Search For:

Displaying 1-31 out of 31 total
Time Synchronization Method Based on Dynamic Network and Its Application in Substation Automation System
Found in: Electrical and Control Engineering, International Conference on
By Na Yi, Yawen Yi, Peng He
Issue Date:June 2010
pp. 2475-2477
The traditional time synchronization algorithms based on the Network Time Protocol (NTP) obtain accurate time synchronization on the assumption that the round-trip delay is equal. A highly precise time synchronization method is preposed, which process the ...
 
Decomposable Nonlocal Tensor Dictionary Learning for Multispectral Image Denoising
Found in: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
By Yi Peng,Deyu Meng,Zongben Xu,Chenqiang Gao,Yi Yang,Biao Zhang
Issue Date:June 2014
pp. 2949-2956
As compared to the conventional RGB or gray-scale images, multispectral images (MSI) can deliver more faithful representation for real scenes, and enhance the performance of many computer vision tasks. In practice, however, an MSI is always corrupted by va...
 
Constructing a Novel Chinese Readability Classification Model Using Principal Component Analysis and Genetic Programming
Found in: 2012 IEEE 12th International Conference on Advanced Learning Technologies (ICALT)
By Yi-Shian Lee,Hou-Chiang Tseng,Ju-Ling Chen,Chun-Yi Peng,Tao-Hsing Chang,Yao-Ting Sung
Issue Date:July 2012
pp. 164-166
The studies of readability aim to measure the level of text difficulty. Although traditional formulae such as the Flesch-Kincaid formula can properly predict text readability, they are only effective for English text. Other formulae with very few features ...
 
A Cross-Layer Architecture for OFDMA-Based Cognitive Radio Network
Found in: Software Engineering, World Congress on
By Yi Peng, Jie Peng, Xiangquan Zheng, Zengli Liu, Hua Long
Issue Date:May 2009
pp. 129-133
In this paper, we discuss the framework of cognitive radio network and OFDMA technology first, and analysis the motivations for cross-layer design in cognitive radio network (CRN). Moreover, we proposed the OFDMA-Based cognitive radio transceiver. Finally,...
 
The Research of Cross-Layer Architecture Design and Security for Cognitive Radio Network
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Yi Peng, FengHong Xiang, Hua Long, Jie Peng
Issue Date:May 2009
pp. 603-607
In this paper, we discuss the framework of cognitive radio network, analysis motivations for cross-layer design and security in cognitive radio network (CRN) first. Secondly, we proposed a novel architecture in which the dynamic channel access is achieved ...
 
The Novel Cross-Layer Design for Channel Access in Ad Hoc Cognitive Radio Network
Found in: Networking and Digital Society, International Conference on
By Yi Peng, Fenghong Xiang, Zengli Liu, Hua Long, Jie Peng
Issue Date:May 2009
pp. 217-220
In this paper, we discuss the framework of ad-hoc cognitive radio network (ad-hoc CRN), the network model and the dynamic spectrum access (DSA) for ad-hoc cognitive radio network first. Moreover, the motivation for cross-layer design in ad-hoc cognitive ra...
 
The Research of Cross-layer Design between the PHY and MAC Layer for OFDM-Based Cognitive Radio Network
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Yi Peng, Zengli Liu, Hua Long, Jie Peng
Issue Date:April 2009
pp. 290-293
In this paper we discuss a novel OFDM-based cognitive radio network (OFDM-based CRN) technique and motivations for cross-layer design in CRN, proposed a novel architecture in which the dynamic channel allocation is achieved by a cross-layer design between ...
 
The Research of Cross-Layer Architecture Design for MCM-Based Cognitive Radio Network
Found in: Education Technology and Computer Science, International Workshop on
By Yi Peng, Jie Peng, Xiangquan Zheng
Issue Date:March 2009
pp. 711-715
In this paper, we discuss the Framework of MCM-Based cognitive radio network (MCM-Based CRN) and motivations for cross-layer design in CRN first. Moreover, we proposed a novel architecture in which the dynamic channel allocation is achieved by a cross-laye...
 
Fast analog layout prototyping for nanometer design migration
Found in: Computer-Aided Design, International Conference on
By Yi-Peng Weng,Hung-Ming Chen,Tung-Chieh Chen,Po-Cheng Pan,Chien-Hung Chen,Wei-Zen Chen
Issue Date:November 2011
pp. 517-522
This paper presents an analog layout migration methodology to quickly provide multiple layouts while keeping similar or better circuit performance. Unlike previous works that often generate a single layout that has exactly the same topology with the origin...
 
Analysis of the Factors Affecting the Income of the Farmers in Rural Tourism of Dujiangyan City on the Base of Regression Model
Found in: Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, IACIS International Symposium on
By Junzhang He, Guozhu He, Bo Yi, Peng Li
Issue Date:October 2010
pp. 311-315
A large amount of data is obtained through questionares, on the basis of which, a multiple linear regression model have been established. With the application of MATLAB software, we have learned though the correlation analysis, of which the prediction accu...
 
Importance-Driven Isosurface Decimation for Visualization of Large Simulation Data Based on OpenCL
Found in: Computing in Science & Engineering
By Yi Peng,Li Chen,Jun-Hai Yong
Issue Date:January 2014
pp. 24-32
A new way to define mesh importance for decimation uses transfer functions and visualizes large simulation data in cases where normal visualization methods are insufficient due to memory limit. Next, a parallel isosurface simplification framework uses pyra...
 
An Impact Analysis of Emergency Event on Stock Market Based on Web Search Data: A Case from 723 Yongwen Railway Accident
Found in: 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Yang Xin,Lv Benfu,Sun Yi,Peng Geng
Issue Date:December 2012
pp. 34-38
The occurrence of major emergencies would have a certain impact on the production of related enterprises, industry outlook, even on national macroeconomic situation. The impact is presented as price fluctuation of event-related enterprises' stock. Fortunat...
 
Credit Risk Evaluation by Improved MCDM Models
Found in: 2012 Fifth International Conference on Business Intelligence and Financial Engineering (BIFE)
By Wenshuai Wu,Gang Kou,Yi Peng
Issue Date:August 2012
pp. 191-195
In this paper, two improved MCDM models including Analytic Hierarchy Process (AHP) for group decision-making and revised TOPSIS model are applied for credit risk evaluation. The index weight is determined by AHP for group decision-making, which can establi...
 
An Optimal Color Mapping Strategy Based on Energy Minimization for Time-Varying Data
Found in: Computer-Aided Design and Computer Graphics, International Conference on
By Yi Peng,Jie Dong,Li Chen,Haiyang Chu,Junhai Yong
Issue Date:September 2011
pp. 411-417
Color mapping plays a critical role in visualization of time-varying data and also sets a challenge for researchers due to the consistency of mapping and great changes in time-varying data. In order to solve this problem and generate feature-prominent anim...
 
Visual Simulation of Upland Rice Root as Related to Soil Compaction
Found in: Digital Manufacturing and Automation, International Conference on
By Yong Ge,Zhenyang Ge,Huaifeng Yi,Peng Li,Hao Guo
Issue Date:August 2011
pp. 1392-1394
The morphological characteristics and the growth features of upland rice root was investigated. A three-dimensional visual simulation model was put forward by using architectural parameters of upland rice root system. Compared with paddy rice root system, ...
 
Risk Analysis of B2B Systems in Book Supply Chain from the Perspective of Information Processing Needs
Found in: Intelligent Computation Technology and Automation, International Conference on
By Ping-Yu Hsu,Pao-Yi Peng,Hsiu-Heng Lin
Issue Date:March 2011
pp. 1114-1117
This research applied the information processing theory to evaluate the risks that are associated with B2B systems of book supply chain. Hypotheses were proposed to examine the relationships between the risks of information processing needs and the perform...
 
Predicting Credit Card Holder Churn in Banks of China Using Data Mining and MCDM
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Guoxun Wang, Liang Liu, Yi Peng, Guangli Nie, Gang Kou, Yong Shi
Issue Date:September 2010
pp. 215-218
Nowadays, with increasingly intense competition in the market, major banks pay more attention on customer relationship management. A real-time and effective credit card holders’ churn analysis is important and helpful for bankers to maintain credit card ho...
 
Optimum Piping Design on Offshore Platform Based on Improved Adaptive Genetic Algorithm
Found in: Information Engineering, International Conference on
By Yi Peng, Liu Yancong, Shi Yongjun, Lun Guande
Issue Date:August 2010
pp. 50-53
For solving the problems of low efficiency and high cost in piping design process on offshore drilling platform, the design of manifold optimum piping was taken as research objective, a mathematical model was established with the controlled objects of cons...
 
The Research of CR-based WSNs Architecture
Found in: International Conference on E-Business and E-Government
By Yi Peng,Hua Long,Tao Xie,QingZhi Du
Issue Date:May 2010
pp. 2179-2182
In recent years, we have seen tremendous growth in the applications of wireless sensor networks (WSN) operating in unlicensed spectrum bands. However, there is evidence that existing unlicensed spectrum is becoming overcrowded. On the other hand, with rece...
 
A New Hierarchical Document Clustering Method
Found in: Networked Computing and Advanced Information Management, International Conference on
By Gang Kou, Yi Peng
Issue Date:August 2009
pp. 1789-1792
The advances in digital data collection and storage technologies during the last two decades allow companies and organizations store up huge amounts of electronic documents. Large collections of electronic text present opportunities and challenges. How to ...
 
Scheduling Cells with Multiple Output Ports for Input-Queued Switches
Found in: Signal Acquisition and Processing, International Conference on
By Zheng De-ren, Wang Bin-qiang, Yi Peng, Li Hui
Issue Date:April 2009
pp. 163-167
With the line rate growing faster and faster, input queued switching architecture has become attractive in high performance switches and routers due to the no speedup character. In this paper, a simple efficient queue balance matching (QBM) algorithm is pr...
 
Low power/area branch prediction using complementary branch predictors
Found in: Parallel and Distributed Processing Symposium, International
By Resit Sendag, Joshua J. Yi, Peng-fei Chuang, David J. Lilja
Issue Date:April 2008
pp. 1-12
Although high branch prediction accuracy is necessary for high performance, it typically comes at the cost of larger predictor tables and/or more complex prediction algorithms. Unfortunately, large predictor tables and complex algorithms require more chip ...
 
A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Kenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, M. Merabti
Issue Date:March 2008
pp. 1444-1449
Fuzzy-based technology is an important topic and widely used in routing computing and channel assignment of wireless network for recent years. But some of related technologies unfortunately existed are always too complicated, costly routing searching proce...
 
Application of Mobile Information System in Vehicle Insurance
Found in: Software Engineering Research, Management and Applications, ACIS International Conference on
By Jin Da Wei, Li Yi Peng
Issue Date:August 2007
pp. 599-603
This article introduces how to apply mobile information system in the insurance industry. Firstly, it analyses the current status and basic process of insurance business. Then, based on the problem of vehicle insurance business, we offer the solution and i...
 
A Fuzzy-Based and Simulated IP Network Traffic Engineering Promoting Multi-Service Performance
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Kenvi Wang, Lin-Yi Peng, Tsung-Mao Chen, Szu-Yu Chen
Issue Date:May 2007
pp. 894-899
In recent years, fuzzy and simulation methods had been used in network engineering. In this manuscript, the authors apply a compound traffic engineering approach of the fuzzy & simulation techniques for a Managed Internet Protocol (IP) network to deriv...
 
A Hybrid Strategy for Clustering Data Mining Documents
Found in: Data Mining Workshops, International Conference on
By Yi Peng, Gang Kou, Yong Shi, Zhengxin Chen
Issue Date:December 2006
pp. 838-842
With the increase in the number of electronic documents?C it is hard to manually organize, analyze and present these documents efficiently. Document clustering, which automatically groups similar or related documents together, has been used in practical ap...
 
A Systemic Framework for the Field of Data Mining and Knowledge Discovery
Found in: Data Mining Workshops, International Conference on
By Yi Peng, Gang Kou, Yong Shi, Zhengxin Chen
Issue Date:December 2006
pp. 395-399
This paper proposes a systemic framework that attempts to define the domain and major areas of Data Mining and Knowledge Discovery (DMKD). Grounded theory approach, a qualitative method that inductively develops an understanding of phenomena, is adopted to...
 
Image Alignment Using Pyramid Structure with Harris Corner Detection
Found in: 2013 Second International Conference on Robot, Vision and Signal Processing (RVSP)
By Chin-Sheng Chen,Shun-Hung Tsai,Kang-Yi Peng,Chorng-Tyan Lin,Chih-Chin Wen
Issue Date:December 2013
pp. 200-203
A corner-based image alignment algorithm based on the procedures of corner-based template matching is presented in this study. This algorithm consists of two stages: training and matching. In the matching phase, the corners are obtained using Harris corner...
 
An ensemble clustering model for mining concept drifting stream data in emergency management
Found in: Proceedings of the Data Mining and Intelligent Knowledge Management Workshop (DM-IKM '12)
By Yi Peng, Yong Shi
Issue Date:August 2012
pp. 1-8
Mining data streams with concept drifts is always an important and challenge task for researchers in both application and theory areas, such as emergency management. Because of requiring massive training data with labels, it is a hard and time costing work...
     
Fault tolerant deployment and topology control in wireless networks
Found in: Proceedings of the fourth ACM international symposium on Mobile ad hoc networking & computing (MobiHoc '03)
By Chih-Wei Yi, Peng-Jun Wan, Xiang-Yang Li, Yu Wang
Issue Date:June 2003
pp. 117-128
This paper investigate fault tolerance for wireless ad hoc networks. We consider a large-scale of wireless networks whose nodes are distributed randomly in a unit-area square region. Given n wireless nodes V, each with transmission range rn, the wireless n...
     
Multi-pose Face Detection Based on Adaptive Skin Color and Structure Model
Found in: Computational Intelligence and Security, International Conference on
By Zhao-yi Peng, Yu Zhou, Ping Wang
Issue Date:December 2009
pp. 325-329
In this paper, propose a method of face detection based on adaptive skin color and structure model for multi-pose color images in a complex background. First, a face skin color model is built, and an adaptive Gamma correction is used in the skin color segm...
 
 1