Search For:

Displaying 1-50 out of 137 total
Intelligent Energy Management Based on Driving Cycle Identification Using Fuzzy Neural Network
Found in: Computational Intelligence and Design, International Symposium on
By Tian Yi, Zhang Xin, Zhang Liang, Zhang Xinn
Issue Date:December 2009
pp. 501-504
Hybrid Electric Vehicles (HEV) is becoming the important develop tendency of the vehicle for its better fuel economy and emission. The parameters of HEV control strategy is always optimized on some one standardized driving cycle, but the different city hav...
 
Intelligent Energy Management Based on the Driving Cycle Sensitivity Identification Using SVM
Found in: Computational Intelligence and Design, International Symposium on
By Zhang Liang, Zhang Xin, Tian Yi, Zhang Xinn
Issue Date:December 2009
pp. 513-516
Hybrid Electric Vehicles (HEV) offer the ability to significantly reduce fuel consumptions and emission. Management of energy is one of essential elements in the implementation of hybrid electric vehicles. Engine and motor should satisfy the driver’s deman...
 
Gene expression data classification based on non-negative matrix factorization
Found in: Neural Networks, IEEE - INNS - ENNS International Joint Conference on
By Chun-Hou Zheng, Ping Zhang, Lei Zhang, Xin-Xin Liu, Ju Han
Issue Date:June 2009
pp. 3542-3547
With the advent of DNA microarrays, it is now possible to use the microarrays data for tumor classification. Yet previous works have not use the nonnegative information of gene expression data. In this paper, we propose a new method for tumor classificatio...
 
Research on Hierarchial Fuzzy Behavior Learning of Autonomous Robot
Found in: International Conference on Internet Computing in Science and Engineering
By Ziying Zhang, Rubo Zhang, Xin Liu
Issue Date:January 2008
pp. 43-46
Aiming at the changing and dynamic unstructured environments of autonomous robot, this paper analyses these kinds of effects on robot in details and thus presents a local plan architecture based on Hierarchical fuzzy logic to implement the basic navigation...
 
An Improved Method for Similar Handwritten Chinese Character Recognition
Found in: Intelligent Information Technology and Security Informatics, International Symposium on
By Fang Yang, Xue-Dong Tian, Xin Zhang, Xin-Biao Jia
Issue Date:April 2010
pp. 419-422
Similar characters existed in Chinese character affect much on enhancing the handwritten Chinese character recognition rate. An improved method is presented in this paper, which combines structural and statistical features for similar handwritten Chinese c...
 
Information Security Risk Assessment Methodology Research: Group Decision Making and Analytic Hierarchy Process
Found in: Software Engineering, World Congress on
By Zhang Xinlan, Huang Zhifang, Wei Guangfu, Zhang Xin
Issue Date:December 2010
pp. 157-160
Information security risk can be measured by probability of the potential risk incident and its impact. Various quantitative methodologies are given to compute information security risks, but among the existed research, seldom of them considered the diffic...
 
PTSA Event Scheduling Algorithm of CEP-Based RFID Tracking and Locating System
Found in: Information and Computing Science, International Conference on
By Guangqian Zhang, Li Zhang, Xin Liu
Issue Date:May 2009
pp. 98-102
RFID-based tracking and locating system faces many challenges. In order to solve the problem, we build a model of RFID-based tracking and locating system which is based on complex event processing, that is BCEPS model. BCEPS model consists of physical devi...
 
Computer Technology on Geological Modeling on the Upper Second Member of Shahejie Formation in the Eastern Pucheng Oilfield
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Shujuan Xu, Jinliang Zhang, Xin Zhang, Xueping Ma
Issue Date:December 2008
pp. 222-225
Facies are important in reservoir modeling because the petrophysical properties of interest are highly correlated with facies type. The knowledge of facies constrains the range of variability in porosity and permeability. This paper presents a stochastic m...
 
A Semi-automatic Extraction Algorithm of Lung Lobar Fissures from HRCT Images Using Ridgelet
Found in: BioMedical Engineering and Informatics, International Conference on
By Guodong Zhang, Xin Zhang, Hong Zhao, Peiyu Yan
Issue Date:May 2008
pp. 850-854
The pulmonary fissures are the boundaries between the lobes in the lungs. They are useful for the analysis of pulmonary conformation and the diagnosis of lung disease on a lobar level. This paper introduces a technique for the semi-automatic extraction of ...
 
A New Performance Metric for Construction of Robust and Efficient Wireless Backbone Network
Found in: IEEE Transactions on Computers
By Ziyi Zhang,Xin Wang,Qin Xin
Issue Date:October 2012
pp. 1495-1506
With the popularity of wireless devices and the increasing demand of network applications, it is emergent to develop more effective communications paradigm to enable new and powerful pervasive applications, and to allow services to be accessed anywhere, at...
 
Improvement and Application of HAZOP Analysis for Batch Process with SDG
Found in: Intelligence Information Processing and Trusted Computing, International Symposium on
By Xin Xu, Beike Zhang, Xin Ma, Chongguang Wu
Issue Date:October 2010
pp. 390-394
Hazard and Operability (HAZOP) analysis is a systematic procedure for determining the abnormal causes of process deviations from normal behavior and their adverse consequences in a chemical plant. A computer-aided HAZOP analysis software platform based on ...
 
uSD: An SD-Based Mobile Gateway to Wireless Sensor Network
Found in: Future Networks, International Conference on
By Chunxiao Jiang, Xin Zhang, Xin Ma, Yong Ren, Canfeng Chen, Jinfeng Zhang, Jian Ma
Issue Date:January 2010
pp. 34-38
This paper presents an SD-based mobile gateway to wireless sensor network (WSN), named uSD, which aims at helping users with mobile terminals to access WSN conveniently and efficiently. The prefix
 
Identifying Consensus Tags in Social Tagging Systems
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Kening Gao,Yin Zhang,Bin Zhang,Xin Jin,Pengwei Guo
Issue Date:December 2011
pp. 917-923
Social Tagging is a free but also uncontrolled way to index and organize Web 2.0 resources. Many works have been proposed to leverage such tagging information. However, although previous studies have shown that users could reach consensus on which tags sho...
 
SecDM: Securing Data Migration between Cloud Storage Systems
Found in: Dependable, Autonomic and Secure Computing, IEEE International Symposium on
By Qingni Shen,Lizhe Zhang,Xin Yang,Yahui Yang,Zhonghai Wu,Ying Zhang
Issue Date:December 2011
pp. 636-641
with the development of cloud computing, cloud security issues have recently gained traction in the research community. Although much of the efforts are focused on securing the operation system and virtual machine, or securing data storage inside a cloud s...
 
A Unified Intelligent Model for Software Project Risk Analysis and Planning
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Yong Hu, Xiangzhou Zhang, Xin Sun, Jing Zhang, Jianfeng Du, Junkai Zhao
Issue Date:November 2010
pp. 110-113
Software project development still faces high failure rate. Nowadays, researches on software project risk majorly remain in risk theoretical model, risk identification and risk analysis, lacking empirical models which unify risk analysis and risk planning ...
 
A Study of the Employability-Based Talent Cultivating Pattern
Found in: International Conference on E-Business and E-Government
By Xiaobing Zhang,Shiyun Zhang,Xin Zou
Issue Date:May 2010
pp. 892-895
Challenged by the educational system reform, changes in psychological contracts, boundaryless career development, and flattening organizational structure, employability has become the new talent standard. The employability-based talent cultivating pattern ...
 
Research on H.264 Standard Stream Media Files over 3G Wireless Networks Based on DaVinci Platform
Found in: International Conference on E-Business and E-Government
By Zhang Xin,Zhang ZhengPing
Issue Date:May 2010
pp. 4279-4282
For transmission of multimedia over 3G wireless networks, H.264/AVC represents a major step forward in the development of video coding standards. In this paper, firstly, the authors briefly introduce a overview of H.264/AVC standard and propose the related...
 
Study on Expressing Principles of Semantics in Product Design
Found in: Computer Technology and Development, International Conference on
By Zhang Xin,Zhang Jianwu,Yang Mei
Issue Date:November 2009
pp. 433-436
Product semantics is a tool in product design to generate newer, better and more meaningful forms. Consumer preference and perception of products strongly influence a product's acceptability. Both are expressed by words that may be studied using product se...
 
Fuzzy-Genetic Control Strategy of Hybrid Electric Vehicle
Found in: Intelligent Computation Technology and Automation, International Conference on
By Tian Yi, Zhang Xin, Zhang Liang
Issue Date:October 2009
pp. 720-723
Hybrid Electric Vehicles (HEV) is becoming the important develop tendency of the vehicle for its better fuel economy and emission. And design and implementation of Energy Control Strategy become one of the most important problems of the HEV. A fuzzy contro...
 
Multi-robot Formation Control Based on Behavior
Found in: Computer Science and Software Engineering, International Conference on
By Ziying Zhang, Rubo Zhang, Xin Liu
Issue Date:December 2008
pp. 1045-1048
Aiming at the shortcomings of following leader's method based on the feedback control, behavior-based feedback laws have been introduced in multi-robot formation control. Through the experiment based on the AmigoBot platform, it is proved that the method c...
 
Perceptually-adaptive Motion Compensated Temporal Filtering
Found in: Multimedia and Expo, IEEE International Conference on
By Dongdong Zhang, Xin Ma, Wenjun Zhang, Xiaokang Yang, Songyu Yu
Issue Date:July 2006
pp. 833-836
We propose a perceptually-adaptive motion compensated temporal filtering (MCTF) method to enhance the visual quality of 3D wavelet video coding schemes with spatial-domain MCTF. In our scheme, a spatio-temporal masking model in image domain is incorporated...
 
The Image Compression Method Based on Adaptive Segment and Adaptive Quantified
Found in: Innovative Computing ,Information and Control, International Conference on
By Shi-Qiang Zhang, Shu-Fang Zhang, Xin-Nian Wang, Yan Wang
Issue Date:June 2008
pp. 353
Abstract Abstract Abstract An image compression method based on adaptive segment and adaptive quantified is presented in this paper.The image is divided into smooth and detail areas using the multi-threshold-segmentation method based on the potential funct...
 
Study of Finite Radon Transform in Face Recognition
Found in: Computer Modeling and Simulation, International Conference on
By Yuhua Zhang, Xin Wang
Issue Date:January 2010
pp. 29-32
A novel feature extraction method based on finite Radon transform (FRAT), soft threshold (ST), and two dimensional maximum margin criterion (2DMMC) was proposed. The framework of the proposed method consists of three steps: First, each face image was proje...
 
A Multiple Instance Learning Approach for Content Based Image Retrieval Using One-Class Support Vector Machine
Found in: Multimedia and Expo, IEEE International Conference on
By Chengcui Zhang, Xin Chen, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
Issue Date:July 2005
pp. 1142-1145
Multiple Instance Learning (MIL) is a special kind of supervised learning problem that has been studied actively in recent years. In this paper, we propose an approach based on One-Class Support Vector Machine (SVM) to solve MIL problem in the region-based...
 
Invalidating Idealized BGP Security Proposals and Countermeasures
Found in: IEEE Transactions on Dependable and Secure Computing
By Qi Li,Xinwen Zhang,Xin Zhang,Purui Su
Issue Date:August 2014
pp. 1
Border Gateway Protocol (BGP) is vulnerable to routing attacks because of the lack of inherent verification mechanism. Several secure BGP schemes have been proposed to prevent routing attacks by leveraging cryptographic verification of BGP routing updates....
 
Event Characterization and Prediction Based on Temporal Patterns in Dynamic Data System
Found in: IEEE Transactions on Knowledge and Data Engineering
By Wenjing Zhang,Xin Feng
Issue Date:January 2014
pp. 144-156
The new method proposed in this paper applies a multivariate reconstructed phase space (MRPS) for identifying multivariate temporal patterns that are characteristic and predictive of anomalies or events in a dynamic data system. The new method extends the ...
 
A Hierarchical Data Visualization Algorithm: Self-Adapting Sunburst Algorithm
Found in: 2013 International Conference on Virtual Reality and Visualization (ICVRV)
By Gong Li-Wei,Chen Yi,Zhang Xin-Yue,Sun Yue-Hong
Issue Date:September 2013
pp. 185-190
Sunburst is a hierarchical data visualization method which is filled by radial sectors, for the problem that sectors of Sunburst are placed in disorder and space utilization rate is low, Self-Adapting Sunburst Algorithm (SASA) has been proposed. Nodes are ...
 
Multiview Video Coding Based on Wavelet Pyramids
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Di Wu,Huyin Zhang,Xin Li,Jing Wang
Issue Date:June 2013
pp. 225-228
In this paper, we propose a scalable multiview video coding (MVC) algorithm based on Wavelet Pyramids and Set Partitioning in Hierarchical Tree (SPIHT) codec. This algorithm first uses the Mallat pyramid method to decompose the original images into subband...
 
How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model
Found in: Hawaii International Conference on System Sciences
By Wei Zhang,Xin Luo,Stephen D. Burd,Alessandro F. Seazzu
Issue Date:January 2012
pp. 2374-2380
To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we propose a study on victimization by phishing based on the Heuristic-Sys...
   
Resource allocation for MIMO-OFDM video transmission systems based on joint source-channel coding
Found in: Software Maintenance and Reengineering, European Conference on
By Chengwen Zhang, Xin Liu, Xuezhi Tan
Issue Date:August 2011
pp. 196-199
To improve the performance of MIMO-OFDM video transmission systems on the limitation of wireless bandwidth and transmit power, we propose a resource allocation algorithm with joint source-channel coding (JSCC) based on H.264 video compression standard and ...
 
Study on the Application of H-Infinity Control to Double-Layer Vibration Isolation System
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Zeng Qianghong, Zhu Shijian, Luo Jingjun, Zhang Xin
Issue Date:August 2010
pp. 274-279
Double-layer vibration isolation device can significantly reduce the vibration of machinery and equipment delivered to the base or the environment. However, the passive approach is difficult to isolate the low-frequency vibration effectively. Active vibrat...
 
A Survey of Plant Recognition Method Based on Image Processing
Found in: Electrical and Control Engineering, International Conference on
By Juan Zhang, Xin-yuan Huang
Issue Date:June 2010
pp. 4974-4977
With the development of digital forestry, image processing and pattern recognition technology have been extensively used in the study of forestry research. It is currently a hot research that automatic plant recognition by use of computer. In some develope...
 
Modeling Software Park Knowledge Network
Found in: International Conference on E-Business and E-Government
By Liu Hongli,Hu Jing,Zhang Xin
Issue Date:May 2010
pp. 1856-1859
Building Software Park to develop software industry is widely used around the world. Software park knowledge network plays an important role in Software Park’s technology innovation. This paper gives a definition of software park knowledge network. Based o...
 
A Clustering Algorithm Based on Cell Combination for Wireless Sensor Networks
Found in: Education Technology and Computer Science, International Workshop on
By Luo Chang-ri, Zhu Yun, Zhang Xin-hua, Zhou Zi-bo
Issue Date:March 2010
pp. 74-77
Network scalability and energy efficiency in wireless sensor networks should be supported by elaborate topology control. Clustering algorithms are useful topology management approach to reduce communication overhead and exploit data aggregation in wireless...
 
Maximum Margin Local Learning Projection for Face Recognition
Found in: Innovative Computing and Communication and Asia-Pacific Conference on Information Technology and Ocean Engineering, International Conference on
By Yu Chen, Weifeng Zhang, Xin Zhang, Xiaohong Xu
Issue Date:January 2010
pp. 225-228
In this paper a novel subspace learning method called Maximum Margin Local Learning Projection (MMLLP) is proposed for pattern classification. Firstly the local structures and the dissimilarities between the manifolds are characterized, and then a linear t...
 
The Application Research of Information Hiding Technology in Network Security
Found in: Information Science and Engieering, International Symposium on
By Jing Zhang, Xin-Guang Li
Issue Date:December 2009
pp. 208-212
The important role information hiding technology plays in the network information security system has been illustrated in paper on the basis of the information hiding principle, the characteristics and its key technologies. Then, the feature and effect of ...
 
Agent-Based Data Loading Method in MedImGrid
Found in: New Trends in Information and Service Science, International Conference on
By Ran Zheng, Hai Jin, Qin Zhang, Xin Liu
Issue Date:July 2009
pp. 42-47
Agent-based grid data loading method aims at integrating heterogeneous hospitals’ information systems into a medical information exchange platform based on grid middleware. It collects distributed data sets for decision support system, which makes data sou...
 
A Public Problem about Inverse M-matrices
Found in: MultiMedia and Information Technology, International Conference on
By Zhou Yu-zhong, Fang Ping, Zhang Xin
Issue Date:December 2008
pp. 492-494
M. Neumann gave a public problem. For an n×n inverse
 
Sufferage Extraction Algorithm of Ontology Mapping Based on Reasoning
Found in: Advanced Computer Theory and Engineering, International Conference on
By Si Chang, Qingjun Zhang, Xin Liu, Bo Liu
Issue Date:December 2008
pp. 215-219
Due to output similarity matrix often involves some error mappings when using Multi-strategies for ontology alignment, how to extract the mappings from similarity matrix correctly and effectively will have an important influence on precision. In this paper...
 
The Research on Ontology-based Knowledge Visualization in E-Learning Resources Management
Found in: Semantics, Knowledge and Grid, International Conference on
By Yuan Zhang, Xin Sun
Issue Date:December 2008
pp. 495-496
Today, e-learning resources management is more and more important. How to organize the knowledge resources and how to help students establish knowledge systems become the focus of the e-learning research. In this paper, we mainly research the ontology-base...
 
Application of Multi-agent Evolutionary Algorithm for Load Optimal Dispatching among Power Plant Units
Found in: Risk Management & Engineering Management, 2008 International Conference on
By Guolian Hou, Jianhua Zhang, Xin Yang, Beiwen Zhou
Issue Date:November 2008
pp. 145-150
This paper deals with load optimal dispatching among power plant units in the context of electric power market competition environment. The multi-agent evolutionary algorithm (MAEA) is specially useful in load optimal dispatching, the model of which is set...
 
Globally Exponentially Stabilizing Control for a Class of Continuous-Time Bilinear Systems
Found in: Intelligent Computation Technology and Automation, International Conference on
By Xian Zhang, Xin-Rong Yang
Issue Date:October 2008
pp. 359-363
The globally exponentially stabilizing control problem of a class of continuous-time bilinear systems is studied. For the systems, we give a nonlinear control. Under weaker premise than that in [1], the globally exponentially stability of the close-loop sy...
 
An Online Multiple Instance Learning System for Semantic Image Retrieval
Found in: Multimedia Workshops, International Symposium on
By Chengcui Zhang, Xin Chen, Wei-Bang Chen
Issue Date:December 2007
pp. 83-84
The proposed system is a region based semantic image retrieval system. The retrieval is realized through mapping and solving a Multiple Instance Learning (MIL) problem [1]. MIL is a supervised learning problem in which the interest is to know the
   
A PCA-Based Vehicle Classification Framework
Found in: Data Engineering Workshops, 22nd International Conference on
By Chengcui Zhang, Xin Chen, Wei-bang Chen
Issue Date:April 2006
pp. 17
Due to its great practical importance, Intelligent Transportation System has been an active research area in recent years. In this paper, we present a framework that incorporates various aspects of an intelligent transportation system with its ultimate goa...
 
Building Domain Ontology Based on Web Data and Generic Ontology
Found in: Web Intelligence, IEEE / WIC / ACM International Conference on
By Jie Yang, Lei Wang, Song Zhang, Xin Sui, Ning Zhang, Zhuoqun Xu
Issue Date:September 2004
pp. 686-689
The automatic or semi-automatic construction of ontology has become a research topic of interest in recent years. This paper describes a mechanism for constructing domain specific ontologies automatically based on web data and generic ontology. Firstly, we...
 
Synthesis and Rendering of Bidirectional Texture Functions on Arbitrary Surfaces
Found in: IEEE Transactions on Visualization and Computer Graphics
By Xinguo Liu, Yaohua Hu, Jingdan Zhang, Xin Tong, Baining Guo, Heung-Yeung Shum
Issue Date:May 2004
pp. 278-289
<p><b>Abstract</b>—The bidirectional texture function (BTF) is a 6D function that describes the appearance of a real-world surface as a function of lighting and viewing directions. The BTF can model the fine-scale shadows, occlusions, and...
 
Depth Map Generation Algorithm for Multiview Video
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Di Wu,Huyin Zhang,Xin Li,Long Qian
Issue Date:June 2013
pp. 746-749
In this paper, we propose a new approach to depth map generation for multiview video system. Our goal is to improve 3D scene representation consistency by exchanging spatial information between all depth maps in multiview video. The presented algorithm mai...
 
Cloning practices: Why developers clone and what can be changed
Found in: 2012 IEEE International Conference on Software Maintenance (ICSM)
By Gang Zhang,Xin Peng,Zhenchang Xing,Wenyun Zhao
Issue Date:September 2012
pp. 285-294
Code clones are similar code segments. Researchers have proposed many techniques to detect, understand and eliminate code clones. However, due to lack of deeper understanding of reasons of cloning practices, especially from personal and organizational pers...
 
Aurora: A thermally resilient photonic network-on-chip architecture
Found in: 2012 IEEE 30th International Conference on Computer Design (ICCD 2012)
By Amer Qouneh,Zhongqi Li,Madhura Joshi,Wangyuan Zhang,Xin Fu,Tao Li
Issue Date:September 2012
pp. 379-386
With silicon optical technology moving towards maturity, the use of photonic network-on-chip (NoCs) for global chip communication is emerging as a promising solution to communication requirements of future many core processors. It is expected that photonic...
 
Research on Metamodeling Process of E-government Affair System
Found in: Computer Science and Electronics Engineering, International Conference on
By Jishan Liu,Nannan Zhang,Xin Kong,Yanke Gu
Issue Date:March 2012
pp. 566-570
Regarding to the importance of e-government affair system (EGAS), how to model it has been widely discussed for a long time. Although met model, the abstract model of system, plays a crucial role in the process of modeling, the research about metamodels of...
 
 1  2 Next >>