Search For:

Displaying 1-50 out of 220 total
A Tracking Algorithm Based on Fractional Differential Gradient within 3D Image
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Ma Yu,Zhang Yanning,Liang Huiling,Xu Shuang,Yu Ting
Issue Date:May 2012
pp. 696-699
Based on fractional derivative gradient, tracking operator is proposed to extract three-dimensional boundary surface within biomedical image. Firstly, the gradient and zero-crossing are calculated via the integer order derivative to extract the main struct...
 
Study on Characteristics of Palygorskite in Purification of Petroleum Contaminated Groundwater
Found in: Digital Manufacturing and Automation, International Conference on
By Sheng-yu Zhang, Yu-Ling Zhang, Xiao-si Su, Fan Song
Issue Date:December 2010
pp. 451-454
The natural paly gorskite modified was as reactive media of PRB. Based on the investigation of effect of specific hydro chemical factors, such as Fe2+, Fe3+, Mn2+, NO3-, SO42- etc.,on remediation efficiency of petroleum contaminated groundwater, the dynami...
 
Impulse response of export price to production cost based on data mining
Found in: Computer Science and Information Technology, International Conference on
By Yu Zhang, Yu Zhao, Chunjie Qi
Issue Date:August 2009
pp. 52-56
Influence of production cost on export price is always the hot topic of foreign trade research. Previous researches just use original series to establish models but not fully discover information content of time series signals. Taking China's citrus trade ...
 
Notice of Retraction Cost Comparison and Control Based on GLM and Panel Data Model: Evidence from Major Citrus Producing Areas in China
Found in: 2009 IITA International Conference on Services Science, Management and Engineering (SSME)
By Yu Zhang, Yu Zhao, Chunjie Qi
Issue Date:July 2009
pp. 340-343
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
 
Process Component Composition for Dynamic Process Adaptation and Lazy Binding
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Jing Li,Beijun Shen,Yu Zhang,Yu Zhang
Issue Date:January 2013
pp. 1065-1068
This paper puts forward a process component composition method to support dynamic component composition and lazy binding. Three types of composition are proposed to facilitate the process component development. The constraints for the process component com...
 
An Efficient Mechanism for Querying Offline Map Database on Smartphones
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Anhua Lin,Jianzhong Zhang,Yu Zhang,Zhicheng Wang,Gang Yu
Issue Date:October 2012
pp. 76-81
With the growing popularity of smart phones and the richness of Geographic information databases, map-based applications have become an indispensable part in people's daily life. However there is a common problem in online maps which is the high consumptio...
 
Numerical Simulation on
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Yu Zhang, Shengjie Niu, Huaying Yu, Luqing Zhang, Hanqiong Lao
Issue Date:December 2008
pp. 253-256
With the non-hydrostatic mesoscale meteorological model (MM5), the maximum intensity of blood-causing torrential rain occurred in the Leizhou Peninsula from Aug. 8 to 11 in 2007 is simulated. The result shows that the simulated rainfall intensity has a goo...
 
Digital Image Watermark Algorithm in the Curvelet Domain
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Zhi-yu Zhang, Wei Huang, Jiu-long Zhang, Hai-yan Yu, Yan-jun Lu
Issue Date:December 2006
pp. 105-108
Watermark is a new effective digital copyright protection method and data security technology. In this paper, a digital image watermark algorithm operating in the curvelet domain is proposed. Unequally-Spaced Fast Fourier Transforms (USFFT) is employed to ...
 
Measurement of the Weibo Hall of Fame Network
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Guo Hao,Lu Yu-liang,Wang Yu,Zhang Tong-tong
Issue Date:October 2011
pp. 192-195
Weibo, a micro-blogging service provided by Sina at Sep. 2009, attracts over a hundred million users and is growing fast. Though Weibo user publishes any topic within the 140-character limit and follows others to receive their statuses as Twitter user does...
 
A Scheduling Algorithm Based on Task Complexity Estimating for Many-Task Computing
Found in: Semantics, Knowledge and Grid, International Conference on
By Yingnan Li, Xianguo Wu, Jian Xiao, Yu Zhang, Huashan Yu
Issue Date:November 2010
pp. 121-128
There is a very important class of applications which is named Many-Task Computing (MTC). For a lot of MTC applications, a large number of independent tasks which differ significantly on task complexities will be generated. This brings a great challenge fo...
 
Transaction Behavior and Volatility of Price Signals in Futures Market
Found in: Electronic Commerce and Security, International Symposium
By Yu Zhao, Yu Zhang, Chunjie Qi
Issue Date:May 2009
pp. 79-83
Taking soybean futures on Dalian Commodity Exchange for example, the paper studies the relationship between transaction behavior of agricultural futures investors and volatility of futures price. Most previous researches use parametric models to study pric...
 
Research on AI Planning Based Modeling Method for Area Traffic Signal Control
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Chenmu Yu, Shuhua Liu, Yu Zhang, Jie Liu
Issue Date:April 2009
pp. 555-558
In this paper an area signal control model based on temporal planning is presented. Every activity of area signal control is modeled using planning domain definition language, and then the domain model of area signal control is established. Aiming at the r...
 
Computer Simulation of Dynamic Brittle Damage Process in Arch Dam due to Blast Load
Found in: Computer Science and Information Engineering, World Congress on
By Gong Yu, Zhang Wo-hua, Jin Xian-yu
Issue Date:April 2009
pp. 144-148
In this paper a three dimensional finite element analysis of anisotropic brittle dynamic damage mechanism problem for arch dam and rock foundation subject to attack of a blast load has been carried out.The concept of damage strain energy release rate has b...
 
The Interaction between Chinese Export Price and World Import Price of Tangerines
Found in: Informatics in Control, Automation and Robotics, International Asia Conference on
By Yu Zhao, Yu Zhang, Chunjie Qi
Issue Date:February 2009
pp. 393-397
With the accelerating of economic globalization, the effect of foreign factors on Chinese tangerines export is more and more obvious, which is mainly expressed as the fluctuation of Chinese tangerines export price. The article uses SVAR, impulse response a...
 
Prediction Model of Stock Market Returns Based on Wavelet Neural Network
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Yu Zhao, Yu Zhang, Chunjie Qi
Issue Date:December 2008
pp. 31-36
The traditional prediction model is not able to achieve a satisfying prediction effect in the problem of a non-linear system and nonstationary financial signal. The existing wavelet neural network has overcome the deficiency of traditional prediction model...
 
Analysis on Price Fluctuation of Horticulture Products Based on DWT and SVAR
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Yu Zhao, Yu Zhang, Chunjie Qi
Issue Date:December 2008
pp. 166-171
Interaction between world import price and Chinese export price can reflect the openness of Chinese market. Firstly, the paper uses multiresolution analysis to analyze price signal and decomposes them into approximations and details, and then eliminates no...
 
Research on the Source of Grain Output Growth Based on SFA Model
Found in: Future Information Technology and Management Engineering, International Seminar on
By Yu Zhao, Yu Zhang, Chunjie Qi
Issue Date:November 2008
pp. 414-418
This article has estimated the stochastic frontier production function of grain farming through building a parallel data model. It has divided the growth source of grain output into factor input, technical progress and technical efficiency. The research in...
 
GE-CKO: A Method to Optimize Composite Kernels for Web Page Classification
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Jian-Tao Sun, Ben-Yu Zhang, Zheng Chen, Yu-Chang Lu, Chun-Yi Shi, Wei-Ying Ma
Issue Date:September 2004
pp. 299-305
Most of current researches on Web page classification focus on leveraging heterogeneous features such as plain text, hyperlinks and anchor texts in an effective and efficient way. Composite kernel method is one topic of interest among them. It first select...
 
An Automatic Surface Extraction for Volume Visualization
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Ma Yu, Zhang Yanning, Wang Xiyuan, Yao Rui, Li Zhenxing
Issue Date:January 2011
pp. 387-390
This paper describes a novel automatic 3D surface extraction method for biomedical volume images. In this technique, the region of interesting (ROI) in 2D slice images is selected interactively, 3D ROI edge surface is determined by using Lap lace operator ...
 
Content-Based Trust Mechanism for E-commerce Systems
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Yu Zhang, Huajun Chen, Xiaohong Jiang, Hao Sheng, Linhua Zhou, Tong Yu
Issue Date:December 2008
pp. 1181-1186
Previous trust mechanisms are mainly focused on reputational models based on explicit trust ratings. However, the large amount of system-provided and user-generated content published on Web is often ignored. These information is very important for providin...
 
A Junk Mail Filtering Method Based on LSA and FSVM
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Jing-tao Sun, Qiu-yu Zhang, Zhan-ting Yuan, Wen-han Huang, Xiao-wen Yan, Jian-she Dong
Issue Date:October 2008
pp. 111-115
When we apply SVM (Support Vector Machine) method to filter spam, there will be a problem that data sets are too large to be solved in the algorithm. So we present a novel approach which is a method of combination of LSA (Latent semantic analysis) and FSVM...
 
A Trust Management Model Based on Multi-agent System
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Wang Yu, Zhang Qiuyue, Jiang Ying
Issue Date:August 2008
pp. 449-453
In the distributing environment, trust is very important for enterprises cooperation. Therefore, in the electronic commerce system, it becomes the key problem to promote enterprise cooperate, which is how to collect necessity of the information for ensurin...
 
TSSP: A Reinforcement Algorithm to Find Related Papers
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Shen Huang, Gui-Rong Xue, Ben-Yu Zhang, Zheng Chen, Yong Yu, Wei-Ying Ma
Issue Date:September 2004
pp. 117-123
Content analysis and citation analysis are two common methods in recommending system. Compared with content analysis, citation analysis can discover more implicitly related papers. However, the citation-based methods may introduce more noise in citation gr...
 
Damage Diagnosis of Radial Gate Based on RBF Neural Networks
Found in: Computer Science-Technology and Applications, International Forum on
By Zhang Jianwei, Zhao Yu, Zhang Yina, Zhang Longfei
Issue Date:December 2009
pp. 399-402
Damage diagnosis and health monitoring of large-scale structures are becoming a hot research subject in the present structural engineering circle. Aimed at many operating safe problems of hydraulic structure, a method applied to radial gate is put forward....
 
Research on Trust Issue of Current Chinese C2C E-commerce: Problems and Solutions
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yu Zhang
Issue Date:June 2012
pp. 1423-1428
Nowadays, e-commerce industry has developed very rapidly in China. Despite current trading volume continuing to rise, China's e-commerce now is faced with many challenges, among which trust is one of the biggest issues. In this paper, we conduct an empiric...
 
Research of the Computer Virus Evolution Model Based on Immune Genetic Algorithm
Found in: Computer and Information Science, ACIS International Conference on
By Lihua Wu,Yu Zhang
Issue Date:May 2011
pp. 9-13
Inspiration form biological immune mechanism, this article gives the formal definition of computer virus in the gene model. Based on immune genetic algorithm, a evolution model of computer virus is proposed, and also the evolution operators which include s...
 
Automatic Detection Model of Malware Signature for Anti-virus Cloud Computing
Found in: Computer and Information Science, ACIS International Conference on
By Lihua Wu,Yu Zhang
Issue Date:May 2011
pp. 73-75
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of malware over the Internet, generating their signatures for detecting via anti-virus (AV) scan engines becomes an important reactiv...
 
Reactive on-board regulation of cognitive radios
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Yu Zhang, Arati Baliga, Wade Trappe
Issue Date:June 2010
pp. 1-6
Malicious users may reprogram cognitive radios to disregard how their actions may harm other users. To cope with such threats, we propose that cognitive radios must have a trusted domain, which contains an onboard regulation mechanism (ORM) that 'regulates...
 
Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications
Found in: IEEE Transactions on Mobile Computing
By Yu Zhang, Zhibin Wu, Wade Trappe
Publication Date: March 2010
pp. N/A
In this paper, we introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points and an abundance of service requests that result from the nodes mo...
 
Formal Reasoning about Concurrent Assembly Code with Reentrant Locks
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Ming Fu, Yu Zhang, Yong Li
Issue Date:July 2009
pp. 233-240
This paper focuses on the problem of reasoning about concurrent assembly code with reentrant locks. Our verification technique is based on concurrent separation logic (CSL). In CSL, locks are treated as non-reentrant locks and each lock is associated with ...
 
Semi-Supervised Discriminant Analysis using robust path-based similarity
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Yu Zhang, Dit-Yan Yeung
Issue Date:June 2008
pp. 1-8
Linear Discriminant Analysis (LDA), which works by maximizing the within-class similarity and minimizing the between-class similarity simultaneously, is a popular dimensionality reduction technique in pattern recognition and machine learning. In real-world...
 
Notice of Violation of IEEE Publication Principles. Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Jian-Hua Song, Fan Hong, Yu Zhang
Issue Date:December 2006
pp. 497-502
Notice of Violation of IEEE Publication Principles “Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks”, by Jian-Hua Song, Fan Hong, and Yu Zhang in the Proceedings of the Seventh IEEE International Conference on Parallel and...
 
Profile Distribution Characteristics of Total Nitrogen and Soil Organic Matter in Different Types of Land Use in Baiyangdian Lake
Found in: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA)
By Yong-Tao Zhang,Bao-Shan Cui,Yan Lan,Zhen Han,Ting-Ting Wang,Yu Zhang,Ya-Li Tong
Issue Date:January 2013
pp. 1069-1073
Baiyangdian Lake is one of the biggest freshwater wetland in North China. However, in recent years, Baiyangdian Lake was disturbed and utilized intensively, resulting in its land-use types changed greatly, which might change the characteristics of the nutr...
 
A Method of Buried Pipeline Route Detection Based on the Geomagnetic Field
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Wei Zhao,Zhoumo Zeng,Shili Chen,Yu Zhang,Jinsheng Zhang
Issue Date:March 2012
pp. 34-37
A method of buried pipeline route detection based on the geomagnetic field was discussed in this paper. Firstly, the phenomenon of geomagnetic field shielded by buried pipeline of different direction was analyzed. Then the mathematical relationship between...
 
Electronic Anticorruption Implementation Model Design Based on the Pilot Testing of Hubei
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Yu Zhang,Wei Zhang,Bing Wang
Issue Date:November 2011
pp. 267-272
This study attempts to propose a framework of electronic anticorruption work based on Hubei's initiatives during the period of 2008-2011. The research follows the pilot testing projects of anticorruption in different administrative levels in Hubei, and ana...
 
E-government Application in Combating Corruption: China's Case
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Wei Zhang,Yu Zhang,Bo Wang
Issue Date:November 2011
pp. 246-250
This study attempts to summarize Chinese governmental initiatives on electronic anti-corruption system construction by a comprehensive survey on official websites of NBCP(National Bureau of Corruption Prevention of China) and MoS (Ministry of Supervision) ...
 
A Steganography Scheme Based on Fractal Images
Found in: Networking and Distributed Computing, International Conference on
By Huaxiong Zhang,Jie Hu,Gang Wang,Yu Zhang
Issue Date:September 2011
pp. 28-31
In order to improve the security of steganography system, this paper presents a scheme of steganography based on fractal images. This method makes use of good properties of creation of fractal images, such as ease of generation, sensitive dependence on the...
 
Control Traffic Analysis of On-Demand Routing Protocol in Mobile Ad-hoc Networks
Found in: Networking and Distributed Computing, International Conference on
By ZhiLin Zhang,Yu Zhang
Issue Date:September 2011
pp. 272-277
This paper presents a general model for analyzing the characteristics of routing control traffic and the influences of changing network parameters on these characteristics in mobile ad-hoc networks that use on-demand routing protocols. It provides an analy...
 
The Prediction of Surface Layer Ozone Concentration Using an Improved AR Model
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Wen-Yu Zhang,Ting-Ting Han,Zeng-Bao Zhao,Jin Zhang,Yan-Feng Wang
Issue Date:September 2011
pp. 72-75
In order to forecast the surface layer ozone concentration in the eastern coastal cities of China, an improved autoregressive method is used to dispose the ozone concentration data observed in November, 2008 in Tianjin, China in this paper. First the data ...
 
Research and Application on Methods of Virtual Assembly Based on Inventor
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Li Zhang, Yu Zhang
Issue Date:November 2010
pp. 621-624
Today's product manufacturing is developing toward to the automation and digitization. The assembly is an important link of product life cycle, and virtual assembly is an important component of virtual manufacturing, too. Using computer simulation and virt...
 
Multiple Chirp-Rate Modulation Based on Fractional Fourier Transform
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Qi-Ming Zhao, Qin-Yu Zhang, Nai-Tong Zhang
Issue Date:September 2010
pp. 688-691
A novel modulation scheme called Multiple Chirprate-Shift Keying (MCrSK) is proposed, which uses different chirp-rates to represent symbols. Due to the Fractional Fourier Transform (FrFT) properties of the chirp signals, a noncoherent demodulation method o...
 
Promoting Effects of Network Class in Probability
Found in: Information Technology and Computer Science, International Conference on
By Zhang Meng, Bai Yu, Zhang Yan, Wang Xiaojing
Issue Date:July 2010
pp. 556-559
To investigate the effects of studying with network class and find out the virtues of network class, one hundred and sixty-seven students from the same grade and the same college who studied probability at the same time were enrolled in the study. They wer...
 
Leakage Reduction of Power-Gating Sequential Circuits Based on Complementary Pass-Transistor Adiabatic Logic Circuits
Found in: Innovative Computing and Communication and Asia-Pacific Conference on Information Technology and Ocean Engineering, International Conference on
By Weiqiang Zhang, Yu Zhang, Shi Xuhua, Jianping Hu
Issue Date:January 2010
pp. 282-285
Leakage dissipation is more and more dominant. Limiting leakage power consumption becomes an important factor in IC designs. This paper presents a reduction technique of leakage consumption for adiabatic sequential circuits based on two-phase CPAL (complem...
 
Modeling Internet Link Delay Based on Measurement
Found in: Electronic Computer Technology, International Conference on
By Hongli Zhang, Yu Zhang, Ying Liu
Issue Date:February 2009
pp. 420-424
Understanding Internet link delay is an important key of taking full advantage of Internet resources. In this paper, we find that the link delay follows Gammadistribution using Maximum Likelihood Estimation based on data measured in a large-scale network. ...
 
Design Of Fuzzy Neural Network Controller For Marine Steam Turbine System
Found in: International Conference on Natural Computation
By Qidan Zhu, Yu Zhang, Jingqiao Zhang
Issue Date:October 2008
pp. 353-356
Due to the complication of marine steam turbine system, and the nonlinearity, uncertainty and complexity of the steam turbine model, the conventional speed regulation system can no longer meet our requirement. Fuzzy Neural Network (FNN) is applied to the c...
 
Solution to Traveling Agent Problem Based on Improved Ant Colony Algorithm
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Jun Ma, Yu Zhang, Jianpei Zhang, Lili Cheng
Issue Date:August 2008
pp. 57-60
Traveling agent problem solves the problem of planning out an optimal migration path when agents migrate to several hosts, which is a complex combinatorial optimization problem. In this paper, an improved ant colony algorithm is presented. A mutation opera...
 
On Destination Set in IP-Level Topology Measurement
Found in: International Conference on Networking
By Yu Zhang, Bin-xing Fang, Hong-li Zhang
Issue Date:April 2008
pp. 168-173
We present a thorough investigation of four issues with the destination set in IP-level topology measurement. 1) To evaluate the completeness of the destination set, we measured by brute force and found that a half of edges will be missed by the uniform ra...
 
An Improved Physically-Based Method for Geometric Restoration of Distorted Document Images
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Li Zhang, Yu Zhang, Chew Tan
Issue Date:April 2008
pp. 728-734
In document digitization through camera-based systems, simple imaging setups often produce geometric distortions in the resultant 2D images because of the non-planar geometric shapes of certain documents such as thick bound books, rolled, folded or crumple...
 
Using Trust Metric to Detect Malicious Behaviors in WSNs
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Zhang Mingwu, Yang Bo, Qi Yu, Zhang Wenzheng
Issue Date:August 2007
pp. 104-108
In order to enhance transaction security in wireless sensor networks, it is important to evaluate nodes? trustworthiness. Malicious nodes may strategically alter their behavior for concealing malicious behavior and prompting their reputation. Collusive or ...
 
Discrete Decentralized Supervisory Control for Underwater Glider
Found in: Intelligent Systems Design and Applications, International Conference on
By Yu Zhang, Liang Zhang, Tiejun Zhao
Issue Date:October 2006
pp. 103-106
In order to independently undertake complex missions in unstructured and unknown undersea environment, artificial intelligence techniques are needed to provide underwater glider with ability of active autonomy. Based on the RW (Ramadge & Wonham) superv...
 
 1  2 Next >>