Search For:

Displaying 1-15 out of 15 total
Multi-Issue Negotiation Research Based On Niched Co-evolutionary Genetic Algorithm
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Yong Yuan, Yong-quan Liang
Issue Date:August 2007
pp. 564-569
This paper presents a simulation algorithm called SANCGA for bilateral multi-issue negotiation based on co-evolutionary genetic algorithm and isolated niche technique, and designs an experiment to simulate the co-evolutionary strategy learning process in a...
 
Artificial Societies, Computational Experiments, and Parallel Systems: An Investigation on a Computational Theory for Complex Socioeconomic Systems
Found in: IEEE Transactions on Services Computing
By Ding Wen,Yong Yuan,Xia-Rong Li
Issue Date:April 2013
pp. 177-185
This paper addresses issues related to the development of a computational theory and corresponding methods for studying complex socioeconomic systems. We propose a novel computational framework called ACP (Artificial societies, Computational experiments, a...
 
Virtual MIMO Protocol Based on Clustering for Wireless Sensor Network
Found in: Computers and Communications, IEEE Symposium on
By Wenqing Chen, Yong Yuan, Changchun Xu, Kezhong Liu, Zongkai Yang
Issue Date:June 2005
pp. 335-340
The wireless nature of the medium combined with energy constraints pose big challenges on the design of energy efficient and reliable protocols for wireless sensor networks (WSN). In this paper, the virtual MIMO scheme is incorporated with the multi-hop ne...
 
Research on Clustering Routing Protocol of MANET
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Zheng Sihai,Li Layuan,Li Yong,Yuan Junchun
Issue Date:October 2011
pp. 27-30
In general, each cluster consists of a cluster head and several member nodes in clustering routing protocol of MANET. Its advantages are obvious, such as better scalability, less control overhead, and it also reduce the number of nodes sharing the same cha...
 
Learning Hybrid Template by EM-Type Algorithm
Found in: Multimedia Information Networking and Security, International Conference on
By Bin Lai, Deng-Yi Zhang, Cheng-Zhang Qu, Jian-Hui Zhao, Zhi-Yong Yuan
Issue Date:November 2009
pp. 629-632
The article proposes to improve the active basis model by incorporating both unaligned training examples and non-alignable sketches in images. EM-type algorithm [8] can learn the objects appear at unknown orientations, locations and scales in the training ...
 
Railway Station Pedestrian Simulation on Fire Smoke Based on Smartfire
Found in: Information Technology and Applications, International Forum on
By Shu-qing Hao, Hong-wei Huang, Yong Yuan
Issue Date:May 2009
pp. 455-457
Fire on railway station is a very important disaster is worth of consideration. When fired, smoke will bring many pollution gases and harmful particles with high temperature. Study the smoke flow phenomenon will provide help for people's lives. In the arti...
 
Fire Evacuation Underground Space Based on Building EXODUS
Found in: Engineering Computation, International Conference on
By Shu-qing Hao, Hong-wei Huang, Yong Yuan, Kun Yin
Issue Date:May 2009
pp. 186-188
the main important factors to affect the evacuation of people by analyzing the fire theory happened in the underground space have been gotten. They are fire temperature, smoke concentration, and poisonous gas and ventilated velocity etc key factors. Do the...
 
Fire Evacuation of Underground Tunnel Based Building EXODUS
Found in: Computer Science and Information Engineering, World Congress on
By Shu-qing Hao, Hong-wei Huang, Yong Yuan
Issue Date:April 2009
pp. 612-615
Fire in the underground space is a serious accident. It's very essential to study the evacuation technology and how to rescue people in the fire situation. There are about 4 kinds of evacuation style in long and bit tunnel after a fire, that is. The author...
 
A Novel Course System and Engineering Practice Design for Embed System Education
Found in: Computer Science and Software Engineering, International Conference on
By Li Xiaojuan, Guan Yong, Yuan Huimei
Issue Date:December 2008
pp. 1388-1391
The development of courses system for embed system and the exploation realistic embedded systems design experience for students are described in the paper. The Information technology education requires exposing students to the current edge of research. To ...
 
Intelligent-Commerce Research in China
Found in: IEEE Intelligent Systems
By Daniel Zeng, Fei-Yue Wang, Xiaolong Zheng, Yong Yuan, Guoqing Chen, Jian Chen
Issue Date:November 2008
pp. 14-18
Recent years have witnessed the increased application of AI technologies to real-world e-commerce challenges. This article presents a brief overview of representative work by Chinese researchers, covering topics such as multiagent decision making, keyword ...
 
A New Concurrent Detection of Control Flow Errors Based on DCT Technique
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan
Issue Date:December 2007
pp. 201-209
In this paper, a program is first divided into several data computing blocks (DCBs) by the branch instruction; each DCB can then be recognized as an image. We then use the one dimension discrete cosine transform (1-D DCT) to compute each DCB to generate se...
 
VEC3D: A 3-D Virtual English Classroom for Second Language Learning
Found in: Advanced Learning Technologies, IEEE International Conference on
By Yong-Yuan Lin, Ya-Chun Shih, Mau-Tsuen Yang
Issue Date:July 2005
pp. 906-908
The traditional e-learning systems are generally less attractive to students due to their lack of 3-D immersion and real voice interaction. The technology of virtual reality can be exploited to compensate these weaknesses. We propose a realistic and intera...
 
An optimal algorithm for scheduling a computational tree on a parallel system with communication delays
Found in: Proceedings of the 19th annual conference on Computer Science (CSC '91)
By Pauline Markenscoff, Yong Yuan Li
Issue Date:April 1999
pp. 289-298
In a class of applications, a model exists in which calculations depend upon a fixed set of independent real model parameters, say V1, V2, …, Vn. Each of the V's is a function of auxiliary data. The model often has a large number of discrete states, ...
     
An Algorithm for Attribute Reduction Based on Database Technology
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Ke-yong Yuan, Xiao-guang Hong, Fang-qiao Xiao
Issue Date:November 2009
pp. 53-57
Based on the analysis of the importance of the core attributes in the Information System and the cost of getting core attribute by using discernibility matrix, this chapter gives a necessary and sufficient condition whether a set contains the core or not. ...
 
Integration of GIS and Computational Models for Emergency Management
Found in: Intelligent Computation Technology and Automation, International Conference on
By Tao Chen, Hong-yong Yuan, Rui Yang, Jianguo Chen
Issue Date:October 2008
pp. 255-258
This paper presents a method to integrate GIS and computational models in emergency intelligent decision support system (IDSS) for more scientific and effective loss prevention and disaster manipulation. The value of GIS in emergency management arises dire...
 
 1