Search For:

Displaying 1-50 out of 61 total
Predication the Suppressing Human Oral Cancer Cell Line by Curcumin through the Research of Fas Receptor
Found in: Bioinformatic and Bioengineering, IEEE International Symposium on
By Po-Yuan Chen,Yu-Chi Wu,Tzu-Hurng Cheng,Tzu-Ching Shih,Cing-Tsan Tsai,Chieh-Hsi Wu,Tzu-Yu Hua,Yen-Yu Huang,Chia-Hsing Cheng,Ming-Jen Fan
Issue Date:October 2011
pp. 209-212
No summary available.
 
MAC Design in MIMO Ad Hoc Networks Based on Three Types of CTS Packets
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Zhao Wang,Li Yu,Hua Yu,Weishan Lu,Fei Ji
Issue Date:October 2011
pp. 800-803
Parallel RTS Processing MAC Protocol (PRP-MAC) can improve network throughput, but data packets are not always sent in a synchronized way. So PRP-MAC still produces the packet collisions in the network, which impact the performance of the network. In this ...
 
Optimize the Data Collection Path in WSNs Based on the Neighbor Count of Path Points
Found in: Communications and Mobile Computing, International Conference on
By Liang He, Guowei Huang, Yu Hua, Jing Yu, Jingdong Xu
Issue Date:April 2010
pp. 308-312
Accomplishing data collection in WSNs by mobile elements (MEs) can reduce the amount of multi-hop communications in the network, which will decrease the energy consumption of sensors and prolong network lifetime. However, this may result in unacceptable da...
 
Bounded LSH for Similarity Search in Peer-to-Peer File Systems
Found in: Parallel Processing, International Conference on
By Yu Hua, Bin Xiao, Dan Feng, Bo Yu
Issue Date:September 2008
pp. 644-651
Similarity search has been widely studied in peer-to-peer environments. In this paper, we propose the Bounded Locality Sensitive Hashing (Bounded LSH) method for similarity search in P2P file systems. Compared to the basic Locality Sensitive Hashing (LSH),...
 
Performance of Diesel Engine Fueled with Ethanol-diesel Blends in Different Altitude Regions
Found in: Digital Manufacturing and Automation, International Conference on
By Ji-Lin Lei, Ze-fei Tan, Shao-hua Liu, Yu-Hua Bi, Li-Zhong Shen
Issue Date:December 2010
pp. 82-85
In order to investigate the effects ethanol-diesel blends and altitude on the performance of diesel engine, the comparative experiments were carried out on the bench of turbo-charged diesel engine fueled with pure diesel (as prototype) and ethanol-diesel b...
 
Emission Characteristics of Diesel Engine Fueled with Ethanol-diesel Blends in Different Altitude Regions
Found in: Digital Manufacturing and Automation, International Conference on
By Ji-Lin Lei, Ze-fei Tan, Shao-hua Liu, Yu-Hua Bi, Li-Zhong Shen
Issue Date:December 2010
pp. 639-643
In order to investigate the effects ethanol-diesel blends and altitude on the emissions of diesel engine, the comparative experiments were carried out on the bench of turbo-charged diesel engine fueled with pure diesel (as prototype) and ethanol-diesel ble...
 
Jiangxi JingDeZhen Manufacturing Chain Reengineering Based Green Concept
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Zhang Yu Hua, Zhang Jian, Zhang Wei Hua
Issue Date:November 2010
pp. 77-79
the establishment of Poyang Lake Ecological Economic Zone is an important measure for national economy sustainable development. Manufacturing chain reengineering (MCR) can transform the traditional manufacturing industry, giving enterprises the ability of ...
 
Discussion of a Smart House Solution Basing Cloud Computing
Found in: Communications and Intelligence Information Security, International Conference on
By Yu Hua Zhang, Jian Zhang, Wei Hua Zhang
Issue Date:October 2010
pp. 244-247
With the increasing pressure from environmental protection, the concept of green living has gradually been accepted. Smart home can provide high quality of life with the lowest environmental cost in the future. This paper aims to present and discuss a solu...
 
A DoS Attack Situation Visualization Method Based on Parallel Coordinates
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Ying-Jie Yang,Yu-Hua Liu
Issue Date:October 2012
pp. 340-344
DoS attack situation changed by many situation elements. To make it easier to network manager's awareness, a DoS attack situation visualization method based on Parallel Coordinates is proposed. In this method, node resource consumption is represented as th...
 
Heterogeneous Resource Selection with Portfolio Optimization in Grid Economy
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Yu Hua, Chanle Wu, Huyin Zhang, Libing Wu
Issue Date:December 2005
pp. 100-102
The problem of resource management and scheduling has always been the main challenge in grid. Grid economy is looked on as a good solution for obtaining better performance than other methods for resource management in dynamic grid environments. But, the de...
 
SANE: Semantic-Aware Namespacein Ultra-Large-Scale File Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua,Hong jiang,Yifeng Zhu,Dan Feng,Lei Xu
Issue Date:May 2014
pp. 1328-1338
The explosive growth in data volume and complexity imposes great challenges for file systems. To address these challenges, an innovative namespace management scheme is in desperate need to provide both the ease and efficiency of data access. In almost all ...
 
Data Similarity-Aware Computation Infrastructure for the Cloud
Found in: IEEE Transactions on Computers
By Yu Hua,Xue Liu,Dan Feng
Issue Date:January 2014
pp. 3-16
The cloud is emerging for scalable and efficient cloud services. To meet the needs of handling massive data and decreasing data migration, the computation infrastructure requires efficient data placement and proper management for cached data. In this paper...
 
MERCURY: A Scalable and Similarity-Aware Scheme in Multi-level Cache Hierarchy
Found in: 2012 IEEE 20th International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Yu Hua,Xue Liu,Dan Feng
Issue Date:August 2012
pp. 371-378
The management of multi-level caching hierarchy is a critical and challenging task. Although there exist many hardware and OS-based schemes, they are difficult to be adopted in practice since they incur non-trivial overheads and high complexity. In order t...
 
Scheduling Heterogeneous Flows with Delay-Aware Deduplication for Avionics Applications
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua,Xue Liu
Issue Date:September 2012
pp. 1790-1802
An avionics network demands determinism and predictability. This is especially challenging because of the relatively low bandwidth of the on-board network, and the emerging needs of heterogeneous flows due to the proliferation of avionics applications. Red...
 
An Improved Uncertainty Measure Method of Rough Sets
Found in: International Symposium on Distributed Computing and Applications to Business, Engineering and Science
By Yu Hua-Jiao,Leng Wen-Hao
Issue Date:October 2011
pp. 396-399
The rough entropy always reduce with the subdivision of knowledge particles when it is used to measure the uncertainty of rough sets, no matter what the knowledge particles come from positive domain, negative domain or boundary domain. so the method rough ...
 
Locality-Sensitive Bloom Filter for Approximate Membership Query
Found in: IEEE Transactions on Computers
By Yu Hua,Bin Xiao,Bharadwaj Veeravalli,Dan Feng
Issue Date:June 2012
pp. 817-830
In many network applications, Bloom filters are used to support exact-matching membership query for their randomized space-efficient data structure with a small probability of false answers. In this paper, we extend the standard Bloom filter to Locality-Se...
 
Semantic-Aware Metadata Organization Paradigm in Next-Generation File Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua,Hong Jiang,Yifeng Zhu,Dan Feng,Lei Tian
Issue Date:February 2012
pp. 337-344
Existing data storage systems based on the hierarchical directory-tree organization do not meet the scalability and functionality requirements for exponentially growing data sets and increasingly complex metadata queries in large-scale, Exabyte-level file ...
 
RFID Integration Re-engineering of Supply Chain
Found in: Information Science and Engieering, International Symposium on
By Zhang Yu Hua, Wu Ke, Zhang Jian
Issue Date:December 2010
pp. 302-305
This paper aims to improve the information collection, transmission and processing efficiency of supply chain RFID system through RFID Integration Reengineering (RIR) of supply chain. In order to obtain the best results, RIR process not only focus on impro...
 
Development of Camshaft Journals Multi-parameters Measuring Instrument
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Lian-Hu Xu, Yi-Bao Yuan, Yu-Hua Wang
Issue Date:September 2010
pp. 1285-1289
Camshaft is the key component of automobile engine valve timing mechanism, whose machining precision will affect overall performance of automobile engine. This paper presents a kind of camshaft journals multi-parameters measuring instrument based on the ac...
 
Combining Foreground / Background Feature Points and Anisotropic Mean Shift For Enhanced Visual Object Tracking
Found in: Pattern Recognition, International Conference on
By Sebastian Haner, Irene Yu-Hua Gu
Issue Date:August 2010
pp. 3488-3491
This paper proposes a novel visual object tracking scheme, exploiting both local point feature correspondences and global object appearance using the anisotropic mean shift tracker. Using a RANSAC cost function incorporating the mean shift motion estimate,...
 
Mapping UML Activity Diagrams to Analyzable Petri Net Models
Found in: Quality Software, International Conference on
By Nianhua Yang, Huiqun Yu, Hua Sun, Zhilin Qian
Issue Date:July 2010
pp. 369-372
To enhance formal analysis, activity diagrams annotated with MARTE stereotypes are mapped into timed colored Petri nets with inhibitor arcs (TCPNIA). The mapping rules for the elements of activity diagrams and MARTE stereotypes are proposed respectively. T...
 
Supporting Scalable and Adaptive Metadata Management in Ultralarge-Scale File Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua, Yifeng Zhu, Hong Jiang, Dan Feng, Lei Tian
Issue Date:April 2011
pp. 580-593
This paper presents a scalable and adaptive decentralized metadata lookup scheme for ultralarge-scale file systems (more than Petabytes or even Exabytes). Our scheme logically organizes metadata servers (MDSs) into a multilayered query hierarchy and exploi...
 
On the Design Ideas of Foreign Language Teaching Reference Information System
Found in: Education Technology and Computer Science, International Workshop on
By Xianhai Yu, Hua Geng
Issue Date:March 2010
pp. 632-635
With the rapid development of computer technology and network technology, a new kind of teaching reference information platform has got mushroom growth in higher education through combining paper resources and network resources. After analyzing the current...
 
SmartStore: a new metadata organization paradigm with semantic-awareness for next-generation file systems
Found in: SC Conference
By Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng, Lei Tian
Issue Date:November 2009
pp. 1-12
Existing storage systems using hierarchical directory tree do not meet scalability and functionality requirements for exponentially growing datasets and increasingly complex queries in Exabyte-level systems with billions of files. This paper proposes seman...
 
Membership-Based Access Control for Trust Negotiation in Open Systems
Found in: Information Assurance and Security, International Symposium on
By Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo
Issue Date:August 2009
pp. 189-192
Nowadays applications are mostly service oriented and cross-boundary, entities involved in the access control process are usually unfamiliar, so traditional access control mechanism, which basically uses the identity of the involved entities to control aut...
 
Structural Equation Model for Brand Image Measurement of Jeans
Found in: Hybrid Intelligent Systems, International Conference on
By Shu-Jen Hu, Sin-Ying Jou, Yu-Hua Liu
Issue Date:August 2009
pp. 89-94
This research is to probe into the jeans' brand image. In this study, we regard the brand image sources as the input, the customer's brand loyalty as the output and the brand asset valuator (BAV) model as the middle treatment of procedures, and then build ...
 
BR-Tree: A Scalable Prototype for Supporting Multiple Queries of Multidimensional Data
Found in: IEEE Transactions on Computers
By Yu Hua, Bin Xiao, Jianping Wang
Issue Date:December 2009
pp. 1585-1598
Multidimensional data indexing has received much research attention recently in a centralized system. However, it remains a nascent area of research in providing an integrated structure for multiple queries on multidimensional data in a distributed environ...
 
Spatial Distribution of Heavy Metals in Agricultural Soil in Wutan, China
Found in: Environmental Science and Information Application Technology, International Conference on
By Yu-Hua Li, Hong-Bin Liu, Wei Wu
Issue Date:July 2009
pp. 501-504
Total of 120 soil samples from the topsoil (0-20cm) at an approximate interval of 100 m were collected in Wutan, China, to determine the spatial variability of five heavy metals, Cd, As, Hg, Pb, and Cr, with classical statistical and geostatistical analyse...
 
Web-Based Distributed Certification System of Green Food
Found in: Environmental Science and Information Application Technology, International Conference on
By Wang Qiang, Yu Hua, Zhang Hui, Ma Xinming
Issue Date:July 2009
pp. 494-496
The National Green Food certification is an important measure of food safety. Green Food certification system simplifies the whole certification process, improves the efficiency, and provides an easy access to data query based on Web GIS. And this system i...
 
Block-Matched Based Scalable Video Coding
Found in: Information Processing, Asia-Pacific Conference on
By Yang Yang, Yu-Hua Peng, Yun-Xia Liu, Li-Xin Tang
Issue Date:July 2009
pp. 177-180
In this paper, the motion estimation technique used in video compression is extended to intra-frame coding of scalable video coding, for which we called it the Block-Matching based image compression. Using a small amount of sampled data in the spatial doma...
 
Study on the Security of Time-Stamping Service Architecture
Found in: Electronic Commerce and Business Intelligence, International Conference on
By Wei Guo, Yu Hua, Ke xin Song
Issue Date:June 2009
pp. 28-32
NTSC and Uni-trust are constructing the public Time-Stamping service platform of China. In this paper, we present the architecture of Time-Stamping service and analyze the threats are encountered in each Time-Stamping system. Then we propose a modified arc...
 
A Storage Scheme of Native XML Database Supporting Efficient Updates
Found in: Database Technology and Applications, International Workshop on
By Chenying Wang, Xiaojie Yuan, Shitao Yu, Hua Ning, Huibin Zhang
Issue Date:April 2009
pp. 522-525
XML storage schemes have become an important research topic in the XML data management field. Several alternatives to manage XML documents exist, ranging from file systems over relational or other database systems to native XML database systems. This paper...
 
Using Parallel Bloom Filters for Multiattribute Representation on Network Services
Found in: IEEE Transactions on Parallel and Distributed Systems
By Bin Xiao, Yu Hua
Issue Date:January 2010
pp. 20-32
One widely used mechanism for representing membership of a set of items is the simple space-efficient randomized data structure known as Bloom filters. Yet, Bloom filters are not entirely suitable for many new network applications that support network serv...
 
Using Hybrid Parsing Models as Predictors for a Symbolic Parser
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Jianhui Wang, Qizhe Quan, Jian Yu, Hua Pang
Issue Date:December 2008
pp. 895-899
We have presented an architecture for the fusion of information contributed from a variety of components which are either based on expert knowledge or have been trained on quite different data collections. The results of the experiments show that there is ...
 
The Establishment of an Integrated Management Model - An Experience in Taiwan Hospital
Found in: Advanced Computer Theory and Engineering, International Conference on
By Yu-Hua Yan, Shuo-fen Hsu, Shih-Chieh Fang, Chih-ming Kung
Issue Date:December 2008
pp. 322-326
In the present study, the secondary data analysis was utilized to evaluate the efficiency of the integrated management model (IMM) on the pap smear test for screening of the women's uterine cervical cancer. The data of female patients receiving a pap smear...
 
Intelligent Aging Estimation Method for Lead-Acid Battery
Found in: Intelligent Systems Design and Applications, International Conference on
By Yu-Hua Sun, Hurng-Liahng Jou, Jinn-Chang Wu
Issue Date:November 2008
pp. 251-256
Abstract -In this paper, an intelligent aging estimation method based on Sample Entropy (SampEn) is proposed for the lead-acid batteries serially connected in a string. This method can prevent the potential battery failure and guarantee the battery availab...
 
Electronic Time Stamping Safety and Efficiency Optimize Technique Research
Found in: Electronic Commerce and Security, International Symposium
By Hong-Jiao Ma, Yu Hua, Wei Guo
Issue Date:August 2008
pp. 1033-1036
Chinese UniTrust TimeStamp Authority is a trusted and professional time stamping service institution that was constructed by National Time Service Center (NTSC) and UNITRUST in 2007. Application of trusted time stamping in e-Commerce, e-Government and digi...
 
Scalable and Adaptive Metadata Management in Ultra Large-Scale File Systems
Found in: Distributed Computing Systems, International Conference on
By Yu Hua, Yifeng Zhu, Hong Jiang, Dan Feng, Lei Tian
Issue Date:June 2008
pp. 403-410
This paper presents a scalable and adaptive decentralized metadata lookup scheme for ultra large-scale file systems (≥ Petabytes or even Exabytes). Our scheme logically organizes metadata servers (MDS) into a multi-layered query hierarchy and exploits grou...
 
Blind Equalization Algorithm Based on Compensation Fuzzy Neural Network
Found in: Image and Signal Processing, Congress on
By Ying Xiao, Zhen Xing Li, Yu Hua Dong
Issue Date:May 2008
pp. 75-79
Blind equalization based on compensation fuzzy neural network has proposed. It using compensation neurons to get tradeoff between negative and active operation, thus the network can be training using fuzzy rule of initial right or wrong setting, and fault ...
 
Multi-dimensional range query for data management using bloom filters
Found in: Cluster Computing, IEEE International Conference on
By Yu Hua, Dan Feng, Ting Xie
Issue Date:September 2007
pp. 428-433
Providing range query as basic network services has received much research attention recently. Range query can exhibit all items located within a certain range. Previous approaches to represent and query items, such as Distributed Hash Tables (DHT) or R-tr...
 
Group Key Management in Grid Environment
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Zhi-Dong Shen, Xiao-Ping Wu, Yu-Hua Wang, Wen-Ling Peng, Huan-Guo Zhang
Issue Date:June 2006
pp. 626-631
Grid manages resources and services distributed across multiple control domains. Grid computing provides people the way to share large mount of distributed resources and services that belong to different local domain. It also makes security problems more c...
 
Efficient Online Schedulability Tests for Real-Time Systems
Found in: IEEE Transactions on Software Engineering
By Tei-Wei Kuo, Li-Pin Chang, Yu-Hua Liu, Kwei-Jay Lin
Issue Date:August 2003
pp. 734-751
<p><b>Abstract</b>—Many computer systems, such as those for open system environments or multimedia services, need an efficient schedulability test for online admission control of new jobs. Although various polynomial time schedulability t...
 
Parallel Computation of the Euclidean Distance Transform on a Three-Dimensional Image Array
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu-Hua Lee, Shi-Jinn Horng, Jennifer Seitzer
Issue Date:March 2003
pp. 203-212
<p><b>Abstract</b>—In a two- or three-dimensional image array, the computation of <it>Euclidean distance transform</it> (EDT) is an important task. With the increasing application of 3D voxel images, it is useful to consider t...
 
Frequency-Occupation and Throughput Analysis of Hybrid Spread Spectrum (DS/FH) Network
Found in: Advanced Information Networking and Applications, International Conference on
By Xiaogang Yu, Hua Wang, Hui Xu, Jingming Kuang
Issue Date:March 2003
pp. 547
This paper introduced a system employing hybrid DS/FH spread spectrum (SS) coupled with RS forward error-control coding. By the flexible redefinition of frequency-occupation and frequency-collision event, the frequency-occupation probability of DS/FH SS ne...
 
Fast Computation of the 3-D Euclidean Distance Transform on the EREW PRAM Model
Found in: Parallel Processing, International Conference on
By Yu-Hua Lee, Shi-Jinn Horng, Jennifer Seitzer
Issue Date:September 2001
pp. 0471
Abstract: In a two or three-dimensional image array, the computation of Euclidean distance transform (EDT) is an important task. With the increasing application of 3D voxel images, it is useful to consider the distance transform of a 3D digital image array...
 
Fast parallel chessboard distance transform algorithms
Found in: Parallel and Distributed Systems, International Conference on
By Yu-Hua Lee, Shi-Jinn Horng
Issue Date:June 1996
pp. 488
In this paper, based on the diagonal propagation approach, we first provide an O(N2) time sequential algorithm to compute the chessboard distance transform (CDT) of an N X N image, which is a DT using the chessboard distance metrics. Based on the proposed ...
 
The chessboard distance transform and the medial axis transform are interchangeable
Found in: Parallel Processing Symposium, International
By Yu-Hua Lee, Shi-Jinn Horng
Issue Date:April 1996
pp. 424
The distance transform (DT) and the medial axis transform (MAT) are two image computation tools used to extract information about the shape and position of foreground pixels relative to each other. Extensively applications of these two transforms are used ...
 
Some image processing algorithms on a RAP with wider bus networks
Found in: Parallel Processing Symposium, International
By Shung-Shing Lee, Shi-Jinn Horng, Horng-Ren Tsai, Yu-Hua Lee
Issue Date:April 1996
pp. 708
Based on the reconfigurable array of processors with wider bus networks (Li et al., 1995), we propose a series of algorithms for image processing. Conventionally, only one bus is connected between two processors but in this machine it has a set of buses. S...
 
The Design and Implementations of Locality-aware Approximate Queries in Hybrid Storage Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yu Hua,Bin Xiao,Xue Liu,Dan Feng
Issue Date:February 2015
pp. 1
Cloud computing applications face the challenges of dealing with a huge volume of data that needs the support of accurate and fast approximate queries to enhance system scalability and improve quality of service. Locality-sensitive hashing (LSH) can suppor...
 
ANTELOPE: A Semantic-Aware Data Cube Scheme for Cloud Data Center Networks
Found in: IEEE Transactions on Computers
By Yu Hua,Xue Liu,Hong Jiang
Issue Date:September 2014
pp. 2146-2159
Today’s cloud data centers contain more than millions of servers and offer high bandwidth. A fundamental problem is how to significantly improve the large-scale system’s scalability to interconnect a large number of servers and meanwhile support various on...
 
 1  2 Next >>