Search For:

Displaying 1-43 out of 43 total
Images Features Extraction of Tobacco Leaves
Found in: Image and Signal Processing, Congress on
By Xinhong Zhang, Fan Zhang
Issue Date:May 2008
pp. 773-776
Images features extraction is very important for the grading process of flue-cured tobacco leaves. In this paper, a machine vision techniques base system is proposed for the automatic inspection of flue-cured tobacco leaves. Machine vision techniques are u...
 
Grid-Based Digital Forestry Platform Dynamic Allocation of Resources to Web Services Management Research
Found in: Computer Modeling and Simulation, International Conference on
By Fan Li,Xu Zhang,Fan Zhang,Yong Shan
Issue Date:January 2010
pp. 469-474
This article on platforms in the digital forest resource allocation and management processes. By now the grid environment to how to allocate resources in the research, the field of digital forestry accumulated a large number of the current standard treatme...
 
Fuzzy Database Mining and Information Retrieval A Chaos-Based Fragile Watermarking Scheme with Recovery
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Hongjie He, Jiashu Zhang, Fan Chen
Issue Date:August 2007
pp. 303-307
The digital image over the network is inevitably affected by the channel additive noise. However the existing fragile watermarking techniques with recovery are susceptible to random noise. To overcome this problem, this paper presents a chaos-based fragile...
 
Frequent Itemset Mining on Large-Scale Shared Memory Machines
Found in: Cluster Computing, IEEE International Conference on
By Yan Zhang,Fan Zhang,Jason Bakos
Issue Date:September 2011
pp. 585-589
Frequent Item set Mining (FIM) is a data mining task that is used to find frequently-occurring subsets amongst a database of item sets. FIM is a non-numerical data intensive computation and is frequently used in machine learning and computational biology a...
 
Working Parameters Research of Ram-air Pneumatic Rudder under Vacuum Conditions
Found in: Intelligent Computation Technology and Automation, International Conference on
By Qi Mingsi,Yang Wei,Gong Wenlong,Zhang Wendong,Zhang Fan,Yu Lina
Issue Date:March 2011
pp. 999-1002
The paper generalizes the research actuality and developing trend of rudder at home and abroad, demonstrates steady state fit-itself technique of ram-air pneumatic rudde under vacuum conditions. Aiming at dynamic characteristic of the vacuum air, the paper...
 
The Application of Improved Fuzzy ARTMAP Neural Network in Remote Sensing Classification of Land-use
Found in: MultiMedia and Information Technology, International Conference on
By Yuan Yanbin, Xiong Xianxiao, Zhan Yunjun, Liang Xiao, Zhang Fan, Zhang Xiaopan
Issue Date:April 2010
pp. 35-38
Land-use change is an important area of global change research, rapid and accurate access to land-use temporal and spatial variation information is a key technology to study land-use change. In this paper proposed a method which utilizes the improved model...
 
Research and Security Analysis of Anonymous Identity Authentication in Trusted Computing
Found in: New Trends in Information and Service Science, International Conference on
By Yang Yang, Huanguo Zhang, Fan He, Bo Zhang
Issue Date:July 2009
pp. 409-412
This paper introduces two anonymous identity authentication solution adopted by the Trusted Computing Group, i.e. privacy certification authority (Privacy CA) and direct anonymous attestation scheme (DAA). Both of the two solutions provide a means for remo...
 
Using First Order Logic to Reason about TCG's TPM Specification
Found in: Information Technology and Applications, International Forum on
By Yang Yang, Zhang Huanguo, Xu Shiwei, Zhang Fan
Issue Date:May 2009
pp. 259-263
Trusted Platform Module (TPM) provides the cryptographic functions through the Application Programming Interfaces (APIs). The specification of APIs reflects the security policies of the designers, in order to manage and protect the sensitive information of...
 
ZigBee Based Intelligent Helmet for Coal Miners
Found in: Computer Science and Information Engineering, World Congress on
By Cheng Qiang, Sun Ji-ping, Zhang Zhe, Zhang Fan
Issue Date:April 2009
pp. 433-435
A cost effective ZigBee-based wireless mine supervising system is presented in this article. This scheme used intelligent helmets as voice terminal and ultra-low-power nodes of wireless sensor network.The programme adopted ZigBee wireless technology to bui...
 
Design and Implementation of the Self-Test Module in Web Courses
Found in: Computers in Education, International Conference on
By Yu-Jin Zhang, Fan Jiang, Hao-Ji Hu, Dan Xu
Issue Date:December 2002
pp. 1092
This paper is focused on the design, development and implementation of self-test module and its question units. First, several general considerations in designing the self-test module for web course are introduced and discussed. The factors should be consi...
 
Interference-based Topology Control Algorithm for Delay-constrained Mobile Ad hoc Networks
Found in: IEEE Transactions on Mobile Computing
By xinming zhang,Yue Zhang,Fan Yan,Athanasios Vasilakos
Issue Date:June 2014
pp. 1
As the foundation of routing, topology control should minimize the interference among nodes, and increase the network capacity. With the development of mobile ad hoc networks (MANETs), there is a growing requirement of quality of service (QoS) in terms of ...
 
Research on Short Text Classification Algorithm Based on Statistics and Rules
Found in: Electronic Commerce and Security, International Symposium
By Zhou Faguo, Zhang Fan, Yang Bingru, Yu Xingang
Issue Date:July 2010
pp. 3-7
In this paper, we introduced the overview of short text research and the short text classification firstly. On the foundation of several common used classic text classification algorithms, mainly according to the major feature extraction methods, the short...
 
UBSFQ: An Urgency-Based Start-time Fair Queuing Scheduling
Found in: Communication Software and Networks, International Conference on
By Liu Wen-Bo, Guo Yun-Fei, Ma Hai-long, Zhang Fan
Issue Date:February 2009
pp. 716-720
How to provide a broad range of QoS guarantees in a packet network is an important issue. In order to achieve QoS guarantees, good traffic schedulers are indispensable. In this paper, a packet scheduling discipline UBSFQ and its simulation are proposed. Ac...
 
Combined Symbolic and Concrete Execution of TTCN-3 for Automated Testing
Found in: Information Science and Engieering, International Symposium on
By Xuezhi Xing, Lei Zhang, Fan Jiang, Shaoyin Cheng, Xing Jiang
Issue Date:December 2008
pp. 58-61
Testing procedure can be described by the Testing and Test Control Notation-version 3(TTCN-3). The automatic execution of TTCN-3 test scripts is transformed to automatic testing of system under test (SUT). We propose a framework, which uses combined symbol...
 
Trust of Hardware
Found in: Embedded Software and Systems, International Conference on
By Zhang Fan, Wu Guoqing, Tao Jun, Yuan Mengting, Liu Xiaoli
Issue Date:July 2008
pp. 202-207
Initially, we point out that hardware trust is pretty important to a trusted computing platform based on prior work. Then we propose the notion of measuring hardware trust. We also analyze key factors needed to be considered when designing a hardware-measu...
 
Research of Spatial Data Discovery Technology on Digital Forestry platform
Found in: Grid and Cloud Computing, International Conference on
By Pinghui Yan, Xu Zhang, Fan Li
Issue Date:August 2007
pp. 636-641
Digital forestry platform was introduced and special requirements of spatial data discovery were analyzed in this platform. The hierarchical and distributed architecture of spatial data discovery was put forward. Global metadata model, OLAP-oriented metada...
 
A formal Framework for Trust management of Service-oriented Systems
Found in: Service-Oriented Computing and Applications, IEEE International Conference on
By Liang Zhengping, Liu Xiaoli, Wu Guoqing, Yang Min, Zhang Fan
Issue Date:June 2007
pp. 241-248
Service oriented software development takes service, which is a well-defined function unit and can be purchased from web, as the atomic entity for building software applications. Whereas, considering the particular characteristics of service, the trustwort...
 
Design and Verification of Reconfigurable WEB Cloud Access Device Based on Smart Hybrid Storage
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Zhang Fan,Luo Xing-Guo
Issue Date:June 2013
pp. 1483-1488
Due to the extensiveness of Web services, this paper selects the Web server as a typical example for cloud computing. Through the reconfigurable hardware of Web server and smart hybrid storage design, we study and verify the architecture of cloud server an...
 
Study on Double-Layers Trust System and Model of Trust in P2PEB Mode
Found in: Management of e-Commerce and e-Government, International Conference on
By Zhu Shaolin,Zhang Fan
Issue Date:November 2011
pp. 39-42
The development trend of E-Business is the P2PEB. In this mode, trust is the base to guarantee the normal conduction of the business activity. According to the features of trust between Enterprises, we propose a double layers trust system in P2PEB mode nam...
 
Network Effects and the Stability of Loop Networks
Found in: Information Technology, Computer Engineering and Management Sciences, International Conference of
By Zhang Fan,Liao Xiu Wu
Issue Date:September 2011
pp. 249-253
It is necessary to study the stability, the stability conditions and the formation mechanism, the relationship between the network effect and the loop network existing once the loop network formed because loop network also has the potential to form if conn...
 
Type Synthesis of a Fully Decoupled Parallel Wrist Manipulator
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Zhang Fan, Liu Yan
Issue Date:January 2011
pp. 1068-1071
In this paper, we propose a fully decoupled Three Degree-of-Freedom (DOF) parallel wrist. The theory for type synthesis of fully decoupled parallel mechanism is concluded by reciprocal screw theory, and some symmetrical and asymmetrical 3-DOF parallel wris...
 
Protection against Reactor Inter-Turn Fault with Shunt Capacitance Compensator Based on Voltage Ratio
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Li Menghe, Pan Shenghui, Zhang Fan, Lin Chuan
Issue Date:January 2011
pp. 936-938
Shunt capacitance compensator is the important equipment of power traction system in electrified railway. The series-wound reactor on the compensator is lack of necessary protection against inter-turn fault. The voltage ratio of the capacitor and reactor w...
 
A Method of Traffic Sign Detecting Based on Color Similarity
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Lin Chuan, Pan Shenghui, Zhang Fan, Li Menghe, Ke Baozhong
Issue Date:January 2011
pp. 123-126
In order to detect traffic sign effectively and quickly, firstly, this paper firstly discriminates the maximum and minimum values of the color-components R, G and B, and then ignores pixels having little color similarity with traffic sign. Secondly, it reg...
 
Comparison of BP and Gauss Code Base on Fountain Code
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Zhang Fan, Xu Lixin, Pan Xi
Issue Date:January 2011
pp. 737-740
Fountain codes are erasure channels in superior performance of sparse matrix code. Files are transmitted into multiple small packets, each of which is either received without error or not received. Fountain codes are based on the packets communication. The...
 
A User-Friendly Task Editor Environment for Large-scale Virtual Screening Application
Found in: Grid and Cloud Computing, International Conference on
By Keyin Ruan, Ruisheng Zhang, Fan Ding, Lian Li, Zhili Zhao, Jiazao Lin
Issue Date:November 2010
pp. 93-97
Virtual Screening (VS) is a large-scale parallel Bag-of-Tasks application whose tasks are independent with no data dependency and communication. Grid computing facilitates VS by providing shared computational resources across different international instit...
 
Nominal Position Controller for Permanent Magnet Synchronous Motor System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Yuzeng Zhang, Fan Wang, Mingyin Yan
Issue Date:May 2010
pp. 777-780
A nonlinear position controller for permanent magnet synchronous motor (PMSM) was designed to achieve position tracing control and robust control. The controller included two parts: the model controller and the robust controller. The former was designed to...
 
Robust Tracking Based on PSO and On-line AdaBoost
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Huchuan Lu, Wenling Zhang, Fan Yang, Xiaojing Wang
Issue Date:September 2009
pp. 690-693
Robust tracking is a challenging problem, due to intrinsic appearance variability of objects caused by in-plane or out-plane rotation and extrinsic factors change such as illumination, occlusion, background clutter and local blur. In this paper, we present...
 
Adapting Digital Watermark Algorithm Based on Chaos and Image Fusion
Found in: Intelligent Systems, WRI Global Congress on
By Zhang Fan, Shang Dongfang, Wang Yujing
Issue Date:May 2009
pp. 126-130
An adapting digital watermark algorithm based on the image fusion and chaos is put forward. The steps of the algorithm are: Firstly, the watermark image is pretreated in disorder using the chaos mapping. Then the NVF function of the carrier image is calcul...
 
Notice of Retraction Parallel Design of Cross Search Algorithm in Motion Estimation
Found in: 2009 International Conference on Computer Engineering and Technology (ICCET 2009)
By Zhang Fan
Issue Date:January 2009
pp. 286-290
Notice of Retraction After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. We hereby retract the content of this paper. Reas...
 
Knowledge-Based Document Retrieval in Medical Domain
Found in: Knowledge Acquisition and Modeling, International Symposium on
By Wang Weiming, Chen Shihong, Chen Xi, Zhang Fan
Issue Date:December 2008
pp. 226-230
In this paper, we present a knowledge-based search engine that can assist ordinary users to search for medical information. User prefers to receive comprehensive, relevant information from the search results. An ordinary user is usually unfamiliar with med...
 
Real-time Medical Image Volume Rendering Based on GPU Accelerated Method
Found in: Computational Intelligence and Design, International Symposium on
By Zhang Fan, Xie Mei
Issue Date:October 2008
pp. 30-33
By growing power and flexibility of modern GPU, hardware based volume rendering techniques show their great powers in accelerating rendering. In this paper, we propose a 3D texture base algorithm with local phong lighting model. It load medical image serie...
 
Modeling and Verification of SCTP Association Management Based on Colored Petri Nets
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Jizeng Wang, Shengcai Zhang, Fan Chen
Issue Date:August 2008
pp. 379-383
The Stream Control Transmission Protoco1 (SCTP) is a reliable transport protocol to tackle the limitations of TCP and UDP. SCTP is specified informally in Request For Comments (RFC) 2960, but it still lacks a formal specification. Coloured Petri Net (CPN) ...
 
Hand Gesture Detection and Segmentation Based on Difference Background Image with Complex Background
Found in: Embedded Software and Systems, Second International Conference on
By Qiuyu Zhang, Fan Chen, Xinwen Liu
Issue Date:July 2008
pp. 338-343
The video streams of backgrounds are frequently influenced by the background changes (e.g. illumination changes and changes due to adding or removing parts of the background). Further more, the quality of the foreground and the segmented image of hand gest...
 
Multimodality Medical Image Registration Using Hybrid Optimization Algorithm
Found in: BioMedical Engineering and Informatics, International Conference on
By Hanling Zhang, Fan Yang
Issue Date:May 2008
pp. 183-187
Optimization of a similarity metric is a essential component in multimodality medical image registration. In this paper, a hybrid optimization algorithm is proposed. When dealing with multimodality medical images, the authors search the best matching param...
 
Verification of Strict Integrity Policy via Petri Nets
Found in: Systems and Networks Communication, International Conference on
By Zhao-Li Zhang, Fan Hong, Hai-Jun Xiao
Issue Date:November 2006
pp. 23
Strict Integrity Policy is one of important security policies. In this paper, based on Petri net and Biba Model, the Petri net-based definitions of Strict Integrity Policy are formally described in detail. The Petri net-based definitions and the coverabili...
 
Modeling Chinese Wall Policy Using Colored Petri Nets
Found in: Computer and Information Technology, International Conference on
By Zhao-Li Zhang, Fan Hong, Jun-Guo Liao
Issue Date:September 2006
pp. 162
The Chinese Wall model is a model of a security policy that refers equally to confidentiality and integrity. In this paper, we propose a Colored Petri net modeling technique, which allows one to analyze and verify Chinese Wall Policy in Colored Petri net m...
 
Existence of the Normalized B-basis and a Practical Construction Method of the B-algorithm
Found in: Geometric Modeling and Processing
By Zhang Fan, Kang Baosheng, Ru Shaofeng, Zhou Mingquan
Issue Date:April 2004
pp. 66
Necessary and sufficient conditions for the existence of normalized B-basis on an extended Chebyshev space are presented. A method for constructing a normalized B-basis is given and the symmetry of the normalized B-basis is proved. Furthermore, a practical...
 
coRide: carpool service with a win-win fare model for large-scale taxicab networks
Found in: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys '13)
By Mingming Lu, Tian He, Ye Li, Desheng Zhang, Fan Zhang, Yunhuai Liu
Issue Date:November 2013
pp. 1-14
Carpooling has long held the promise of reducing gas consumption by decreasing mileage to deliver co-riders. Although ad hoc carpools already exist in the real world through private arrangements, little research on the topic has been done. In this paper, w...
     
Human-centered attention models for video summarization
Found in: International Conference on Multimodal Interfaces and the Workshop on Machine Learning for Multimodal Interaction (ICMI-MLMI '10)
By Carlos Faraco, Dajiang Zhu, Degang Zhang, Fan Deng, Hanbo Chen, Kaiming Li, Lei Guo, Stephen Miller, Tianming Liu, Tuo Zhang, Xi Jiang, Xintao Hu
Issue Date:November 2010
pp. 1-8
A variety of user attention models for video/audio streams have been developed for video summarization and abstraction, in order to facilitate efficient video browsing and indexing. Essentially, human brain is the end user and evaluator of multimedia conte...
     
Bridging low-level features and high-level semantics via fMRI brain imaging for video classification
Found in: Proceedings of the international conference on Multimedia (MM '10)
By Arsham Mesbah, Carlos Faraco, Dajiang Zhu, Degang Zhang, Fan Deng, Hanbo Chen, Jinglei Lv, Junwei Han, Kaiming Li, Lei Guo, Li Xie, Stephen Miller, Tianming Liu, Tuo Zhang, Xi Jiang, Xiansheng Hua, Xintao Hu
Issue Date:October 2010
pp. 451-460
The multimedia content analysis community has made significant effort to bridge the gap between low-level features and high-level semantics perceived by human cognitive systems such as real-world objects and concepts. In the two fields of multimedia analys...
     
Acc: generic on-demand accelerations for neighbor discovery in mobile applications
Found in: Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (SenSys '12)
By Desheng Zhang, Fan Ye, Hui Lei, Raghu K. Ganti, Tian He, Yu Gu, Yunhuai Liu
Issue Date:November 2012
pp. 169-182
As a supporting primitive of many mobile device applications, neighbor discovery identifies nearby devices so that they can exchange information and collaborate in a peer-to-peer manner. To date, discovery schemes trade a long latency for energy efficiency...
     
Neighbor discovery with distributed quorum system
Found in: Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys '11)
By Desheng Zhang, Fan Ye, Raghu k. Ganti, Tian He, Yu Gu, Yunhuai Liu
Issue Date:November 2011
pp. 369-370
Quorum-based schemes, e.g., GQS, can ensure asynchronous neighbors to discover each other within bounded time under low-duty-cycle operations. But they are tightly based on the assumption that duty cycles of devices fit some specific prefixed patterns. We ...
     
Identity-based PKI Scheme for Machine Readable Travel Document
Found in: Advanced Information Networking and Applications, International Conference on
By ZHANG Fan, FENG Deng-guo
Issue Date:April 2006
pp. 461-465
Certificate-based Public Key Infrastructure (PKI) scheme of International Civil Aviation Organization (ICAO) has some problems, especially with the distribution of public key. In this paper, we propose an identity-based PKI scheme for Machine Readable Trav...
 
 1