Search For:

Displaying 1-50 out of 10,187 total
Correction to 'On Satisfying Timing Constraints in Hard-Real-Time Systems' by J. Xu and D.L. Parnas
Found in: IEEE Transactions on Software Engineering
By J. Xu, D.L. Parnas
Issue Date:March 1993
pp. 310
<p>Corrected versions are presented for tables I and III that appear in the above-titled paper.</p>
 
Image smoothing via L0 gradient minimization
Found in: ACM Transactions on Graphics (TOG)
By Cewu Lu, Jiaya Jia, Li Xu, Yi Xu, Cewu Lu, Jiaya Jia, Li Xu, Yi Xu
Issue Date:December 2011
pp. 1-15
We present a new image editing method, particularly effective for sharpening major edges by increasing the steepness of transition while eliminating a manageable degree of low-amplitude structures. The seemingly contradictive effect is achieved in an optim...
     
Sampling-based contact-rich motion control
Found in: ACM Transactions on Graphics (TOG)
By KangKang Yin, Libin Liu, Michiel van de Panne, Tianjia Shao, Weiwei Xu, KangKang Yin, Libin Liu, Michiel van de Panne, Tianjia Shao, Weiwei Xu, KangKang Yin, Libin Liu, Michiel van de Panne, Tianjia Shao, Weiwei Xu, KangKang Yin, Libin Liu, Michiel van de Panne, Tianjia Shao, Weiwei Xu
Issue Date:July 2010
pp. 1-10
Human motions are the product of internal and external forces, but these forces are very difficult to measure in a general setting. Given a motion capture trajectory, we propose a method to reconstruct its open-loop control and the implicit contact forces....
     
Structure-based ASCII art
Found in: ACM Transactions on Graphics (TOG)
By Linling Zhang, Tien-Tsin Wong, Xuemiao Xu, Linling Zhang, Tien-Tsin Wong, Xuemiao Xu, Linling Zhang, Tien-Tsin Wong, Xuemiao Xu, Linling Zhang, Tien-Tsin Wong, Xuemiao Xu
Issue Date:July 2010
pp. 1-10
The wide availability and popularity of text-based communication channels encourage the usage of ASCII art in representing images. Existing tone-based ASCII art generation methods lead to halftone-like results and require high text resolution for display, ...
     
Invertible motion blur in video
Found in: ACM Transactions on Graphics (TOG)
By Amit Agrawal, Ramesh Raskar, Yi Xu, Amit Agrawal, Ramesh Raskar, Yi Xu, Amit Agrawal, Ramesh Raskar, Yi Xu, Amit Agrawal, Ramesh Raskar, Yi Xu
Issue Date:July 2009
pp. 1-2
We show that motion blur in successive video frames is invertible even if the point-spread function (PSF) due to motion smear in a single photo is non-invertible. Blurred photos exhibit nulls (zeros) in the frequency transform of the PSF, leading to an ill...
     
Joint-aware manipulation of deformable models
Found in: ACM Transactions on Graphics (TOG)
By Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu, Baining Guo, Falai Chen, Jun Wang, KangKang Yin, Kun Zhou, Michiel van de Panne, Weiwei Xu
Issue Date:July 2009
pp. 1-2
Complex mesh models of man-made objects often consist of multiple components connected by various types of joints. We propose a joint-aware deformation framework that supports the direct manipulation of an arbitrary mix of rigid and deformable components. ...
     
Maximizing network throughput with minimal remote data transfer cost in unreliable wireless sensor networks
Found in: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '13)
By Weifa Liang, Wenzheng Xu, Xiaohua Jia, Xu Xu
Issue Date:July 2013
pp. 245-248
In this paper we consider the use of a link-unreliable wireless sensor network for remote monitoring, where the monitoring center is geographically located far away from the region of the deployed sensor network. The sensing data is transferred to the moni...
     
A randomized controlled study of emotion and quality of life on mild to moderate insomnia intervened by Chinese Medicine in integrated program
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops (BIBMW)
By Yan Li,Biyun Xu,Peng Liu,Aihua Ou,Yan Xu,Biyang Ou,Ruiyu Xu,Zhaozhang Wei,Liang Zeng,Runru Mai,Jianbin Chen,Wen Zhou,Huimei Zeng,Jiale Zeng
Issue Date:October 2012
pp. 428-434
Objective: To evaluate the emotion and quality of life on mild to moderate insomnia intervened by Chinese Medicine in the integrated program. Methods: Patients (18 to 56 years old) with mild to moderate insomnia from the Five National Center were randomly ...
 
Who will be your next friend: the bonding role of linkage influence in social networks
Found in: Proceedings of the 14th Annual International Conference on Electronic Commerce (ICEC '12)
By Cheng Zhang, Heng Xu, Xu Liu, Yunjie Xu
Issue Date:August 2012
pp. 76-82
To develop a general mathematical model for social networks is one of the fundamental tasks currently on demand within social network research. Ignoring the strength of the relationships, existing social network models simply use a Boolean value to describ...
     
Probabilistic Brain Fiber Tractography on GPUs
Found in: 2012 26th IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
By Mo Xu,Xiaorui Zhang,Yu Wang,Ling Ren,Ziyu Wen,Yi Xu,Gaolang Gong,Ningyi Xu,Huazhong Yang
Issue Date:May 2012
pp. 742-751
Diffusion Tensor Magnetic Resonance Imaging (DT-MRI) is an emerging technique that explores the structural connectivity of the human brain. The probabilistic fiber tractography based on DT-MRI data behaves more robustly than deterministic approaches in the...
 
A randomized, controlled study of efficacy and safety on mild to moderate insomnia intervened by Chinese medicine in the integrated program
Found in: Bioinformatics and Biomedicine Workshop, IEEE International Conference on
By Yan Li,Biyun Xu,Shuhui Chen,Peng Liu,Aihua Ou,Yan Xu,Zehuai Wen,Biyang Ou,Ruiyu Xu,Zhaozhang Wei,Liang Zeng
Issue Date:November 2011
pp. 732-739
To evaluate the effectiveness and safety in mild to moderate insomnia intervened by Chinese Medicine in the integrated program. Methods: Patients(18 to 56 years old) from the Five National Center, who were with mild to moderate insomnia, were randomly divi...
 
Experiment Study of the Pilot Ammonia SCR System in a Coal-Fired Power Plant
Found in: Asia-Pacific Power and Energy Engineering Conference
By Hong Xu, Zhi-Yong Yan, Xu Xu, Yu Wang
Issue Date:March 2011
pp. 1-4
NA
 
Experimental Study on Thermal Treatment of Dioxins in Fly Ash from Medical Waste Incinerator
Found in: Asia-Pacific Power and Energy Engineering Conference
By Xu Xu, Shasha Ji, Hong Xu, Xiaodong Li, Tong Chen
Issue Date:March 2011
pp. 1-4
NA
 
A Method for Privacy Protection in Location Based Services
Found in: Computer and Information Technology, International Conference on
By Fei Xu, Jingsha He, Xu Wu, Jing Xu
Issue Date:October 2009
pp. 351-355
Privacy protection is a very important issue and solutions must be developed for wide acceptance of location based services (LBSs) in wireless applications. Current approaches rely mostly on the use of privacy policies to describe and solve this problem in...
 
Distinguishing citation quality for journal impact assessment
Found in: Communications of the ACM
By Andrew Lim, Brenda Cheang, Hong Ma, Qi Wen, Zhou Xu, Andrew Lim, Andrew Lim, Brenda Cheang, Brenda Cheang, Hong Ma, Hong Ma, Qi Wen, Qi Wen, Zhou Xu, Zhou Xu
Issue Date:August 2009
pp. 101-104
Introduction The research community has long and often been fervently keen on debating the topic of journal impact. Well, just what is the impact of a journal? Today, the Science Citation Index (SCI) recognizes over 7,000 journals. The sheer number of avai...
     
VSD: A Framework of Stackable Virtual Snapshot Device
Found in: Networking, Architecture, and Storage, International Conference on
By Na Wen-wu, Zhu Xu-dong, Ke Jian, Xu Jin-ping, Zhang Jun-wei, Bu Qing-zhong, Xu Lu
Issue Date:July 2009
pp. 253-256
On demand of various applications for storage virtualization, this paper presents a stackable block-level virtual snapshot device (VSD) based on the virtual storage pool. With the strategy of stackable block device, VSD employs a read-only snapshot model w...
 
Study on Engineering Project Management Based on Neural Network
Found in: Electronic Commerce and Business Intelligence, International Conference on
By Jinhu Liu, Jing Xu, Xu Xu, Yan Cao
Issue Date:June 2009
pp. 234-237
In order to make the performance evaluation for engineering project management effectively, this article adopts BP network approach to copy with the problem. By analysis, we build a quantitative model of performance evaluation including of four main contro...
 
Greeks Analysis of Currency Option under Fuzzy Environment
Found in: Computational Sciences and Optimization, International Joint Conference on
By Jinhong Xu, Weidong Xu, Weijun Xu
Issue Date:April 2009
pp. 446-450
Owing to the fluctuations in the financial markets from time to time, some input variables such as the interest rate, spot exchange rate and volatility in the Garman-Kohlhagen model can not be expected in a precise sense. Therefore, it is nature to start f...
 
A Privacy-Enhanced Access Control Model
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Fei Xu, Jingsha He, Xu Wu, Jing Xu
Issue Date:April 2009
pp. 703-706
Privacy is one of the most important issues in providing high-quality ubiquitous network services to users over the Internet. Although several privacy aware access control models have been proposed in recent years, these models still rely mostly on the tra...
 
An Identifier-Based Control Method in Dynamic Tracking Neuro-Fuzzy Control System
Found in: Computer Science and Information Engineering, World Congress on
By Kaijun Xu, Yang Li, Weitao Xu, Yang Xu
Issue Date:April 2009
pp. 71-75
It is difficult to realize dynamic control for some complex nonlinear processes which are operated in different environments and when operation conditions are changed frequently. In this paper we propose an identifier-based control method in dynamic tracki...
 
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
Found in: ACM Transactions on Information and System Security (TISSEC)
By Chongkyung Kil, Jong Youl Choi, Jong Youl Choi, Jong Youl Choi, Jun Xu, Jun Xu, Jun Xu, Michael K. Reiter, Michael K. Reiter, Michael K. Reiter, Xiaofeng Wang, Xiaofeng Wang, Xiaofeng Wang, Zhuowei Li, Zhuowei Li, Zhuowei Li
Issue Date:December 2008
pp. 1-35
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by this idea, we propose a packet vaccine mechanism that randomizes address-like st...
     
Large-Margin Multi-ViewInformation Bottleneck
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Chang Xu,Dacheng Tao,Chao Xu
Issue Date:August 2014
pp. 1559-1572
In this paper, we extend the theory of the information bottleneck (IB) to learning from examples represented by multi-view features. We formulate the problem as one of encoding a communication system with multiple senders, each of which represents one view...
 
Automated Generation of Integration Test Sequences from Logical Contracts
Found in: 2014 IEEE 38th International Computer Software and Applications Conference Workshops (COMPSACW)
By Dianxiang Xu,Weifeng Xu,Manghui Tu
Issue Date:July 2014
pp. 632-637
This paper exploits logical contracts (i.e., Preconditions and post conditions) to automatically generate integration tests. The approach transforms a contract-based test model into an operational model, which makes it feasible to analyze correctness of th...
 
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems
Found in: IEEE Transactions on Computers
By Silei Xu, Runhui Li,Patrick P. C. Lee, Yunfeng Zhu, Liping Xiang, Yinlong Xu,John C. S. Lui
Issue Date:April 2014
pp. 995-1007
In modern parallel storage systems (e.g., cloud storage and data centers), it is important to provide data availability guarantees against disk (or storage node) failures via redundancy coding schemes. One coding scheme is X-code, which is double-fault tol...
 
Private search on key-value stores with hierarchical indexes
Found in: 2014 IEEE 30th International Conference on Data Engineering (ICDE)
By Haibo Hu,Jianliang Xu,Xizhong Xu,Kexin Pei,Byron Choi,Shuigeng Zhou
Issue Date:March 2014
pp. 628-639
Query processing that preserves both the query privacy at the client and the data privacy at the server is a new research problem. It has many practical applications, especially when the queries are about the sensitive attributes of records. However, most ...
   
Adaptive Epidemic Dynamics in Networks: Thresholds and Control
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Li Xu, Shouhuai Xu, Wenlian Lu, Zhenxin Zhan
Issue Date:January 2014
pp. 1-19
Theoretical modeling of computer virus/worm epidemic dynamics is an important problem that has attracted many studies. However, most existing models are adapted from biological epidemic ones. Although biological epidemic models can certainly be adapted to ...
     
A Neural Network-Based Ensemble Prediction Using PMRS and ECM
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Dongkuan Xu,Yi Zhang,Cheng Cheng,Wei Xu,Likuan Zhang
Issue Date:January 2014
pp. 1335-1343
Crude oil plays a significant role in the modern society and its price prediction attracts more and more attentions, not only for its importance to the modern industry, but also for its complex price movement. Based on PMRS, ECM and NN, this paper presents...
   
Semantically-Based Human Scanpath Estimation with HMMs
Found in: 2013 IEEE International Conference on Computer Vision (ICCV)
By Huiying Liu,Dong Xu,Qingming Huang,Wen Li,Min Xu,Stephen Lin
Issue Date:December 2013
pp. 3232-3239
We present a method for estimating human scan paths, which are sequences of gaze shifts that follow visual attention over an image. In this work, scan paths are modeled based on three principal factors that influence human attention, namely low-level featu...
 
Research on Basic Problems of Cognitive Network Intrusion Prevention
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Hui Xu,Xiang Chen,Jiangmei Zhou,Zhaowen Wang,Huanxiao Xu
Issue Date:December 2013
pp. 514-517
Nowadays bad adaptive performance of network intrusion prevention system (IPS) becomes the bottleneck of its development in face of complex and fickle attacks. The idea of cognitive network intrusion prevention is creatively put forward to solve the proble...
 
The construction and research of lightweight cryptography SOPT-S boxes based on the inverse mapping in galois field
Found in: 2013 IEEE International Conference on Granular Computing (GrC)
By Zhao-long Fan,Qi-jian Xu,Yong-jun Xu,Fei Wang
Issue Date:December 2013
pp. 91-98
As the weakness like poor performance in cryptology and single type in the utility of the S boxes in nonlinear layer of the existing lightweight cryptography algorithm such as PRESENT, LED and KLEIN, the safety of algorithm in sensor nodes meet a notable d...
   
The effects of different types of music on electroencephalogram
Found in: 2013 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Chenbing Sun,Yimin Bao,Jiatuo Xu,Deqi Kong,Hong Zhou,Qi Wang,Huiliang Shang,Wenxin Wang,Minmin Jin,Xu Wang,Ye Duan
Issue Date:December 2013
pp. 31-37
In order to study the characteristics of electroencephalogram (EEG) induced by different types of music, we selected 58 volunteers (college students) with no musical training experience. Half of them are males and the rest are females. We finally adopted 4...
   
Design of the Control System for the Self-Propelled Electrostatic Sprayer
Found in: 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)
By Li Yang,Xue Xiaole,Xu Jun,Wen Xu
Issue Date:November 2013
pp. 259-263
An adaptive neural network control lerwitn both feed-forward and feedback is designed to improve the yaw stability of vehicle by compound control of direct yaw moment and active front steering. The feedback controller takes the deviation of actual yaw rate...
 
Risk Based Identification of Cascading Chains Based on Generalized Line Outage Distribution Factors
Found in: 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)
By Yuanyu Dai,Yusheng Xue,Guo Chen,Yan Xu,Zhao Xu,Z.Y. Dong
Issue Date:November 2013
pp. 553-556
In this paper, we study on evaluating physical education teaching quality based on the entropy model. The entropy model is a measure of the uncertainty associated with a random variable, which is a powerful tool in many research fields. Next, a physical ed...
 
Lightweight secure communication protocols for in-vehicle sensor networks
Found in: Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (CyCAR '13)
By Benjamin Moore, Miao Xu, Jesse Walker, Wenyuan Xu
Issue Date:November 2013
pp. 19-30
Wireless sensor networks are increasingly being integrated into the modern automobile with the intention of improving safety and reducing costs. However, it has been shown that the first widely-deployed and mandatory in-car sensor networks --Tire Pressure ...
     
Analysis of Long Duration Snore Related Signals Based on Formant Features
Found in: 2013 International Conference on Information Technology and Applications (ITA)
By Yaqi Wu,Zhao Zhao,Kun Qian,Zhiyong Xu,Huijie Xu
Issue Date:November 2013
pp. 91-95
Snoring is a typical symptom of Obstructive Sleep Apnea-Hypopnea Syndrome (OSAHS) patients, which has motivated numerous researchers focusing on how to diagnose this disorder by acoustic signal analysis methods. As a non-invasive approach, acoustic diagnos...
 
Modeling Non-Gaussian Time Series with Nonparametric Bayesian Models
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Zhiguang Xu,Steven MacEachern,Xinyi Xu
Issue Date:November 2013
pp. 1
We present a class of Bayesian copula models whose major components are the marginal (limiting) distribution of a stationary time series and the internal dynamics of the series. We argue that these are the two features with which an analyst is typically mo...
 
A heterogenous automatic feedback semi-supervised method for image reranking
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Xin-Shun Xu, Yafang Wang, Xiaolin Wang, Xin-Chao Xu
Issue Date:October 2013
pp. 999-1008
Image reranking, which aims at enhancing the quality of keyword-based image search with the help of image features, recently has become attractive in image search community. A major challenging in this task is that image's visual features do not always wel...
     
TACO: Temperature-Aware Compensation for Time Synchronization in Wireless Sensor Networks
Found in: 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Miao Xu, Wenyuan Xu
Issue Date:October 2013
pp. 122-130
Time synchronization is critical for wireless sensor networks (WSNs) because data fusion and duty cycling schemes all rely on synchronized schedules. Traditional synchronization protocols assume that wireless channels are available around the clock. Howeve...
 
Monitoring Quality Maximization through Fair Rate Allocation in Harvesting Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Weifa Liang, Xiaojiang Ren, Xiaohua Jia, Xu Xu
Issue Date:September 2013
pp. 1827-1840
In this paper, we consider an energy harvesting sensor network where sensors are powered by reusable energy such as solar energy, wind energy, and so on, from their surroundings. We first formulate a novel monitoring quality maximization problem that aims ...
 
Carbon-Aware Load Balancing for Geo-distributed Cloud Services
Found in: 2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Zhi Zhou,Fangming Liu,Yong Xu,Ruolan Zou,Hong Xu,John C.S. Lui,Hai Jin
Issue Date:August 2013
pp. 232-241
Recently, data center carbon emission has become an emerging concern for the cloud service providers. Previous works are limited on cutting down the power consumption of the data centers to defuse such a concern. In this paper, we show how the spatial and ...
 
QoS graph coloring spectrum allocation for femtocell in Macro/Femto heterogeneous network
Found in: 2013 8th International Conference on Communications and Networking in China (CHINACOM)
By Zhou Xu, Yu He, Xiaodong Xu, Fei Peng
Issue Date:August 2013
pp. 374-378
To deploy femtocells overlaying the macrocell as a two-tier network is one of the most promising architectures. It improves indoor signal coverage and system capacity. However, the deployment of femtocells also brings severe intra-tier and cross-tier co-ch...
   
Large-margin multi-view Gaussian process for image classification
Found in: Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service (ICIMCS '13)
By Chang Xu, Chao Xu, Dacheng Tao, Yangxi Li
Issue Date:August 2013
pp. 7-12
In image classification, the goal is to decide whether an image belongs to a certain category or not. Multiple features are usually employed to comprehend the contents of images substantially for the improvement of classification accuracy. However, it also...
     
Migration-Based Elastic Consolidation Scheduling in Cloud Data Center
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW)
By Qingjia Huang, Sen Su, Siyuan Xu, Jian Li, Peng Xu, Kai Shuang
Issue Date:July 2013
pp. 93-97
Virtualization and cloud computing technologies now make it possible to consolidate multiple online services, which are packed in Virtual Machines (VMs), into a smaller number of physical servers. However, it is still a challenging scheduling problem for c...
 
Query expansion using path-constrained random walks
Found in: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval (SIGIR '13)
By Gu Xu, Jianfeng Gao, Jinxi Xu
Issue Date:July 2013
pp. 563-572
This paper exploits Web search logs for query expansion (QE) by presenting a new QE method based on path-constrained random walks (PCRW), where the search logs are represented as a labeled, directed graph, and the probability of picking an expansion term f...
     
Mining Test Oracles for Test Inputs Generated from Java Bytecode
Found in: 2013 IEEE 37th Annual Computer Software and Applications Conference (COMPSAC)
By Weifeng Xu,Tao Ding,Hanlin Wang,Dianxiang Xu
Issue Date:July 2013
pp. 27-32
Search-based test generation can automatically produce a large volume of test inputs. However, it is difficult to define the test oracle for each of the test inputs. This paper presents a mining approach to building a decision tree model according to the t...
 
Recommending Web Service Based on User Relationships and Preferences
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Min Gong,Zhaogui Xu,Lei Xu,Yanhui Li,Lin Chen
Issue Date:June 2013
pp. 380-386
With the popularity of social network and the increasing number of Web Services, making individual service recommendation has been a hot research spot nowadays. In this paper, we present a service recommendation algorithm named as URPC-Rec (User Relationsh...
 
Monitoring System Design and Implementation Based on the Internet of Things
Found in: 2013 Fourth International Conference on Digital Manufacturing & Automation (ICDMA)
By Xu Jianguo,Xu Gang,Yan Mengmeng
Issue Date:June 2013
pp. 801-804
This paper introduces the present situation of the development of the electric vehicles and the interface of remote monitoring system of electric vehicles based on the Internet of things, then tells how to code for these functions. This paper mainly solves...
 
Optimal Design and Control of Smart Space Structures: A Memetic Evolution Approach
Found in: IEEE Intelligent Systems
By Dong-Xu Li,Rui Xu
Issue Date:February 2013
pp. 1
Optimal design and control of smart space structures are computational intensive. In traditional design methods, numbers of sensors and actuators required, their positions, and parameters of controllers are selected and optimized sequentially. Hence, only ...
 
Influence of Threshold Segmentation on Star Pair Angular Separation Measurement Accuracy
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Qi Li,Wei Xu,Zhihai Xu,Huajun Feng
Issue Date:January 2013
pp. 635-638
Threshold segmentation and star extraction are important parts of star image processing, the threshold value not only influences the number of segmentation-derived stars but also has a great impact on the accuracy of subsequent star positioning. According ...
 
The Calculation of the Punctuality Rate between Bus Sites Based on AVL Data
Found in: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
By Lin Nan-Nan,Yang Xiao-Guang,Zhou Xue-Mei,Xu Xu
Issue Date:January 2013
pp. 1150-1152
Nowadays, people pay more and more attention on the service quality of public transportation, as well as the research on situations of public transportation arrival on time. This article analyses the feature of AVL data from the GPS system on the bus and r...
 
 1  2 Next >>