on Weblog becomes necessary. Because of a lot of noise in th...
Research on Constructing Model of Enterprise Staff Loyalty
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Xu Jun
Issue Date:December 2009
pp. 517-520
The enterprise staff loyalty are very important for the development and survival of the enterprises, staff loyalty is an important indicator of measuring corporate governance, so it is particularly important to evaluate this indicator objectively. In this ...
Signal Integrity Research of High Speed Circuit of Embedded System
Found in: Frontier of Computer Science and Technology, Japan-China Joint Workshop on
By Kaihua Xu, Jun Zhou, Yuhua Liu, Shuyun Dong
Issue Date:December 2009
pp. 473-477
As clock frequencies increase, signal integrity problems becomes critical in electronic products design. It introduced signal integrity issues in brief and discussed an internal mechanism of crosstalk and reflection in details, using the EDA software Hyper...
Dynamic Connection and Coordinated Control Model of Mining Areas Social-Economic System
Found in: Computational Intelligence and Design, International Symposium on
By Xu Jun
Issue Date:December 2009
pp. 123-126
To confirm the coordination of all the industries development, production and environment pollution, the model of dynamic connection and coordinated control of industry development in Jiaozuo mining areas was constituted based on Logistic model. Runge-Kutt...
Vector Variational Control Problems with KT-invex
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Shuli Xu, Jun Jiang, Weiwei Ouyang
Issue Date:November 2009
pp. 223-226
In this paper, a generalization of convexity is considered in the case of vector variational control problems, we obtain several scalarization theorems for KT-invex variational control problems, and we generalize optimality results of known KT-invex contro...
Development of a Digital Vehicle Instrument System Based on In-Vehicle Network
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xu Jun, Li Gang-yan
Issue Date:October 2009
pp. 383-386
With the increase of the number and complexity of city bus Electronic Control Units, a flexible vehicle instrument system based on in-vehicle network with high reliability was designed and implemented on a new type of natural gas city bus. The instrument s...
An Approach for Fully Integrated Automation in Heterogeneous Industrial Control Network
Found in: Intelligent Computation Technology and Automation, International Conference on
By Li Gang-yan, Xu Jun
Issue Date:October 2009
pp. 7-10
An approach for fully integrated automation with Profibus and protocol conversion gateway is proposed and implemented within an industrial control network consisting of different kinds of devices, as there are several fieldbus subsystems and Ethernet segme...
A Comparative Study of Access Control Languages
Found in: Secure System Integration and Reliability Improvement
By Sathish Pinagapani, Dianxiang Xu, Jun Kong
Issue Date:July 2009
pp. 407-412
In this paper, we compare three open source access control languages, XACML, JAAS and Java ACL. In addition to a conceptual analysis, we use a web-based health care system as a common application, in which controlled access is implemented through each of t...
Distributed Collaborative Modeling Support System Associating UML Diagrams with Chat Messages
Found in: Computer Software and Applications Conference, Annual International
By Dongmei Xu, Jun Kurogi, Yoshihide Ohgame, Atsuo Hazeyama
Issue Date:July 2009
pp. 367-372
With the advancement of network technology and globalization of business, distributed software development has become in common. Along with this trend, distributed synchronous collaborative modeling support systems have been proposed. This study points out...
An Approach for Automated Safety Testing of Safety-Critical Software System Based on Safety Requirements
Found in: Information Technology and Applications, International Forum on
By Gang Yu, Zhong wei Xu, Jun wei Du
Issue Date:May 2009
pp. 166-169
Safety is a very important property for safetycritical software systems. We introduce an approach to test safety-critical software systems based on safety requirement by using model-based testing. The model is extracted from the safety requirement and syst...
Alarm Association Algorithms Based on Spectral Graph Theory
Found in: Artificial Intelligence, International Joint Conference on
By Qianfang Xu,Jun Guo
Issue Date:April 2009
pp. 320-323
currently those algorithms to mine the alarm association rules are limited to the minimal support, so that they can only obtain the association rules among the frequently occurring alarms. This paper proposes a new mining algorithm based on spectral graph ...
An Information Acquisition Method of City Bus Integrated Control Network
Found in: Computer Science and Information Engineering, World Congress on
By Li Gangyan, Xu Jun
Issue Date:April 2009
pp. 722-725
An information acquisition method based on in-vehicle network is presented to ensure the optimum matching between the control modules inside the city bus with different control functions to the whole control performance optimization. A special function mod...
 1  2 Next >>