Search For:

Displaying 1-50 out of 72 total
A New Decision-Feedback Equalizer Based on a Mixed Blind Equalization Algorithm
Found in: Services Science, Management and Engineering, IITA International Conference on
By Wei Rao, Fei Xia, Yuan-yuan Liu, Wen-qun Tan, Hui-jun Xu, Kang-ming Yuan, Jian-bing Liu
Issue Date:July 2009
pp. 396-399
A new Decision-Feedback Equalizer (DFE) is proposed to overcome Inter-Symbol Interference (ISI) faster in the communication system without the aid of training sequences. Unlike the conventional DFE, the feedforward filter component and the feedback filter ...
Series Equalizer Based on Constant Modulus Algorithm and Decision-Directed Algorithm
Found in: Information Processing, Asia-Pacific Conference on
By Wei Rao, Jian-bing Liu, Yuan-yuan Liu, Wen-qun Tan, Hui-jun Xu, Kang-ming Yuan, Guo-xing Dai
Issue Date:July 2009
pp. 153-156
A new series equalizer based on Constant Modulus Algorithm (CMA) and Decision-directed (DD) algorithm is proposed to overcome Inter-Symbol Inter-ference (ISI) much better in the communication system without the aid of training sequences. The proposed equal...
A Research of Applying Cognitive Load Theory to Science Education Webpage
Found in: 2012 IEEE 12th International Conference on Advanced Learning Technologies (ICALT)
By Chia-Ju Liu,Yuan-Cheng Lin,Bao-Yuan Liu,Yu-Yi Chang
Issue Date:July 2012
pp. 77-79
This study employed three units, ¡§Air and Combustion¡¨, ¡§Heat Effects toward Substances¡¨, and ¡§Healthy Diet¡¨, from the Science Education Website set by the Ministry of Education (Tainan) to assist students¡¦ learning. This multifunctional website offe...
The Realization of New Automatic Vacuum Casting System
Found in: Machine Vision and Human-machine Interface, International Conference on
By Jie Huang, Qing Xi Hu, Yuan Yuan Liu, Hai Guang Zhang, Zhao Fu Chi, Da Li Liu
Issue Date:April 2010
pp. 646-649
The development of vacuum casting equipment and vacuum casting technology at home and abroad are summarized; key techniques and technical difficulties that affect the quality of the product and efficiency in the casting process are analyzed in this paper. ...
Accelerating HMMer on FPGAs using systolic array based architecture
Found in: Parallel and Distributed Processing Symposium, International
By Yanteng Sun,Peng Li,Guochang Gu,Yuan Wen,Yuan Liu,Dong Liu
Issue Date:May 2009
pp. 1-8
HMMer is a widely-used bioinformatics software package that uses profile HMMs (Hidden Markov Models) to model the primary structure consensus of a family of protein or nucleic acid sequences. However, with the rapid growth of both sequence and model databa...
A New Immunization Strategy for Complex Network
Found in: Chaos-Fractals Theories and Applications, International Workshop on
By Hua Chai,Yuan-yuan Liu,Sen Lin,Hai Yu,Zhi-liang Zhu
Issue Date:October 2011
pp. 152-155
A new threaded-tree immunization method is proposed in this paper. It refers to searching out highly connected nodes in the network to immunize, by querying a random selected initial node to get its neighbors and then do the same thing to these neighbor no...
A Matrix-Based Method for Evaluating ISP Network Performance
Found in: Education Technology and Computer Science, International Workshop on
By Ye-kui Qian, Ming Chen, Yuan-yuan Liu, Yu-ming Zhou
Issue Date:March 2009
pp. 193-197
ISP network performance evaluation is very important to the improvement of application performance, the optimum competition of ISP network and the operation and management of Internet. ISP network consists of one or several autonomous systems (AS), so AS i...
A GOP-Adaptive Priority-Based Rate-Distortion Optimization Bitstream Extraction Algorithm for Scalable Video Coding
Found in: Computer Science and Software Engineering, International Conference on
By Chunhua Li, Chun Yuan, Yuan Liu, Yuzhuo Zhong
Issue Date:December 2008
pp. 246-249
Bitstream extraction is an important issue in scalable video coding (SVC). In this paper, we propose an effective GOP-adaptive priority-based Rate-Distortion optimization extraction algorithm. The main feature of this scheme is being able to achieve the gl...
Two-Way Coupling Optimization of Power Source Structure Based on the Constraint of SO2 Emission
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Ying-ling Shi, Yuan-yuan Liu, Hong-song Yang
Issue Date:November 2008
pp. 260-264
For a long time, China's coal-based energy structure, as well as thermal-power-led power structure, has caused serious environmental pollution problems. As the proportion of China’s power source structure is not so reasonable, it receives growing attention...
Classifier Learning Algorithm Based on Genetic Algorithms
Found in: Innovative Computing ,Information and Control, International Conference on
By Li-yan Dong, Guang-yuan Liu, Sen-miao Yuan, Yong-li Li, Zhen Li
Issue Date:September 2007
pp. 126
The paper addresses the problem of classification. A restricted BAN classifier learning algorithm GBAN based on genetic algorithm is proposed. Genetic algorithm is used in this new algorithm to study the network structure, this can reduce complexity of cal...
Experimental Scalability Evaluation of Unbalanced-Nodes PC Cluster
Found in: Innovative Computing ,Information and Control, International Conference on
By Zhen Liu, Haruno Hinata, Hiroyuki Hirano, Xiangshi Ren, Yuanning Liu, Jia Liu
Issue Date:September 2007
pp. 127
When a PC cluster is extended with new nodes, if a good scalability can keep is focused, especially in unbalanced-nodes PC cluster. In this paper, an experimental scalability evaluation of unbalanced- nodes PC cluster is illustrated. The results are also c...
Link Probability Based Opportunistic Routing Metric in Wireless Network
Found in: Communications and Mobile Computing, International Conference on
By Yanhua Li, Yuan-an Liu, Pengkui Luo
Issue Date:January 2009
pp. 308-312
Opportunistic routing is a new design trend of wireless network routing protocol. It takes good advantages of the broadcast nature of wireless network. The source can use multiple potential paths to deliver the packets to the destination. The routing metri...
An Image Matching Algorithm Based on SIFT and Improved LTP
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Yi-Ming Liu,Li-Fang Chen,Yuan Liu,Hao-Tian Wu
Issue Date:December 2013
pp. 432-436
SIFT is one of the most robust and widely used image matching algorithms based on local features. But the key-points descriptor of SIFT algorithm have 128 dimensions. Aiming to the problem of its high dimension and complexity, a novel image matching algori...
Research on the Dispatching Technical Supporting System in Smart Grid
Found in: Internet Computing and Information Services, International Conference on
By Yang Jiashi,Xiao Xinquan,Liu JunYong,Huang Yuan,Liu Jingjing
Issue Date:September 2011
pp. 347-352
Dispatching being the core of the power operation and control, intelligent dispatching is the key point of the construction of unified and strong smart grid. Introducing the concept and implementation of the smart grid and intelligent dispatching, this art...
The Kinematic Analysis and Parametric Design of Beam Pumping Unit Based on ADAMS
Found in: Digital Manufacturing and Automation, International Conference on
By Yuan Liu,Haitao Wu,Hongbin Liu
Issue Date:August 2011
pp. 1296-1300
This paper used the ADAMS mechanical systems dynamic simulation to estabLish the virtual prototype model of CYJY12-4.2-73-type beam-pumping unit. Through some parameters calculation and movement analysis, we obtained the rules of suspension point displacem...
Research on the Technology of Network Intrusion Detection Based on Modified D-S Evidence Theory
Found in: Software Engineering, World Congress on
By Li-li Liu, Yuan Liu
Issue Date:May 2009
pp. 447-450
This paper presents a network anomaly detector based on Improved Dempster-shafer D-S) evidence theory, thus improving the reliability and rationality of the result, it achieves low false alarm rate and missing rate, and high performance of the algorithm is...
Multi-Robot Cooperated Sensor Networks Hierarchical Expanding Deployment and Perception Architecture
Found in: Informatics in Control, Automation and Robotics, International Asia Conference on
By Zhigang Bing, Qiong Dang, Jingtai Liu, Yuan Liu
Issue Date:February 2009
pp. 191-195
As complex and powerful systems, mobile robots can be used to cooperate with WSNs, whose nodes have restricted resource. Considering the vulnerability of traditional architecture for robot cooperated sensor networks deployment and perception with respect t...
Research on an Improved Active Shape Models
Found in: Intelligent Information Technology Application Workshops, International Symposium on
By Qingyan Liu, Yuan Liu
Issue Date:December 2008
pp. 401-404
Active Shape Models (ASM) is one of powerful tools for feature extraction. A new method to construct local appearance model is developed using the information of neighbor landmark points in this paper. This improved method is evaluated on ORL face database...
A Novel Algorithm on Iris Identification Based on Tree-structured Wavelet Transform with Dominant Frequency Energy
Found in: Innovative Computing ,Information and Control, International Conference on
By Yuanning Liu, Xiaodong Zhu, Jing Chen, Zhen Liu
Issue Date:September 2007
pp. 130
A new iris identification algorithm with tree- structured wavelet transform and dominant frequency channel energy is represented in this paper . After the iris image is preprocessed firstly, the normalized iris texture image is obtained and the wavelet is ...
Morphological Zerotree Compression Coding Based on Integer Wavelet Transform for Iris Image
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Yuanning Liu, Xiaodong Zhu, Lingge Sui, Zhen Liu
Issue Date:May 2007
pp. 277-282
After comparing features of the EZW and the MRWD which are famous wavelet image compression code algorithm, we present an algorithm in view of iris texture characteristic. This algorithm is based on integer wavelet transformation while it has less bit plan...
Study on Planning and Design of University Buildings Based on Architectural Environment
Found in: 2013 Fourth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA)
By Liu Jiacheng,Xu Songzhi,Liu Yuan,Liu Gang,Peng Tao
Issue Date:November 2013
pp. 587-589
Comfort demands are increasing while at the same there is a need for energy reduction and the use of renewable energy sources within Smart Grids. Functionality of Buildings Energy Management Systems (BEMS) need re-evaluation in the context of smart grid en...
Reversible Image Watermarking Using a Diagonal Structure for Prediction
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Hao-Tian Wu,Yuan Liu,Yiu-Ming Cheung
Issue Date:December 2013
pp. 508-513
This paper presents a study on the prediction-based reversible data hiding for digital images. By adopting a diagonal structure for prediction, a large number of pixels in the host image can be predicted and further modified for data embedding. Two predict...
Wormhole Canvas
Found in: 2013 Ninth International Conference on Computational Intelligence and Security (CIS)
By Ruimin Lyu,Yuan Liu,Lei Meng,Xinyue Hu
Issue Date:December 2013
pp. 542-544
On physical canvas, color can only diffuse in the continuous 2D space. To break this constraint, this paper proposes wormhole canvas, on which the pervasive one-way wormholes can continually teleport color to distant locations. Various results show that di...
Benchmark Driven Virtual Desktop Planning: A Case Study from Telecom Operator
Found in: 2012 International Conference on Cloud and Service Computing (CSC)
By Feng Wang,Yuan Liu,Baohua Lei,Jun Li
Issue Date:November 2012
pp. 204-211
Virtual desktop is an emerging technology of cloud computing, which has been widely adopted and deployed in the industry. But current virtual desktop planning is not efficient when scaling out, because there are relatively immature methodology and few tool...
An Optimized SVM Model for Detection of Fraudulent Online Credit Card Transactions
Found in: 2012 International Conference on Management of e-Commerce and e-Government (ICMeCG)
By Wei Xu,Yuan Liu
Issue Date:October 2012
pp. 14-17
In order to identify the credit card fraudulent transactions, in this paper we propose an optimized SVM model for detection of fraudulent online credit card model. The model use non-liner SVM and RBF for the sparse transaction data, and use grid algorithm ...
Performance Analysis of Data Gathering Protocol Using PRISM
Found in: 2012 17th International Conference on Engineering of Complex Computer Systems (ICECCS)
By Kang He,Hongli Yang,Yachao Feng,Yuan Liu,Zongyan Qiu
Issue Date:July 2012
pp. 96-105
Recent developments in processor, memory and radio technologies have made it possible to apply Wireless Sensor Network (WSN), which consists of nodes with limited computing capability and energy, to gather various information, for instance, to gather water...
Research on Tiny Leak System for Oil Transmission Pipelines
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Bohua Li,Shili Chen,Wei Zhao,Shixu Guo,Yuan Liu
Issue Date:March 2012
pp. 587-591
Generally speaking, the traditional tiny leak detection methods are limited in their ability to survey long reaches of the oil transmission pipelines effectively, highly cost and pose serious risks in blocking the pipeline, etc. So an improved detection sy...
Towards completely automatic decoder synthesis
Found in: Computer-Aided Design, International Conference on
By Hsiou-Yuan Liu,Yen-Cheng Chou,Chen-Hsuan Lin,Jie-Hong R. Jiang
Issue Date:November 2011
pp. 389-395
Upon receiving the output sequence streaming from a sequential encoder, a decoder reconstructs the corresponding input sequence that streamed to the encoder. Such an encoding and decoding scheme is commonly encountered in communication, cryptography, signa...
A Real-Data-Stimulated Simulation Assessment Method for P2P-Assisted Telecom IPTV Systems
Found in: Network Computing and Information Security, International Conference on
By Xiuyan Jiang, Yinshu Pu, Yuan Liu, Dejian Ye, Guanzhong Lv, Qing Xiao
Issue Date:May 2011
pp. 339-342
With China Telecom IPTV system rapidly expanding, reducing operating and deployment costs has become an important issue. To improve IPTV transmission efficiency, using P2P technology is one of the possible solutions. This paper presents a new real-data-sti...
Thermal Analysis and Stress Analysis of the Heat-Exchange Pipe Based on ANSYS
Found in: Information and Computing Science, International Conference on
By Fenhua Li, Jian Xing, Yuan Liu
Issue Date:April 2011
pp. 283-285
ANSYS to be as a finite element analysis software has powerful features in thermal analysis and structural analysis. Based on ANSYS thermal analysis function, this paper selects SOLID90 unit, for thermal analysis on the heat-exchange pipe of heat exchanger...
Vibration Damper Recognition of Transmission System Based on Unmanned Aerial Vehicles
Found in: Asia-Pacific Power and Energy Engineering Conference
By Yuan Liu, Lijun Jin
Issue Date:March 2011
pp. 1-3
Regular Abstract of Concept Lattice in Network Communication
Found in: Multimedia Communications, International Conference on
By Ma Yuan,Liu Zhangang,Zhou Chengyi
Issue Date:August 2010
pp. 49-52
The web page in network communication were partitioned to Hub web page and Authority web page. Simplifying the H-A web page set was more researched by making abstract method in this paper. Existing condition of the regular abstract was deeply researched an...
An Extended Throughput Analysis Model for SCTP with Scalable Congestion Control
Found in: Information Technology and Applications, International Forum on
By Cao Yuan, Liu Changhua
Issue Date:July 2010
pp. 365-368
The technologies of Wireless local networks and cellular network are very popular and more and more service under the integrated heterogeneous environment. Stream Control Transmission Protocol (SCTP) is considered as an ideal to support the communication b...
Design and Implementation of Communication Network based on AT89C52 Microcomputer
Found in: Information Technology and Computer Science, International Conference on
By Sun Yuan, Liu Bingwu
Issue Date:July 2010
pp. 421-424
A network configuration of monitoring system of RS-485 Bus is represented based on the characteristic of small enterprise. The network nodes based on AT89C52 microcomputer are used at production line and build a monitoring network with PC. This paper prese...
An Extended Automata to Efficiently Match Counting Constraints Patterns
Found in: International Conference on E-Business and E-Government
By Yao Yuan,Liu Peng,Zhang Zheng,Wang Hui,Gou Cheng Cheng
Issue Date:May 2010
pp. 2018-2022
Regular expression matching is an important application in the area of network security. In this paper, we analyse the limitation of the existing methods and show the classification of counting constraints patterns. We then present a new representation for...
H-infinity Control Theory in Vehicle Diesel Fuel Injection Pump Control System Design
Found in: Machine Vision and Human-machine Interface, International Conference on
By QinZhou Niu, Yuan Liu
Issue Date:April 2010
pp. 98-100
Diesel engine fuel pump servo regulator is a larger factor by changing the parameters of car. The control system uses solenoid coils to control the fuel regulator location of the overflow population. Containing linear servo solenoid coil is immersed in oil...
H-infinity Controller for Discrete-Time Systems
Found in: Machine Vision and Human-machine Interface, International Conference on
By Jianwei Ji, Yuan Liu
Issue Date:April 2010
pp. 95-97
The H∞ output feedback control problems of discrete control system is discussed in this paper. The existing methods of the coefficient matrix requirements for the control system are too strict. The new controller design method is given. With the relevant l...
Carrier Frequency Offset Estimation Using PN Sequence Iteration in OFDM Systems
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Jianghua Wei, Yuan Liu
Issue Date:April 2010
pp. 405-409
Carrier frequency synchronization is the critical technique in orthogonal frequency division multiplexing (OFDM) systems. In this paper, an improved carrier frequency offset (CFO) estimation method is proposed, which divides the Schmidl’s CFO estimation in...
An Event-Based Wireless Navigation and Healthcare System for Group Recreational Cycling
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Kun-Ming Yu, Jiayi Zhou, Cheng-Yan Yu, Jian-Yuan Liu, Chi-Chung Lee, Hsin-Wen Chang, Hung-Nien Hsieh
Issue Date:December 2009
pp. 294-298
Recreational cycling is a popular leisure activity in which the cyclist mostly is involved for a whole day at a time. This makes safety and comfort some of the most important factors to be attended to, especially when cycling in group. Group recreational c...
Open Identity Management Framework for SaaS Ecosystem
Found in: E-Business Engineering, IEEE International Conference on
By Wang Bin, Huang He Yuan, Liu Xiao Xi, Xu Jing Min
Issue Date:October 2009
pp. 512-517
As Software-as-a-Service (SaaS) becomes more and more popular, the identity management and federation among SaaS applications also become an important factor impacting the growth of SaaS ecosystem. Typically, there are three major functions to be enabled i...
An Experimental Study on Electrocardiography toward Emotion Recognition
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Bin Wang, Guang-Yuan Liu
Issue Date:August 2009
pp. 104-108
Emotion recognition is becoming an increasingly important field for human affective computing. This paper presented a method of emotion recognition using Electrocardiography (ECG) signal obtained from multiple subjects. ECG signals were collected when film...
5-Axis A-Spline Iterpolation Function and Its Realization Strategy
Found in: Information Technology and Computer Science, International Conference on
By Zhen-yu Han, Yuan Liu, Yong-zhang Wang, Hong-ya Fu
Issue Date:July 2009
pp. 213-216
The current 5-axis coordinated linear interpolation method results in low-speed, low-accuracy and enormous numerical control (NC) files in sculptured surface machining. An instruction format with AKIMA spline curves suitable for 5-axis coordinated real-tim...
Open Architecture CNC Software Package and Key Technology
Found in: Information Technology and Computer Science, International Conference on
By Yuan Liu, Yong-zhang Wang, Hong-ya Fu, Zhen-yu Han
Issue Date:July 2009
pp. 225-228
To meet the need of advanced manufacturing technique, an open computer numerical control (CNC) software package for CNC machining is developed. Module library of the software package was of tree structure with a depth of 5. Terminal nodes of the tree were ...
A Method of Emotion Recognition Based on ECG Signal
Found in: Computational Intelligence and Natural Computing, International Conference on
By Ya Xu, Guang-Yuan Liu
Issue Date:June 2009
pp. 202-205
Emotion recognition from Electrocardiography (ECG) signal has become an important research topic in the field of affective computing. In the current work, ECG signals from multiple subjects were collected when film clips shown to them, and then feature set...
Fast Path Searching in Real Time 3D Game
Found in: Intelligent Systems, WRI Global Congress on
By Siyuan Chen, Guangshun Shi, Yuan Liu
Issue Date:May 2009
pp. 189-194
This paper presents an efficient path searching system implemented in real time 3D game scene. Our method focus on the base element in 3D models – polygons and mesh, treat the scene as a 3D surface. Through the connectivity analyzes of these polygons, we c...
Annotating Web Pages for Semantic Web
Found in: Computer Science and Information Engineering, World Congress on
By Yuan Liu, Li Zhanhuai, Zhang Longbo, Chen Shiliang
Issue Date:April 2009
pp. 16-20
Adding semantic annotation for web page is the foundation on constructing Semantic Web. Lexical patterns based annotation methods are adopted by most of the semantic annotation systems. The structures and visual features of web pages imply valuable semanti...
SENS-U: Remote Human in Loop Health-Monitoring System at Home
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By An Yuan, Liu Yan, Ma Cai-wen, Sun Li-min, Xiao Zhi-feng
Issue Date:December 2008
pp. 441-445
Personal health status is becoming a matter of concern while pressure of work growing gradually in everyday life, in the meantime, the ageing population needs more attention. Thanks to many challenging problems of Wireless Sensor Networks (WSNs) solved, ex...
A Concept-Relation Vector Model Based Method for Web Document Retrieval
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Yuan Liu, Li Zhanhuai, Zhang Longbo, Chen Shiliang
Issue Date:December 2008
pp. 196-200
Semantic information has been paid much attention in web IR. Although many researches have improved the retrieval performance by employing WordNet synset and concept, relations between concepts are often ignored by most of the semantic retrieval methods. W...
Hybrid QPSO Based Wavelet Neural Networks for Network Anomaly Detection
Found in: Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on
By Ruhui Ma, Yuan Liu, Xing Lin
Issue Date:December 2007
pp. 442-447
In this paper, a novel hybrid algorithm based wavelet neural network (WNN) is proposed for network anomaly detection. This new evolutionary algorithm, which is based on a hybrid of Quantum-Behaved Particle Swarm Optimization (QPSO) and conjugate gradient a...
Efficient Built-In Self-Test Schemes for Video Coding Cores: a Case Study on DCT/IDCT Circuits
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Shyue-Kung Lu, Ting-Yu Chen, Wei-Yuan Liu
Issue Date:December 2006
pp. 97-104
Owing to the rapid advance in semiconductor fabrication technology, a large number of transistors can be incorporated onto a single chip. However, this will reduce the controllability and observability of the chip significantly. Consequently, testing such ...
 1  2 Next >>