Search For:

Displaying 1-50 out of 187 total
RDT Properties and Evaluations
Found in: Information Technology: New Generations, Third International Conference on
By Yulu Yang, Yang Yu
Issue Date:April 2006
pp. 239-244
Proposed for MPCs, RDT has already been proved to support better performances than most of the direct network, such as smaller diameter based on his vector routing algorithm, smaller degree, embedded mesh/torus topology, etc. It gives a network form method...
Evaluation of Breast Cancer Susceptibility Using Improved Genetic Algorithms to Generate Genotype SNP Barcodes
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Cheng-Hong Yang, Yu-Da Lin, Li-Yeh Chuang, Hsueh-Wei Chang
Issue Date:March 2013
pp. 361-371
Genetic association is a challenging task for the identification and characterization of genes that increase the susceptibility to common complex multifactorial diseases. To fully execute genetic studies of complex diseases, modern geneticists face the cha...
Fault-Tolerant Routing Algorithm for RDT Structure
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Yang Yu, Tao Li, Yulu Yang, Xiaoshe Dong
Issue Date:December 2005
pp. 248-255
RDT (Recursive Diagonal Torus) is a class of interconnection networks for massively parallel computers (MPCs). It consists of recursively structured mesh/torus connections. It has been proved that RDT supports better performances than most direct networks....
Mutagenic Primer Design for Mismatch PCR-RFLP SNP Genotyping Using a Genetic Algorithm
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics
By Cheng-Hong Yang, Yu-Huei Cheng, Cheng-Huei Yang, Li-Yeh Chuang
Issue Date:May 2012
pp. 837-845
Polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) is useful in small-scale basic research studies of complex genetic diseases that are associated with single nucleotide polymorphism (SNP). Designing a feasible primer pair is an ...
A Web-Based Parallel File Transferring System on Grid and Cloud Environments
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Chao-Tung Yang, Yu-Hsiang Lo, Lung-Teng Chen
Issue Date:September 2010
pp. 16-23
Formerly computer application development just develops in one computer with one application, if one user wants to use some application in other computer (e.g. a computer or device) then the computer or device must be deployed or reinstalled the applicatio...
Performance analysis of practical RDT interconnection networks with SINOMP
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Yang Yu, Yulu Yang
Issue Date:December 2005
pp. 516-523
RDT (Recursive Diagonal Torus) consisting of recursively structured mesh/torus connections is a class of interconnection networks for massively parallel computers (MPCs). RDT(2,2,1)/a is one of its practical structure. It is suitable for the practical para...
A RDT-Based Interconnection Network for Scalable Network-on-Chip Designs
Found in: Information Technology: Coding and Computing, International Conference on
By Yang Yu, Mei Yang, Yulu Yang, Yingtao Jiang
Issue Date:April 2005
pp. 723-728
The interconnection network plays an important role in the performance and energy consumption of a Network-on-Chip (NoC) system. In this paper, we propose a RDT(2,2,1)/α-based interconnection network for NoC designs. RDT(2,2,1)/α is constructed by recursiv...
Practical Routing and Torus Assignment for RDT
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Tao Li, Yang Yu, Peng Li, Jingpeng Xu, Xirong Ma, Yulu Yang
Issue Date:May 2004
pp. 30
The connection topology of the interconnection networks and the routing algorithm often dominate the system performance in MPCs. RDT has already been proved to be one of the best interconnection networks used in such systems. It supports smaller diameter a...
Diagnosis of Energy-Saving Potential and Optimized Measures for 600MW Supercritical Coal-Fired Power Units
Found in: Electrical and Control Engineering, International Conference on
By Ningling Wang, Yongping Yang, Zhiping Yang, Yu Wu
Issue Date:June 2010
pp. 3646-3649
Significant progress has been made in energy conservation and consumption reduction since the 11th Five-year Plan. 600MW-class thermal power units have become the main force in China's power mix. It is crucial to study the energy-saving potential, improve ...
(2D)2UDP: A New Two-Directional Two-Dimensional Unsupervised Discriminant Projection for Face Recognition
Found in: International Conference on Natural Computation
By Yong-zhi Li, Guang-ming He, Jing-yu Yang, Yu-ping Wang
Issue Date:October 2008
pp. 3-7
Based on manifold learning, a new feature extraction method is proposed for face recognition in the paper. The new method is called two-directional two-dimensional unsupervised discriminant projection ((2D)2UDP), which simultaneously works image matrix in ...
Research of Increase Gas Drainage Efficiency with Slotted Charge Blasting
Found in: Digital Manufacturing and Automation, International Conference on
By Ren-shu Yang, Ping-hu Wang, Guo-liang Yang, Yu-long Che
Issue Date:December 2010
pp. 174-177
Proposed the method of slot cartridge hole blasting to improve the efficiency of gas drainage. First, by the mean of numerical calculation, we conducted the two-dimensional simulation study on the X-shape-slotted charge blasting in the coal. It was found t...
Energy-Saving Analysis on Thermal System in 600MW Supercritical Coal-Fired Power Plants
Found in: Electrical and Control Engineering, International Conference on
By Yongping Yang, Yu Wu, Zhiping Yang, Ningling Wang, Gang Xu
Issue Date:June 2010
pp. 3701-3704
High-efficiency, energy-saving and environmentally friendly supercritical thermal power units are gradually becoming main stream in China. In this paper, an advanced energy system analysis method, specific consumption analysis, is used to examine the perfo...
QoS Constrained Grid Workflow Scheduling Optimization Based on a Novel PSO Algorithm
Found in: Grid and Cloud Computing, International Conference on
By Qian Tao, Huiyou Chang, Yang Yi, Chunqin Gu, Yang Yu
Issue Date:August 2009
pp. 153-159
Currently, computational grid, service grid and data grid are becoming richer and more complex. Grid infrastructure composed of heterogeneous resource is widely distributed, workflow scheduling problem in grid environment described by directed acrylic grap...
Block-Matched Based Scalable Video Coding
Found in: Information Processing, Asia-Pacific Conference on
By Yang Yang, Yu-Hua Peng, Yun-Xia Liu, Li-Xin Tang
Issue Date:July 2009
pp. 177-180
In this paper, the motion estimation technique used in video compression is extended to intra-frame coding of scalable video coding, for which we called it the Block-Matching based image compression. Using a small amount of sampled data in the spatial doma...
Research on the Sewer Inspection with Single Immersion Ultrasonic Probe and Rotating Planar Reflector
Found in: Information Science and Engineering, International Conference on
By Li-jian Yang, Ru-long Fu, Song-wei Gao, Yang Yu
Issue Date:December 2009
pp. 3693-3696
In order to make the sewerage pipelines play an important role in the drainage capacity and extend their service life span, it is necessary to inspect them regularly to estimate the possible existing leakage, corrosion, mud accumulation, and even collapse....
A DoS Attack Situation Visualization Method Based on Parallel Coordinates
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Ying-Jie Yang,Yu-Hua Liu
Issue Date:October 2012
pp. 340-344
DoS attack situation changed by many situation elements. To make it easier to network manager's awareness, a DoS attack situation visualization method based on Parallel Coordinates is proposed. In this method, node resource consumption is represented as th...
A Preventing Fraud Trust Model in P2P Networks
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Siming Liu,Yang Yu,Jiaxing Xu,Zhenguang Huang
Issue Date:May 2012
pp. 2305-2311
The existing trust models are not able to punish the concussive fraud in direct trust value and recommended trust value effectively. In the early stages of P2P networks, if some kinds of frauds are frequent in the meantime, the ability of trust model to pr...
A Keyword-based Video Summarization Learning Platform with Multimodal Surrogates
Found in: Advanced Learning Technologies, IEEE International Conference on
By Wen-Hsuan Chang,Jie-Chi Yang,Yu-Chieh Wu
Issue Date:July 2011
pp. 37-41
In general, video-based learning contains rich media information, but displaying an entire video linearly is time-consuming. As an alternative, video summarization techniques extract important content provides short but informative fragments. In this paper...
A Novel Chaotic Inertia Weight Particle Swarm Optimization for PCR Primer Design
Found in: Technologies and Applications of Artificial Intelligence, International Conference on
By Cheng-Hong Yang, Yu-Huei Cheng, Li-Yeh Chuang
Issue Date:November 2010
pp. 373-378
Many primer design methods have been proposed to provide feasible primer sets for performing polymerase chain reaction (PCR) experiments. However, the majority of these methods require a long time to obtain a feasible solution since large quantities of DNA...
A Time Exception Handling Algorithm of Temporal Workflow
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Ting Xie, Yang Yu, Guoshen Kuang
Issue Date:August 2009
pp. 641-646
Based on an analysis of related work about time exception in workflow, an algorithm for time exception handling of temporal workflow is presented in the paper. The algorithm is to meet the overall deadline of the case via an approach of cutting down the sl...
Genetic Algorithm for the Design of Confronting Two-Pair Primers
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Cheng-Hong Yang, Yu-Huei Cheng, Li-Yeh Chuang, Hsueh-Wei Chang
Issue Date:June 2009
pp. 242-247
Many single nucleotide polymorphisms (SNPs) genotyping techniques have been developed but most of them are expensive. Polymerase chain reaction with confronting two-pair primers (PCR-CTPP) is a restriction enzyme-free and economic genotyping but its primer...
A Service-Aware Home Networking System Based on OSGi
Found in: Innovative Computing ,Information and Control, International Conference on
By Chih-Yao Yang, Yu-Jen Chen, Hsu-Yang Kung, Chun-Hao Lin, Shin-Di Li
Issue Date:December 2009
pp. 1268-1272
In this paper, we propose an OSGi-based Serviceaware Home Networking System (SAHN), which coordinates the integrated heterogeneity of internet interfaces and provides the service information exchange between mobile appliances of home networking and Interne...
A Distributed Index Service for Peer-to-Peer VOD
Found in: 2012 IEEE 14th Int'l Conf. on High Performance Computing and Communication (HPCC) & 2012 IEEE 9th Int'l Conf. on Embedded Software and Systems (ICESS)
By Linchen Yu,Hai Jin,Yang Yu,Xiaofei Liao,Wembin Jiang
Issue Date:June 2012
pp. 202-207
In a P2P media streaming system, a centralized tracker server is always used to maintain the topology. However, sometimes the server becomes overloaded when too many clients are coming. Then, the response time is too long because of many frequent VCR opera...
Isolation of Four Diatom Strains from Tidal Mud toward Biofuel Production
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Yu Gao,Yang Yu,Junrong Liang,Yahui Gao,Qiaoqi Luo
Issue Date:May 2012
pp. 348-351
Development and utilization of bio-energy is an important way to relieve the pressure of global energy shortage. Biodiesel can be a focus of the bio-energy, because it is a cleaner-burning and renewable fuel. Micro algae have been considered to be an ideal...
Intelligent Irrigation System Based on Fuzzy Control
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Chuang Yu, Yi Wu, Yang Yu
Issue Date:October 2010
pp. 519-521
At present, many of China's rural farmland irrigation systems have some shortcoming. In this paper, the traditional control method of irrigation has been made some improvements. The traditional irrigation meter controller carries on the sampling to the out...
Knowledge Resources Integrated Model of Basic Scientific Research Achievements Based on Supernetwork
Found in: Business and Information Management, International Seminar on
By Yang Yu, Yanzhong Dang, Pengyuan Xu, Jiang Yu
Issue Date:December 2008
pp. 505-508
The efficient achievements management is much significance for the development of basic scientific research, and so all of the knowledge resources of achievements should be managed. In order to integrate the different types of knowledge resources of basic ...
VisDSI: Locality Aware I/O Solution for Large Scale Data Visualization
Found in: 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)
By Willie Ng,Yang Yu,Yongqing Zhu,Jun Wang,Samsudin Juniarto,Zhixiang Li,Jie Chen
Issue Date:December 2013
pp. 278-281
The computational science community is approaching petascale level simulations that will produce massive amount of datasets. While the computational power of supercomputers keep increasing, the I/O systems have not kept pace, resulting in a significant per...
Formal Specification and Runtime Detection of Dynamic Properties in Asynchronous Pervasive Computing Environments
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yiling Yang,Yu Huang,Jiannong Cao,Xiaoxing Ma,Jian Lu
Issue Date:August 2013
pp. 1546-1555
Formal specification and runtime detection of contextual properties is one of the primary approaches to enabling context awareness in pervasive computing environments. Due to the intrinsic dynamism of the pervasive computing environment, dynamic properties...
Research of the New Electronic Valve System with Quantitative Control
Found in: 2012 Third Global Congress on Intelligent Systems (GCIS)
By Fan Yang,Yu Wang
Issue Date:November 2012
pp. 274-277
In order to achieve the function of the quantitative control in a variety of flow systems, a new type of electronic valve with quantitative control is designed. The valve collects flow pulse signal from the impeller Hall flow sensor. STM32 chip is used to ...
Processes Optimization of Railway Coal Logistics Center of Eastward Coal Transportation from Xinjiang
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Yang Yu,Lin Wang
Issue Date:July 2012
pp. 622-625
Coal transportation from Xinjiang to the inland china is a strategic project to ensure Chinese energy safety. As the most important tache of coal logistics, the logistics centers play a very important role, and the operational processes in these centers mu...
A Study of Video-based Concordancer on Scene Classification
Found in: Advanced Learning Technologies, IEEE International Conference on
By Tz-Yung Fang,Jie-Chi Yang,Yu-Chieh Wu,Chi-Cheng Tsai
Issue Date:July 2011
pp. 78-82
Video-based concordancer can be used to provide a scenario that engage context information of studying novel words. Usually, a fixed number of contextual sentences are retrieved accompanying the keywords. However, there may be a lack of complete context fo...
The Research on Method of Detection for Three-Dimensional Temperature of the Furnace Based on BP Neural Network
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Yang Yu, Jinxing Chen
Issue Date:November 2010
pp. 438-441
In view of the variety of the changes of burning flame in large-scale boiler, in order to master the status of the furnace flame in real time. In this paper, it introduces the BP neural network absorb the basic method of flame-picture's temperature, to stu...
Study on Security Management Architecture for Sensor Network Based on Intrusion Detection
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Xi Peng, Zheng Wu, Debao Xiao, Yang Yu
Issue Date:April 2009
pp. 503-507
Wireless Sensor networks will play an important role in the next generation pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the communication protocols. These measures ar...
TEFE: A Time-Efficient Approach to Feature Extraction
Found in: Data Mining, IEEE International Conference on
By Li-Ping Liu, Yang Yu, Yuan Jiang, Zhi-Hua Zhou
Issue Date:December 2008
pp. 423-432
With the rapid evolution of internet applications, people all over the world are sharing pictures, videos and audios online, and thus, content-based analysis is often demanded. Test efficiency is crucial to the success of online information processing. One...
3D Simulation of Real-Time Infrared Scene Based on DSP
Found in: Computer Science and Software Engineering, International Conference on
By Yang Yu, Xinyi Tang, Haijiao Cai, Yuanlin Chen, Sili Gao
Issue Date:December 2008
pp. 915-918
Nowadays 3D simulation of Infrared scene is quite popular. Most of these simulations were realized on PC and under the help of many free or commercial 3D APIs or libraries. We carried out our simulation by a rendering engine written by ourselves, and imple...
Free-Form Annotation Tool for Collaboration
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Han-Zhen Wu, Stephen J. H. Yang, Yu-Sheng Su
Issue Date:June 2008
pp. 555-560
The people often establish taking notes on reading and browsing activities; hence annotation is being very important in human life in anytime and anywhere. We developed a free-form annotation tool for collaboration that provides a convenient way to create ...
Advanced human factors Process Failure Modes and Effects analysis
Found in: Reliability and Maintainability Symposium
By Mei Rong, Tingdi Zhao, Yang Yu
Issue Date:January 2008
pp. 365-370
Process Failure Mode and Effects analysis (PFMEA) is a technique to identify, analyze and evaluate the potential failure modes of a production process. The purpose is to suggest control measures to reduce the risk of the production process effectively.
Research on Dynamic Task Assignment in Grid Workflow System
Found in: Grid and Cooperative Computing Workshops, International Conference on
By Teng Zhang, Yang Yu, Zejian Lin, Yiyu Tang, Weibin Zhang
Issue Date:October 2006
pp. 235-242
Task assignment in grid workflow system should be designed to adapt well with the grid which allow people from different organizations to work together in the same workflow process. To ensure grid workflow systems could assign the task to the most suitable...
A Linux Kernel with Fixed Interrupt Latency for Embedded Real-Time System
Found in: Embedded Software and Systems, Second International Conference on
By Jian Yang, Yu Chen, Huayong Wang, Bibo Wang
Issue Date:December 2005
pp. 127-134
This paper proposes a linux 2.6.x hard real-time system on ARM MMU-less platform, and compares the performance of the new system to the original one. Traditionally, Linux is designed mainly for desktop and server applications, it focuses on the throughput ...
Incremental Mining of Frequent XML Query Patterns
Found in: Data Mining, IEEE International Conference on
By Yi Chen, Liang Huai Yang, Yu Guo Wang
Issue Date:November 2004
pp. 343-346
Recently, the discovering of frequent XML query patterns gains its focus due to its many applications in XML data management, and several algorithms have been proposed to discover frequent query patterns using the frequent structure mining techniques. In t...
Multi-Node Multicast in Three and Higher Dimensional Wormhole Tori and Meshes with Load Balance
Found in: Parallel Processing, International Conference on
By Ming-Hour Yang, Yu-Chee Tseng, Ming-Shian Jian, Chao Lin
Issue Date:August 2000
pp. 25
This paper considers the multi-node multicast problem in a multi-dimensional wormhole-routed torus/mesh, where there are an arbitrary number of source nodes each intending to multicast a message to an arbitrary set of destinations. This problem requires a ...
MemoIcon: using everyday objects as physical icons
Found in: ACM SIGGRAPH ASIA 2009 Art Gallery & Emerging Technologies: Adaptation (SIGGRAPH ASIA '09)
By Bing-Yu Chen, Hao-Hua Chu, Hung-Jung Lin, Kai-Yin Cheng, Ming-Yang Yu, Rong-Hao Liang, Rung-Huei Liang, Sy-Yen Kuo, Yu-Ming Chu
Issue Date:December 2009
pp. 78-78
MemoIcon increases productivity with a new interaction method based on pattern recognition and multi-touch techniques. It easily binds virtual information to everyday real objects and transforms them into physical icons that embody virtual tasks as tangibl...
Smart album: photo filtering by effect detections
Found in: ACM SIGGRAPH 2008 posters (SIGGRAPH '08)
By Bing-Yu Chen, Ken-Yi Lee, Ming Ouhyoung, Ming-Yang Yu, Yu Liang
Issue Date:August 2008
pp. 110-110
The integration of virtual renderings into video images is of great importance for many applications of computer graphics such as TV and movie production and augmented reality. This submission proposes and examines methods for a smooth transition from real...
Hand-shadow illusions and 3D DDR based on efficient model retrieval
Found in: ACM SIGGRAPH 2006 Emerging technologies (SIGGRAPH '06)
By Bing-Yu Chen, Chung-Lin Wen, Ding-Yun Chen, Jean Y. C. Tsai, Jen-Yuan Chiang, Jeng-Sheng Yeh, Li-Fong Lin, Liang-Kai Wang, Ming Ouhyoung, Ming-Yang Yu, Ting-Hao Huan, Yung-Yu Chuang
Issue Date:July 2006
pp. 13-es
The Embossed Touch Display is a novel tactile display that can present any given width of objects. When we touch objects in space, we actively move our hands and fingers. Due to this active touch movement, we can perceive the shape of an object, even thoug...
Hand-shadow illusions and 3D DDR based on efficient model retrieval
Found in: Material presented at the ACM SIGGRAPH 2006 conference (SIGGRAPH '06)
By Bing-Yu Chen, Chung-Lin Wen, Ding-Yun Chen, Jean Y. C. Tsai, Jen-Yuan Chiang, Jeng-Sheng Yeh, Li-Fong Lin, Liang-Kai Wang, Ming Ouhyoung, Ming-Yang Yu, Ting-Hao Huan, Yung-Yu Chuang
Issue Date:July 2006
pp. 13-es
The Embossed Touch Display is a novel tactile display that can present any given width of objects. When we touch objects in space, we actively move our hands and fingers. Due to this active touch movement, we can perceive the shape of an object, even thoug...
Automated analysis of interactional synchrony using robust facial tracking and expression recognition
Found in: 2013 10th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2013)
By Xiang Yu,Shaoting Zhang,Yang Yu,Norah Dunbar,Matthew Jensen,Judee K. Burgoon,Dimitris N. Metaxas
Issue Date:April 2013
pp. 1-6
In this paper, we propose an automated, data-driven and unobtrusive framework to analyze interactional synchrony. We use this information to determine whether interpersonal synchrony can be an indicator of deceit. Our framework includes a robust facial tra...
Exploiting online music tags for music emotion classification
Found in: ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
By Homer H. Chen, Yi-Hsuan Yang, Yi-Hsuan Yang, Yu-Ching Lin, Yu-Ching Lin
Issue Date:October 2011
pp. 1-16
The online repository of music tags provides a rich source of semantic descriptions useful for training emotion-based music classifier. However, the imbalance of the online tags affects the performance of emotion classification. In this paper, we present a...
A Botnet-Oriented Collaborative Defense Scheme Description Language
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Liming Huan,Yang Yu,Liangshuang Lv,Shiying Li,Chunhe Xia
Issue Date:December 2013
pp. 653-657
Botnets are one of the most serious threats to Internet security. Isolated and single point security defense technologies can't effectively counteract large-scale, distributed botnet attacks, such as Spamming and Distributed Denial of service attack. Colla...
Effective Team Formation in Workflow Process Context
Found in: 2013 International Conference on Cloud and Green Computing (CGC)
By Shangquan Lin, Zilong Luo, Yang Yu, Maolin Pan
Issue Date:September 2013
pp. 508-513
With the purpose of improving the efficiency to accomplish a business process, how to form a multi-role collaborative team is a valuable research in the field of workflow. In this paper, based on the information about personal expertise and handover relati...
Rational Secret Sharing Information -- Theoretically Secure against Adaptive Adversaries
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yang Yu, Zhanfei Zhou
Issue Date:July 2013
pp. 249-256
Most rational secret sharing protocols aim to achieve a more appealing equilibrium or resist adversaries. However, all previous protocols achieve resilience against irrational adversaries at the cost of inducing a weak guarantee of Nash equilibrium survivi...
 1  2 Next >>