Search For:

Displaying 1-50 out of 107 total
To Create Intelligent Adaptive Neuro-Controller of Game Opponent from UCT-Created Data
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Yiwen Fu, Si Yang, Suoju He, Jiajian Yang, Xiao Liu, Yang Chen, Donglin Ji
Issue Date:August 2009
pp. 445-449
Game AI controlled by UCT which achieves excellent performance in computer go can be applied to control non-player characters (NPCs) in video games. While, it is computation intensive algorithm, so applying it to on-line game is not suitable. But data coll...
Effects of Cadmium Stresses on Physiological Characteristics, Pod Yield and Seed Quality of Peanut
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Gao Fang,Gu Xue-Hua,Wei Tong-Tong,Sun Lian-Qiang,Lin Ying-Jie,Zhang Jia-Lei,Yang Chuan-Ting,Zhang Feng,Yang Xiao-Kang,Zhao Hua-Jian,Li Xiang-Dong
Issue Date:January 2013
pp. 655-661
A pot experiment was carried out to study the effects of different cadmium concentrations on peanut physiological characteristics, yield and quality using peanut cultivars of Yuhua 15 and XB 023. Five Cd concentrations [0.0 mg kg1 (CK), 1.0 mg kg1 (light C...
A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud
Found in: IEEE Transactions on Parallel and Distributed Systems
By Dong Yuan,Yun Yang,Xiao Liu,Wenhao Li,Lizhen Cui,Meng Xu,Jinjun Chen
Issue Date:June 2013
pp. 1234-1244
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy computation and data intensive applications without infrastructure investment, where large application data sets can be stored in the cloud. Based on the p...
Stochastic Event Capture Using Single Robot Moving along a Certain Track
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Xiannuan Liang, Yang Xiao, Nanxiang Li
Issue Date:December 2009
pp. 472-479
In this paper, we built a stochastic model that analyzes the intrusion detection quality achieved by a single moving sensor or robot moving along a certain track, based on velocity and mobility pattern. We consider the mode of intrusion events defined as f...
Design and Development of Network Course of Database Principle
Found in: Education Technology and Computer Science, International Workshop on
By Huai-zhen Yang, Ling-hua Li, Hong Yang, Xiao-qi Cong
Issue Date:March 2009
pp. 1055-1058
The article analyzes the web page, multimedia and database technologies basing on giving a minute description of four modules of the network course of database principle: course learning, exercise and test, teaching assistant and system management. Finally...
Integration of Existing Grid Tools in Sakai VRE
Found in: Grid and Cooperative Computing Workshops, International Conference on
By Xiaobo Yang, Xiao Dong Wang, Rob Allan, Matthew Dovey, Mark Baker, Rob Crouchley, Adrian Fish, Miguel Gonzalez, Ties van Ark
Issue Date:October 2006
pp. 576-582
The integration of existing Grid tools into the Sakai VRE (Virtual Research Environment) will be discussed in this paper. In particular we describe the integration of the business logic and JSR 168 compliant portlets through presentationoriented Web Servic...
A Complete and Rapid Feature Extraction Method for Face Recognition
Found in: Pattern Recognition, International Conference on
By Yu-jie Zheng, Jing-yu Yang, Jian Yang, Xiao-jun Wu, Dong-jun Yu
Issue Date:August 2006
pp. 469-472
Feature extraction is one of the key steps in face recognition. In this paper, common vector is used to extract features from null space of within-class scatter matrix, which is independent of the sample index in the same class and accelerates the speed of...
A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Wenlin Han,Wei Xiong,Yang Xiao,Magdy Ellabidy,Athanasios V. Vasilakos,Naixue Xiong
Issue Date:June 2012
pp. 640-646
Recently Network traffic anomaly detection has become a popular research tendency, as it can detect new attack types in real time. The real-time network traffic anomaly detection is still an unsolved problem of network security. The network traffic appears...
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Gaofeng Zhang,Yun Yang,Xiao Liu,Jinjun Chen
Issue Date:May 2012
pp. 458-465
Cloud computing promises an open environment where customers can deploy IT services in a pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers may exist. Such ser...
A Local-Optimisation Based Strategy for Cost-Effective Datasets Storage of Scientific Applications in the Cloud
Found in: Cloud Computing, IEEE International Conference on
By Dong Yuan,Yun Yang,Xiao Liu,Jinjun Chen
Issue Date:July 2011
pp. 179-186
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy computation and data intensive applications without infrastructure investment, where large application datasets can be stored in the cloud. However, due to...
Energy-Aware Loop Parallelism Maximization for Multi-core DSP Architectures
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Meikang Qiu, Jian-Wei Niu, Laurence T. Yang, Xiao Qin, Senlin Zhang, Bin Wang
Issue Date:December 2010
pp. 205-212
With the advance of semiconductor, multi-core architecture is inevitable in today's embedded system design. Nested loops are usually the most critical part in multimedia and high performance DSP (Digital Signal Processing) systems. Hence, maximizing loop p...
Effective classification image space which can solve small sample size problem
Found in: Pattern Recognition, International Conference on
By Yu-jie Zheng, Jing-yu Yang, Jian Yang, Xiao-jun Wu
Issue Date:August 2006
pp. 861-864
Linear Discriminant Analysis (LDA) is one of the most popular methods in feature extraction and dimension reduction. However, in many real applications, particularly in image recognition applications such as face recognition, conventional LDA algorithm wil...
Ballast Water Treatment by Using Porous Ceramic Filter and UV Radition Combination
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Xia-Zhang Man,Li Na,Mei-Wu Xiao,Yu Ran,Min-Zhu Yi,Dong-Yang Xiao
Issue Date:May 2012
pp. 1244-1246
Biological invasion of ballast water has been detected to be a great threat to marine ecosystem and human beings. However, so far less suitable method has been developed to obtain an effective, economic, safe, operational and clean onboard treatment method...
A Quantitative Study of Accountability in Wireless Multi-hop Networks
Found in: Parallel Processing, International Conference on
By Zhifeng Xiao, Yang Xiao, Jie Wu
Issue Date:September 2010
pp. 198-207
In this paper, we explore a quantitative approach to accountable wireless multi-hop networks. We propose using hierarchical P-Accountability to adapt the requirements of modeling a complex network environment and assess the degree of accountability in a fi...
TAGPP: A Tiny Aggregation Algorithm with Preprocessing in Local Cluster
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Yang Xiao-fei, Wu Xiao-bei, Huang Jin-an
Issue Date:April 2009
pp. 390-393
Hundreds or thousands of sensor nodes are deployed to WSNs (wireless sensor networks). They contribute to collect data in various environment, but with limited battery power. There are some deficiencies in WSNs. Many sensors share limited wireless channel ...
Independently-Controlled-Gate FinFET 6T SRAM Cell Design for Leakage Current Reduction and Enhanced Read Access Speed
Found in: 2014 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)
By Kaisheng Ma,Huichu Liu,Yang Xiao,Yang Zheng,Xueqing Li,Sumeet Kumar Gupta,Yuan Xie,Vijaykrishnan Narayanan
Issue Date:July 2014
pp. 296-301
In this paper, two novel 6T SRAM cells based on Independently-Controlled-Gate FinFETs are proposed. The new 6T cells are derived from 4T cells: by separating the read timing and read-line, the proposed new cells allow simultaneously read & write to...
Authentication and Access Control in the Internet of Things
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Jing Liu,Yang Xiao,C.L. Philip Chen
Issue Date:June 2012
pp. 588-592
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, i...
Towards Power-Efficient Smartphones by Energy-Aware Dynamic Task Scheduling
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Meikang Qiu,Zhi Chen,Laurence T. Yang,Xiao Qin,Bin Wang
Issue Date:June 2012
pp. 1466-1472
Smartphones are facing a grand challenge in extending their battery life to sustain an increasing level of processing demand while subject to miniaturized form factor. Dynamic Voltage Scaling (DVS) has emerged as a critical technique to leverage power mana...
A P2P-Based Worm in Next Gernation Network
Found in: Genetic and Evolutionary Computing, International Conference on
By Wei Yang, Xiao-meng Shen, Gui-ran Chang, Yu Yao
Issue Date:December 2010
pp. 418-421
In recent years, many IPv6 networks have been deployed, and the security issues of which arouse more and more public concern. It is commonly believed that IPv6 provides greater security against random-scanning worms by virtue of a very large address space....
The Analysis Research on Team Performance - Team Competitiveness Based on HM Theory
Found in: International Conference on E-Business and E-Government
By Zhi-guo Fan,Bo Fu,Qun Yang,Xiao-liang Zhang
Issue Date:May 2010
pp. 4727-4730
The high-performance team is gradually becoming an important resource for enterprises to compete in the market. Scholars have done some related studies on the factors affecting team performance, but they have not distincted the factors from the nature, nor...
The Study of Municipal Road Model Based on GML
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Jiao Dong-Lai, Zhang Shu-Liang, Lv Guo-Nian, Gao Hua-Lan, Yang Xiao-Li
Issue Date:December 2008
pp. 500-503
Different from the traditional road model, the model of road based on GML is adapt to the management fields on municipal road infrastructure. This article analyses the characteristic of the composing elements (road infrastructure) of road and the requireme...
Distributed Collaborative Control Using Wireless Sensor and Actuator Networks
Found in: Future Generation Communication and Networking
By Xianghui Cao, Jiming Chen, Yang Xiao, Youxian Sun
Issue Date:December 2008
pp. 3-6
Wireless sensor and actuator networks (WSANs) in which actuators perform actuation based on sensory information exhibit great potential in environment control, building automation, agriculture, etc. In this paper, we focus on the problem of designing contr...
On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Daisuke Takahashi, Xiaoyan Hong, Yang Xiao
Issue Date:December 2008
pp. 145-151
Because of easy accessible medium in wireless networks, use of these wireless networks in military applications poses several security issues. Likewise, in the business field, despite the emerging static wireless Internet access, the same security issues r...
Using Talking Heads for Real-Time Virtual Videophone in Wireless Networks
Found in: IEEE Multimedia
By Yang Xiao, Max H. Garzon, Michael Nolen
Issue Date:July 2006
pp. 78-84
Low bandwidth makes real-time video over wireless and mobile networks expensive and limits transmission length. An architecture that substitutes a person's face with a text-based facial vector description transmitted over a network in tandem with a voice s...
Differentiation, QoS Guarantee, and Optimization for Real-Time Traffic over One-Hop Ad Hoc Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yang Xiao, Yi Pan
Issue Date:June 2005
pp. 538-549
<p><b>Abstract</b>—Nodes having a self-centrically broadcasting nature of communication form a wireless ad hoc network. Many issues are involved to provide quality of service (QoS) for ad hoc networks, including routing, medium access, re...
Complex Function Approximation Using Two-Dimensional Interpolation
Found in: IEEE Transactions on Computers
By Dong Wang,Milos D. Ercegovac,Yang Xiao
Issue Date:December 2014
pp. 2948-2960
This paper presents a new scheme for evaluating complex reciprocal and exponential functions in hardware. The proposed method utilizes a two-dimensional convolution algorithm to interpolate bivariate functions from tabulated function values in the complex ...
A Scalable Implicit Solver for Phase Field Crystal Simulations
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Chao Yang,Xiao-Chuan Cai
Issue Date:May 2013
pp. 1409-1416
The phase field crystal equation (PFC) is a popular model for simulating micro-structures in materials science and is very computationally expensive to solve. A highly scalable solver for PFC modeling is presented in this paper. The equation is discredited...
The Calculation of the Punctuality Rate between Bus Sites Based on AVL Data
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Lin Nan-Nan,Yang Xiao-Guang,Zhou Xue-Mei,Xu Xu
Issue Date:January 2013
pp. 1150-1152
Nowadays, people pay more and more attention on the service quality of public transportation, as well as the research on situations of public transportation arrival on time. This article analyses the feature of AVL data from the GPS system on the bus and r...
Sample Pair Selection for Attribute Reduction with Rough Set
Found in: IEEE Transactions on Knowledge and Data Engineering
By Degang Chen,Suyun Zhao,Lei Zhang,Yongping Yang,Xiao Zhang
Issue Date:November 2012
pp. 2080-2093
Attribute reduction is the strongest and most characteristic result in rough set theory to distinguish itself to other theories. In the framework of rough set, an approach of discernibility matrix and function is the theoretical foundation of finding reduc...
Medical Image Mosaic Technology Based on Image Phase Correlation
Found in: 2012 4th International Conference on Digital Home (ICDH)
By Xu Jing,Yang Xiao Hong,Shao Xiang Xin,Meng Xian Ying
Issue Date:November 2012
pp. 274-277
Based on the medical image characteristic, this text has made the related improvement for the insufficiency which exists in image mosaic algorithm. It has used the method which unified iteration threshold value division and the canny edge examination opera...
Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Yang Xiao,Miao Peng,John Gibson,Geoffrey G. Xie,Ding-Zhu Du,Athanasios V. Vasilakos
Issue Date:October 2012
pp. 1538-1554
This paper investigates the fundamental performance limits of medium access control (MAC) protocols for particular multihop, RF-based wireless sensor networks and underwater sensor networks. A key aspect of this study is the modeling of a fair-access crite...
Optimal Pipeline Paging Load Balancing for Hierarchical Cellular Networks
Found in: IEEE Transactions on Mobile Computing
By Yang Xiao,Hui Chen,Mohsen Guizani,Hsiao-Hwa Chen
Issue Date:September 2012
pp. 1532-1544
We study load balancing of paging schemes for multitier hierarchical cellular networks, in which different tiers of cells overlay each other to provide multiple coverage in cellular service areas. Each mobile terminal (MT) can be paged in any tier of a mul...
Scalable Parallel Algorithms for Boundary Control of Thermally Convective Flows
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Haijian Yang,Xiao-Chuan Cai
Issue Date:May 2012
pp. 1387-1396
Optimal control of fluid flows is an important and computationally challenging problem. In this paper, we investigate the application of a class of parallel and fully coupled two-grid Lagrange-Newton-Krylov-Schwarz (LNKSz) algorithms for the boundary contr...
An Improved GPS Receiver Anti-jammer Algorithm Based on Space-time Adaptive Processing
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Yang Xiao-bo
Issue Date:March 2012
pp. 106-109
For the limited number of FIR filter taps, the frequency resolution and nulling of traditional space-time adaptive processor is poor. Traditional space-time adaptive processing algorithm can not suppress the Multiple narrowband jammer and the narrowband ja...
The Impact of Relational Embeddedness to Intellectual Property Risks in Industry-University-Institute Cooperation
Found in: Business Intelligence and Financial Engineering, International Conference on
By Yang Xiao,Yulan Huang
Issue Date:October 2011
pp. 175-179
In the information age, the pace of technological upgrading is faster. Industry-University-Institute Cooperation is becoming a new way of knowledge production and technology transfer as an important component of national innovation systems form. How to ach...
Social Attribute Based Web Service Information Publication Mechanism in Delay Tolerant Network
Found in: Computational Science and Engineering, IEEE International Conference on
By Jiuxin Cao,Liu Yang,Xiao Zheng,Bo Liu,Lei Zhao,Xudong Ni,Fang Dong,Bo Mao
Issue Date:August 2011
pp. 435-442
The intermittence of the connection between nodes and limited resources greatly impair the effectiveness of service information publication in Delay Tolerant Network (DTN). To overcome this problem, a multi-layer service information cooperative publication...
Using Rules and Data Dependencies for the Recovery of Concurrent Processes in a Service-Oriented Environment
Found in: IEEE Transactions on Services Computing
By Yang Xiao,Susan D. Urban
Issue Date:January 2012
pp. 59-71
This paper presents a recovery algorithm for service execution failure in the context of concurrent process execution. The recovery algorithm was specifically designed to support a rule-based approach to user-defined correctness in execution environments t...
Shipping Distribution Networks Short Circuit Selective Protection Method Base on Fast Recovery Power Breaker
Found in: Asia-Pacific Power and Energy Engineering Conference
By Feng Yang, Xiao-feng Zhang, Jing-wu Zhuang, Chao Dai
Issue Date:March 2011
pp. 1-5
Coverage Algorithm Based on Sensor Residual Energy for Sensor Network
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Weifeng Yang, Xiao Liu, Jin Zhang
Issue Date:December 2010
pp. 523-525
Aiming at the coverage problem, a new coverage algorithm is proposed based on residual energy of sensors in this paper. In the algorithm, it is unnecessary for sensors to know its geographic information. By exchanging some related information with its neig...
Research on Optical Air Chamber of Infrared Gas Sensor
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Yu Han, Ting Liang, Xu-jun Yang, Xiao-li Ren, Ya-fei Yin
Issue Date:September 2010
pp. 33-36
In this paper, design method of optical air chamber for infrared gas sensor is described in detail based on the principle of infrared absorption by gas molecule. IRL715 infrared light source and PYS3228 pyroelectric detector with double filters are adopted...
Methodology for Attitudes Precisely Testing of Rolling Projectiles
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Jun Liu, Jie Li, Wei Yang, Xiao-min Duan
Issue Date:September 2010
pp. 644-647
In order to precisely test attitudes of rolling projectiles by using inertial measurement system, a novel method of half-strap down inertial measurement is proposed in this paper. Its key thought is to make inertial measurement system not rotate with rolli...
Performance Comparison with Different Pulse Waveforms in Ultra-wideband Based Wireless Sensor Networks
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Wu Xuan-li, Lin Di, Yang Xiao-zong
Issue Date:September 2010
pp. 692-695
Recently approved IEEE 802.15.4a standard defines an ultra-wideband (UWB) based physical layer technique, and performance analysis of UWB systems shows that the pulse waveform will affect the received SINR when multipath interference, multiple access inter...
A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Jing He, Naixue Xiong, Yang Xiao, Yi Pan
Issue Date:June 2010
pp. 180-188
A critical aspect of applications in Wireless Sensor Networks (WSNs) is network lifetime. Power-constrained WSNs are usable as long as they can communicate sensed data to a processing node. Poor communication links and hazard environment make the WSNs unre...
Modeling Study on the Implementation of the VMI in a Two-Echelon Supply Chain
Found in: Computing, Control and Industrial Engineering, International Conference on
By Hong Jiang-tao, Yang Xiao-yan
Issue Date:June 2010
pp. 206-209
This paper studies the comparison of the profit generated among supply chain before and after the VMI model being implemented and the logistics costs lying in the enterprise supply chain system and the relevant linkages by setting up a two-echelon supply c...
Exploration on the Connotation of Management Honeypot
Found in: International Conference on E-Business and E-Government
By Li Hong-Xia,Wang Pu,Zhang Jian,Yang Xiao-Qiong
Issue Date:May 2010
pp. 1152-1155
The network honeypot technology is a new type of proactive defense technique in the network information security. This paper introduces the idea of honeypot in the network to the field of management and explores the concepts and functions of management hon...
Upper Bound on Network Utilization under Fair-Access in Multi-hop Wireless Grid Sensor Networks with 3-4 Rows
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Miao Peng, Yang Xiao
Issue Date:December 2009
pp. 244-251
In a typical wireless sensor network, one of the primary tasks of sensor nodes is to gather data and give accurate measurements of sensing environment. Thus, obtaining a fair amount of data from each sensor node plays a key role to achieve this objective. ...
Research on the Evolution of Supply Chain Based on SWARM
Found in: Computational Intelligence and Security, International Conference on
By Wenxue Niu, Yajuan Yang, Xiao Luo, Quanju Zhang
Issue Date:December 2009
pp. 292-295
Based on the CAS (complex adaptive system) theory, under the assumption that the supply chain’ s basic function is to maximize the profit, the paper aims to study the dynamic relationship between supply chain’ s individual behaviors and the evolution of it...
A Formal Method Based Case Study for Access Control
Found in: Computational Intelligence and Security, International Conference on
By Guoqi Li, Yang Xiao, Minyan Lu, Yuchao Zhang
Issue Date:December 2009
pp. 460-463
River crossing problem is a typical logic puzzle. In the puzzle, the members should cross from one river bank to another abide by some restrictions. This kind of puzzles can be seen as access control problems from the logical point of view. The analysis co...
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks
Found in: IEEE Transactions on Computers
By Yang Xiao, Hui Chen, Kui Wu, Bo Sun, Ying Zhang, Xinyu Sun, Chong Liu
Issue Date:April 2010
pp. 507-521
In wireless sensor networks, some sensor nodes are put in sleep mode while other sensor nodes are in active mode for sensing and communication tasks in order to reduce energy consumption and extend network lifetime. This approach is a special case (k=2) of...
Design Schemes Evaluation of Excavator Using Fuzzy Analytic Hierarchy Process
Found in: Intelligent Computation Technology and Automation, International Conference on
By Hua-Dong Yang, Xiao-Liang Fan
Issue Date:October 2009
pp. 442-445
In the conceptual design stage of excavator, there are many uncertain information so that the quantitative evaluation of design schemes is very difficult. Traditional AHP (analytic hierarchy process) method can’t deal with the multi-attribute problem with ...
 1  2 Next >>