Search For:

Displaying 1-50 out of 152 total
Notice of Retraction Integration of a Water Balance Model with a Decision Support Tool in the Loess Plateau of China
Found in: 2009 International Forum on Information Technology and Applications (IFITA)
By Hongming Zhang, Rui Li, Qinke Yang,T.R. McVicar, Lingtao Li, Qingrui Liu, Yang Zhang, Quanzhong Liu
Issue Date:May 2009
pp. 727-731
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
 
Research on Distributed E-Commerce System Architecture
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Xia Yang, Zhang Qiang, Xu Zhao, Zhang Ling
Issue Date:August 2007
pp. 821-825
A new distributed E-Commerce architecture is put forward in this paper on the careful analysis of the existing shortcomings of the architecture of the present E-Commerce system. Different from the traditional E-Commerce system, the architecture makes a ful...
 
HMM-Based Online Recognition of Handwritten Chemical Symbols
Found in: Document Analysis and Recognition, International Conference on
By Yang Zhang, Guangshun Shi, Jufeng Yang
Issue Date:July 2009
pp. 1255-1259
In this paper, we present an online handwritten recognition method for Chemical Symbols, a widely used symbol in education and academic interactions. This method is based on Hidden Markov Models (HMMs), which are increasingly being used to model characters...
 
Using First Order Logic to Reason about TCG's TPM Specification
Found in: Information Technology and Applications, International Forum on
By Yang Yang, Zhang Huanguo, Xu Shiwei, Zhang Fan
Issue Date:May 2009
pp. 259-263
Trusted Platform Module (TPM) provides the cryptographic functions through the Application Programming Interfaces (APIs). The specification of APIs reflects the security policies of the designers, in order to manage and protect the sensitive information of...
 
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
Found in: IEEE Transactions on Computers
By Jing Liu,Qiong Huang,Bo Yang,Yang Zhang
Issue Date:August 2013
pp. 1656-1672
When assigning personal keys, stateful multicast key distribution (MKD) protocols usually rely on some type of dynamic group access structure which helps achieve a better tradeoff among storage, communication, and computation overheads. However, there exis...
 
Droplet: A Distributed Solution of Data Deduplication
Found in: 2012 13th IEEE/ACM International Conference on Grid Computing (GRID)
By Yang Zhang,Yongwei Wu,Guangwen Yang
Issue Date:September 2012
pp. 114-121
Creating backup copies is the most commonly used technique to protect from data loss. In order to increase reliability, doing routinely backup is a best practice. Such backup activities will create multiple redundant data streams which is not economic to b...
 
An Upsampling Approach to Subpixel Registration Based on Gray Scale Projection
Found in: 2012 Third International Conference on Digital Manufacturing and Automation (ICDMA)
By Yang Yang,Zhang Zhilong,Xu Xin,Sun ZhaoLin
Issue Date:July 2012
pp. 210-213
In order to realize high-precision image registration, a subpixel registration algorithm based on gray scale projection is presented. In traditional gray scale projection algorithm, sum of absolute difference is used to perform the correlation process wher...
 
High-Dimensional Statistical Distance for Object Tracking
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Yang Zhang, Shufan Ye, Yang Xiang, Liqun Gao
Issue Date:March 2010
pp. 386-389
This paper deals with object tracking in the video sequences. The goal is to determine in successive frames the object which best matches. So we used the similar measure between the reference object and candidate object can be distinguished: Relying on the...
 
Image Semantics Recognition Based on Ontology and Description Logics
Found in: Multimedia Information Networking and Security, International Conference on
By Chuan-yun Xu, Dan Yang, Yang Zhang
Issue Date:November 2009
pp. 33-36
Aimed at the lack of methods to describe image semantics and map low level semantics to high level semantics, Hierarchy Model of Image Semantic is designed to extract image features from inherent information and stratify image semantics according to abstra...
 
A New Algorithm for Designing Square Root Calculators Based on FPGA with Pipeline Technology
Found in: Hybrid Intelligent Systems, International Conference on
By Xiumin Wang, Yang Zhang, Qiang Ye, Shihua Yang
Issue Date:August 2009
pp. 99-102
After analyzing the advantages and disadvantages of all the general algorithms adopted now in designing square root calculators on FPGA chips with pipeline technology, a new algorithm is proposed based on the relationship between increment and remainder an...
 
Improving the Performance of Topic Tracking System by Ensemble
Found in: Computer Science and Software Engineering, International Conference on
By Xiangju Qin,Yang Zhang
Issue Date:December 2008
pp. 316-320
The aim of topic tracking is to monitor the stream of news stories to find additional stories on a topic that was identified by several sample stories. In this paper, we adopt majority voting to ensemble several topic tracking systems. The experiment resul...
 
Scalable Grid Application Scheduling via Decoupled Resource Selection and Scheduling
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Yang Zhang, Anirban Mandal, Henri Casanova, Andrew A. Chien, Yang-Suk Kee, Ken Kennedy, Charles Koelbel
Issue Date:May 2006
pp. 568-575
Over the past years grid infrastructures have been deployed at larger and larger scales, with envisioned deployments incorporating tens of thousands of resources. Therefore, application scheduling algorithms can become unscalable (albeit polynomial) and th...
 
Research on Semantic Decision Support System
Found in: Computer Science and Information Engineering, World Congress on
By Xiang Yang, Zhang Bo, Zhang Bei
Issue Date:April 2009
pp. 687-691
To resolve inefficiencies in traditional Decision Support System (DSS) as the lack of semantic representation and imperfections of software computing environments, we proposed a Semantic Decision Support System (SDSS). Based on traditional DSS, SDSS expand...
 
A SVM-HMM Based Online Classifier for Handwritten Chemical Symbols
Found in: Pattern Recognition, International Conference on
By Yang Zhang, Guangshun Shi, Kai Wang
Issue Date:August 2010
pp. 1888-1891
This paper presents a novel double-stage classifier for handwritten chemical symbols recognition task. The first stage is rough classification, SVM method is used to distinguish non-ring structure (NRS) and organic ring structure (ORS) symbols, while HMM m...
 
A Heterogeneous Auto-offloading Framework Based on Web Browser for Resource-Constrained Devices
Found in: Internet and Web Applications and Services, International Conference on
By Yang Zhang, Xue-tao Guan, Tao Huang, Xu Cheng
Issue Date:May 2009
pp. 193-199
Web applications are becoming increasingly popular. More and more types of multimedia data have been embedded into web pages for providing abundant information and user interface. However, these complex web pages could not be smoothly presented on devices ...
 
Mining Sequential Association-Rule for Improving WEB Document Prediction
Found in: Computational Intelligence and Multimedia Applications, International Conference on
By Yong Wang, Zhanhuai Li, Yang Zhang
Issue Date:August 2005
pp. 146-151
Currently, researchers have proposed several sequential association-rule models for predicting the next HTTP request. These researches focus on using sequence and temporal constrains for pruning to improve prediction precision. In this paper, we provide a ...
 
Effects of Low Power 2450MHz Magnetic Field on Characteristics of Delayed Rectifier Potassium Current of Cortical Neurons
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Yang Zhang,Yu Zheng,Jinhai Wang,Zizhao Zhang,Yue Wei,Gengbo Liu
Issue Date:May 2012
pp. 1019-1021
Acutely isolated rats cortical neurons were exposed to 2450MHz radio frequency (RF) magnetic field, and the characteristics of delayed rectifier potassium channel were studied using the whole-cell patch-clamp technique. The 2450MHz RF magnetic field was ob...
 
A Fast Target Tracking Algorithm Based on Wavelet Transformation and Kalman Filter
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Zhang Zhuo, Meng Yang, Zhang Bo-Yue, Zhang Xue-Wu
Issue Date:October 2010
pp. 99-102
Directing against the huge amounts of calculation for traditional target tracking, a fast target tracking algorithm based on image correlation matching is proposed in this paper. Firstly, for the continuity of movement target in the real-time image sequenc...
 
Implementing and Testing Producer-Consumer Problem Using Aspect-Oriented Programming
Found in: Information Assurance and Security, International Symposium on
By Yang Zhang, Jingjun Zhang, Dongwen Zhang
Issue Date:August 2009
pp. 749-752
Producer-Consumer problem is a classical and representative synchronization problem in the field of computer science, which can be implemented by object-oriented programming language. However, the implementation of object-oriented programming often leads t...
 
Convergence Analysis of Graph Regularized Non-Negative Matrix Factorization
Found in: IEEE Transactions on Knowledge and Data Engineering
By Shangming Yang, Zhang Yi, Mao Ye, Xiaofei He
Issue Date:September 2014
pp. 1-1
Graph regularized non-negative matrix factorization (NMF) algorithms can be applied to information retrieval, image processing, and pattern recognition. However, challenge that still remains is to prove the convergence of this class of learning algorithms ...
 
An Optimizing Strategy Research of LDPC Decoding Based on GPGPU
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Luechao Yuan, Zuocheng Xing, Yang Zhang, Xiaobao Chen
Issue Date:July 2013
pp. 1901-1906
As powerful error correcting codes, Low-Density Parity-Check (LDPC) codes have been adopted as a fundamental building block by dirty paper coding (DPC), which indicates that lossless precoding is theoretically possible at any signal-to-noise ratio (SNR), a...
 
Adaptive Graph Cut Based Binarization of Video Text Images
Found in: Document Analysis Systems, IAPR International Workshop on
By Cunzhao Shi,Baihua Xiao,Chunheng Wang,Yang Zhang
Issue Date:March 2012
pp. 58-62
Interactive image segmentation which needs the user to give certain hard constraints has shown promising performance for object segmentation. In this paper, we consider characters in text image as a special kind of object, and propose an adaptive graph cut...
 
Optimizing Network I/O Virtualization with Efficient Interrupt Coalescing and Virtual Receive Side Scaling
Found in: Cluster Computing, IEEE International Conference on
By Yaozu Dong,Dongxiao Xu,Yang Zhang,Guangdeng Liao
Issue Date:September 2011
pp. 26-34
Virtualization is a fundamental component in cloud computing because it provides numerous guest VM transparent services, such as live migration, high availability, rapid checkpoint, etc. However, I/O virtualization, particularly for network, is still suffe...
 
A Method to Generate Verification Condition Generator
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Zhaopeng Li,Yang Zhang,Yiyun Chen
Issue Date:August 2011
pp. 239-242
We propose a method to generate certain verification condition generators (VCGens, for short) automatically to be used in certifying compilers or other verification tools in this paper, to alleviate the burden of developing various kinds of VCGens in the d...
 
Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios
Found in: Cloud Computing, IEEE International Conference on
By Yang Zhang,Jun-Liang Chen
Issue Date:July 2011
pp. 760-761
With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect sensitive informatio...
 
The Protocol of Physical Layer for Underwater Acoustic Network
Found in: Computer Modeling and Simulation, International Conference on
By Yu Yang, Zhang Xiaomin, Peng Bo, Xiang Jinglin, He Ke
Issue Date:January 2010
pp. 346-350
The application of time reversal technique in the underwater acoustic communication can significantly reduce the inter-symbol interference (ISI) caused by multi-path propagation, and increase the communication data rate by means of use multi-path propagati...
 
Economic Control Based on Four-Element Connection Numbers Control
Found in: Computational Intelligence and Security, International Conference on
By Yang Zhang, ZhongXiong He
Issue Date:December 2009
pp. 1-5
The market economic system is a large complex system. In this paper, we define Four-Element Connection Numbers Control which combines Set Pair Analysis, Extension Methods, etc, applies to economic control, which is efficient and accurate response to the st...
 
From Sequential Patterns to Structural Relation Patterns
Found in: Scalable Computing and Communications; International Conference on Embedded Computing, International Conference on
By Weiru Chen, Yang Zhang, Shanshan Chen, Funan Peng, Jing Lu
Issue Date:September 2009
pp. 148-153
As an important branch of data mining, sequential patterns mining has been extensively studied. Based on sequential patterns mining, Structural Relation Patterns (SRPs) mining is proposed for mining relations among sequences, these relations are generally ...
 
Study on Price-Driven Load Balance in Wireless Sensor Network
Found in: Information Engineering, International Conference on
By Zhong Hui, Qian Zhi-hong, Sun Da-yang, Zhang Ding-guo
Issue Date:July 2009
pp. 355-358
In this paper, a kind of price-driven load balancing assignment mechanism in wireless sensor network is proposed. A logic price function is set for each node, which serves as a reference for the assignment of data traffic when the node is selecting a route...
 
Efficient Estimation of Multiple Illuminant Directions Using C-means Clustering and Self-correction for Augmented Reality
Found in: Computer and Information Science, ACIS International Conference on
By Jintao Ma, Ya Zhou, Qun Hao, Yang Zhang
Issue Date:June 2009
pp. 1106-1110
This paper presents a novel method to estimate multiple illuminant directions from a single image in augmented reality system. A square marker is used for 2D-3D registration, and a mirror sphere with known size is employed to detect light sources. Highligh...
 
One-Class Classification of Text Streams with Concept Drift
Found in: Data Mining Workshops, International Conference on
By Yang Zhang, Xue Li, Maria Orlowska
Issue Date:December 2008
pp. 116-125
Research on streaming data classification has been mostly based on the assumption that data can be fully labelled. However, this is impractical. Firstly it is impossible to make a complete labelling before all data has arrived. Secondly it is generally ver...
 
A Novel Encryption Algorithm Based on Shifting and Exchanging Rule of Bi-column Bi-row Circular Queue
Found in: Computer Science and Software Engineering, International Conference on
By Suli Wu, Yang Zhang, Xu Jing
Issue Date:December 2008
pp. 841-844
After analyzing the defect of two physical encryption algorithms, in this paper, we propose the principal of a novel matrix scrambling algorithm, which is based on shifting and exchanging rule of bi-column bi-row circular queue. We give our detailed analys...
 
Empirical Research on Sustainable Development of Industrial Cluster
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Hui Li, Yang Zhang
Issue Date:November 2008
pp. 553-558
Because of the inter-reacted relationship between enterprises in industrial cluster is quite similar with that of biotic community, this paper made use of ecological theory and method to establish the mathematic model of competition and cooperation among e...
 
An Improved CURD Algorithm for Source Code Mining
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Yangyang Liu, Yang Zhang
Issue Date:October 2008
pp. 335-339
Source code mining algorithm should have the ability to cope with large volume of data and nominal attributes, which are two major characteristics of source code dataset. K-means algorithm is not suitable for clustering source code as it is generally diffi...
 
Extracting Positive and Negative Association Classification Rules from RBF Kernel
Found in: Convergence Information Technology, International Conference on
By Quanzhong Liu,Yang Zhang,Zhengguo Hu
Issue Date:November 2007
pp. 1285-1291
Recently, building associative classifiers by miming association rules is a hot research problem. As negative association rules also help to understand the data, in this paper, we present our InterRBF algorithm, which expands RBF kernel into its Maclaurin ...
 
Method of Quotient Space
Found in: Semantics, Knowledge and Grid, International Conference on
By Li Yang, Zhang Ling, Gao Ning, Ma YuBao, Xu GaoJian
Issue Date:October 2007
pp. 286-289
This paper applies the method of observing, abstracting, problem-solving that the mankind uses in different levels of granularity in real world to the computer network routing. The authors discuss the improved OSPF routing algorithm using the granular comp...
 
Trust Based Secure Localization in Wireless Sensor Networks
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Ting Zhang,Jingsha He,Yang Zhang
Issue Date:October 2011
pp. 55-58
Secure localization in wireless sensor networks (WSNs) has received a great deal of attention with the increasing applications of wireless sensors. Security issues of localization in WSNs need to take into account attacks from both external and internal no...
 
Multiple Instance Learning Based Method for Similar Handwritten Chinese Characters Discrimination
Found in: Document Analysis and Recognition, International Conference on
By Yunxue Shao,Chunheng Wang,Baihua Xiao,Rongguo Zhang,Yang Zhang
Issue Date:September 2011
pp. 1002-1006
This paper proposes a Multiple Instance Learning based method for similar handwritten Chinese characters discrimination. The similar handwritten Chinese characters recognition problem is first defined as a Multiple-instance learning problem. Then the probl...
 
New Theory of Extended Coherency for Power System Based on Method of Coherency in Differential Geometry
Found in: Asia-Pacific Power and Energy Engineering Conference
By Xinzhou Du, Yang Zhang, Qionglin Li, Yi Xiong, Xiaopeng Yu, Xiaodong Zhang
Issue Date:March 2011
pp. 1-6
NA
 
Design and Implementation for Communication Component Based Open Multimedia Conferencing Web Service over IP
Found in: Web Services, IEEE International Conference on
By Bo Cheng, Yang Zhang, Xiaoxiao Hu, Shicheng Zhang, Junliang Chen
Issue Date:July 2010
pp. 695-696
Recent advances in Web services have made it practical to provide communication Web services to enable communication through SOA and package communication capability as services. This paper provides an appropriate implementation to deliver the multimedia c...
 
Aspect-oriented modeling and mapping driven by Model Driven Architecture
Found in: Computer Science and Information Technology, International Conference on
By Jingjun Zhang,Yuejuan Chen,Yang Zhang,Hui Li
Issue Date:August 2009
pp. 180-184
Model Driven Architecture (MDA) is a development methodology taking model as center, which is initiated by the Object Manage Group. Based on UML and other standard etc, MDA can create highly abstract model that will be understood by computer. These models ...
 
Resolving Synchronization and Analyzing Based on Aspect-Oriented Programming
Found in: Computer Science and Computational Technology, International Symposium on
By Yang Zhang, Jingjun Zhang, Yuejuan Chen, Qiaoling Wang
Issue Date:December 2008
pp. 34-37
Synchronization is an important problem in the design and development of the software, which has been resolved in the object-oriented programming (OOP). However, the implementation of OOP is easy to leads to code-tangling and code-scattering between functi...
 
Aspect-Oriented Requirements Modeling
Found in: Software Engineering Workshop, Annual IEEE/NASA Goddard
By Jingjun Zhang, Furong Li, Yang Zhang
Issue Date:March 2007
pp. 35-40
Aspect-Oriented Programming (AOP) can effectively solve the code-tangling and code-scattering which are caused by crosscutting attributes. However, much work is presented on the programming and the implementation phase, and few works have addressed the ear...
 
Liquid: A Scalable Deduplication File System for Virtual Machine Images
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xun Zhao,Yang Zhang,Yongwei Wu,Kang Chen,Jinlei Jiang,Keqin Li
Issue Date:May 2014
pp. 1257-1266
A virtual machine (VM) has been serving as a crucial component in cloud computing with its rich set of convenient features. The high overhead of a VM has been well addressed by hardware support such as Intel virtualization technology (VT), and by improveme...
 
Refining the Pointer Analysis by Exploiting Constraints on the CFL-Paths
Found in: 2013 20th Asia-Pacific Software Engineering Conference (APSEC)
By Xiaoshan Sun,Liang Cheng,Yang Zhang,Yi Deng,Jingbiao Hou
Issue Date:December 2013
pp. 17-24
The pointer analysis finds out what a pointer points to in a program. This analysis is useful in static program analysis, bug detection, source navigations and so on. We propose an approach to generate new constraints for one points-to and we use the const...
 
An Energy Efficiency Trusted Dynamic Routing Protocol for Wireless Sensor Networks
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Zhou Quan,Daixian Wu,Deqin Xiao,Yang Zhang,Chunming Tang
Issue Date:September 2013
pp. 329-334
Wireless Sensor Networks (WSNs) consists of a large number of low-power, limited-processing and limited-storage sensors, which is applied for all kinds of areas. In the paper, we introduce an energy efficiency trusted dynamic routing protocol for wireless ...
 
An Energy Efficiency Trusted Dynamic Routing Protocol for Wireless Sensor Networks
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Zhou Quan,Daixian Wu,Deqin Xiao,Yang Zhang,Chunming Tang
Issue Date:September 2013
pp. 329-334
Wireless Sensor Networks (WSNs) consists of a large number of low-power, limited-processing and limited-storage sensors, which is applied for all kinds of areas. In the paper, we introduce an energy efficiency trusted dynamic routing protocol for wireless ...
 
Adaptive Scene Text Detection Based on Transferring Adaboost
Found in: 2013 12th International Conference on Document Analysis and Recognition (ICDAR)
By Song Gao,Chunheng Wang,Baihua Xiao,Cunzhao Shi,Yang Zhang,Zhijian Lv,Yanqin Shi
Issue Date:August 2013
pp. 388-392
Detecting text in scene images is very challenging due to complex backgrounds, various fonts and different illumination conditions. Without prior knowledge, a detector previously trained using lots of samples still perform badly on a test image because of ...
 
Pseudo-Three-Dimensional Navigation in Helical Scan Security Inspection
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Li Bin,Li Baolei,Mo Yang,Zhang Yaojun
Issue Date:July 2013
pp. 838-841
In order to solve the navigation problem in x-ray security inspection, a stereoscopic visualization method is proposed in this paper. By analyzing the geometric relations between x-ray generator, detector and baggage on conveyor belt, a data reorganization...
 
A HSV-SILTP Based Shadow Suppression Approach for Moving Vehicle Extraction
Found in: 2013 Seventh International Conference on Image and Graphics (ICIG)
By Yang Zhang,Huazhong Xu,Man Luo
Issue Date:July 2013
pp. 846-851
This paper introduces a real-time method to extract vehicles in road environment, and mainly includes four parts as follows: firstly, using Double Level background learning method to obtain a stable background image and get a rough vehicle area. Secondly, ...
 
 1  2 Next >>