Search For:

Displaying 1-50 out of 80 total
Detection of QRS Complexes Based on Biorthogonal Spline Wavelet
Found in: Information Science and Engieering, International Symposium on
By Xiuyu Zheng, Zhen Li, LinLin Shen, Zhen Ji
Issue Date:December 2008
pp. 502-506
Biorthogonal spline wavelet is used to detect the QRS complex of ECG signal. Mallat algorithm is applied in the decomposition of ECG signal by using the equivalent filter of a biorthogonal spline wavelet.
Reversible Data Hiding for 3D Meshes in the PVQ-Compressed Domain
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Zhen Sun, Zhe-Ming Lu, Zhen Li
Issue Date:December 2006
pp. 593-596
In this paper, we present a new data hiding method for 3D triangle meshes. While most of the existing data hiding schemes introduce some small amount of nonreversible distortion to the cover mesh, the new method is reversible and enables the cover mesh dat...
Research and Realization of New Stage Lighting Control System
Found in: Computational Sciences and Optimization, International Joint Conference on
By Hui Ren, Kai Zhou, Zhen Li, Hui qin Wang
Issue Date:April 2011
pp. 777-779
Control system for stage lighting is mainly composed of lighting console, dimmer and auxiliary equipment. At present, the functional design of lighting control console is mostly based on MCU and lighting dimmer, which uses SCR (silicon controlled rectifier...
Classifier Learning Algorithm Based on Genetic Algorithms
Found in: Innovative Computing ,Information and Control, International Conference on
By Li-yan Dong, Guang-yuan Liu, Sen-miao Yuan, Yong-li Li, Zhen Li
Issue Date:September 2007
pp. 126
The paper addresses the problem of classification. A restricted BAN classifier learning algorithm GBAN based on genetic algorithm is proposed. Genetic algorithm is used in this new algorithm to study the network structure, this can reduce complexity of cal...
The Application of Bayesian Method in Image Segmentation
Found in: Innovative Computing ,Information and Control, International Conference on
By Yong-li Li, Li-yan Dong, Wei-zhou Guan, Zhen Li, Ling-yan Zhou
Issue Date:September 2007
pp. 490
In order to improve accuracy of image Segmentation, a new merging method based on Bayesian classifier is proposed for the medical image Segmentation. There are many particles such as red blood cells, white blood cells, pipe type cells, epitheliums and the ...
Programming with Concurrency: Threads, Actors, and Coroutines
Found in: 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW)
By Zhen Li,Eileen Kraemer
Issue Date:May 2013
pp. 1304-1311
We describe an elective upper-division undergraduate / graduate course that focuses on programming with concurrency and puts into practice topics from the PDC curriculum. We introduce three approaches to concurrent programming: threads (using Java), Actors...
Public Goods Game Simulator with Reinforcement Learning Agents
Found in: Machine Learning and Applications, Fourth International Conference on
By ManChon U, Zhen Li
Issue Date:December 2010
pp. 43-49
As a famous game in the domain of game theory, both pervasive empirical studies as well as intensive theoretical analysis have been conducted and performed worldwide to research different public goods game scenarios. At the same time, computer game simulat...
Measuring Functional Size of Interactive Software: A Support System Based on XForms-Format User Interface Specifications
Found in: Quality Software, International Conference on
By Zhen Li, Makoto Nonaka, Akihiro Kakurai, Motoei Azuma
Issue Date:November 2003
pp. 368
This study reports a measurement support system, which was developed based on the XForms-Format user interface (UI) specifications in order to facilitate the process of measuring the functional size of interactive software. XForms is the next generation of...
Event Entailment Extraction Based on EM Iteration
Found in: Asian Language Processing, International Conference on
By Zhen Li, Hanjing Li, Mo Yu, Tiejun Zhao, Sheng Li
Issue Date:December 2010
pp. 101-104
In the research and development of various natural language processing systems, like Q&A system and text-to-scene conversation system, we realize that knowledge of text entailment helps a lot in improving the performance of the system. Systems with tex...
Approach of Stitching VRML Clips Together
Found in: International Conference on Internet Computing in Science and Engineering
By Zhen Li, Hanjing Li, Sheng Li, Tiejun Zhao
Issue Date:December 2009
pp. 42-46
Stitching multiple animate or video clips together is a widely used technique in multimedia processing area. From digital video editing to scene generator in Text-to-Scene conversion system, it usually has its usage. Currently, many general or specific sof...
Innovation & Management of Biotechnology Education Highlands & Preparations Engineering Laboratory
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Ping Wan, Jun Chen, Xin-Guo Li, Li-Zhen Li, Quan-Xi Wang
Issue Date:December 2009
pp. 332-334
Based on the analysis of the modern manufacturing and bio-pharmaceutical engineering experimental education, we put forward the basic ideas of innovation and management of biotechnology education highlands and preparations engineering laboratory: balanced ...
Temperature Compensation for Gyroscope Free Micro Inertial Measurement Unit
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Bo Wang, Jie Li, Yan Meng, Qiao Jiang, Gui-Zhen Li
Issue Date:September 2010
pp. 1294-1297
On the basis of analyzing the temperature output characteristics of accelerometers, this paper presents a temperature compensation method for gyro-free micro inertial measurement unit (GF-MIMU) so as to reduce the accelerometer output error caused by the v...
Feature-Based Modular Design Method and its Application in Robot
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By He Bin, Han Li Zhi, Liu Wen Zhen, Li Ming
Issue Date:March 2010
pp. 256-259
Modular design is a valid design method in the mechatronics product design process, which has an important effect on the product development. This paper is devoted to presenting a systematic modular design approach based on mechatronics product modular mod...
Design of Rural Voice Service System
Found in: Information Technology and Computer Science, International Conference on
By Zhen Li, Wanlin Gao, Qing Wang, Ganghong Zhang, Lina Yu, Jianhui Du, Jieru Li
Issue Date:July 2009
pp. 501-504
In existed rural communication conditions, voice service system would solve the problem which the rural users cannot obtain useful and real-time information. This paper gives a design of rural voice service system, and discusses the system structure and la...
Social Conformity and Price Fluctuation in Artificial Stock Market
Found in: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE
By Jingyuan Ding, Qing Li, Zhen Li
Issue Date:December 2008
pp. 924-928
The decisions of investors in capital market are based on the predictions of market prices. These predictions are not independent. Instead, they are strongly affected by interactions among investors. This article presents an artificial stock market, which i...
Fractal Analysis of Artificial Financial Market with Crowd Behavior
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Jingyuan Ding, Qing Li, Zhen Li
Issue Date:December 2008
pp. 283-287
The structure of market information transmission dynamics can affect homogeneity of the investors. It can influence market prices further as investor structure is one of the key factors for capital market which determines the volatility of market prices. I...
An Indoor Sensor Network System for Pursuit-Evasion Games
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Zhenning Li, Hongbin Li, Fan Zhang, Jiming Chen, Youxian Sun
Issue Date:December 2008
pp. 227-233
Wireless sensor and actuator networks (WSAN) are increasingly popular due to their abilities to detect and react to interesting events in the physical world. In this paper, a new indoor WSAN system in the context of pursuit evasion games (PEGs) is designed...
Modern Distance Education: A Special Open Complex Giant System
Found in: Computer Software and Applications Conference, Annual International
By Hui Li, Zhen Li, Xia Cui
Issue Date:August 2008
pp. 908-912
Modern distance education is an important education style in China. With the rapid advancement of information technologies, especially computer multimedia technology and network technology, the distance education becomes an open complex giant system with e...
Implementation of Reinforcement and Reduction of Traditional Acupuncture and Moxibustion
Found in: BioMedical Engineering and Informatics, International Conference on
By Huang Zhen, Li Dongyu, Li Chengwei
Issue Date:May 2008
pp. 522-525
In traditional acupuncture, reinforcement and reduction are conducted to stimulate the channel Qi by puncturing or heating the points with specific manners so as to regulate the functional activities of the internal organs. Reinforcement and reduction mann...
L-TFRC: an end-to-end congestion control mechanism for video streaming over the Internet
Found in: Multimedia and Expo, IEEE International Conference on
By Zhen Li, Guobin Shen, Shipeng Li, E.J. Delp
Issue Date:July 2003
pp. 309-312
Real-time multimedia applications over the Internet have posed a lot of challenges due to the lack of quality of service (QoS) guarantees, frequent fluctuations in channel bandwidth, and packet losses. To address these issues, a great deal of research has ...
Discovery of Potential Parallelism in Sequential Programs
Found in: 2013 42nd International Conference on Parallel Processing (ICPP)
By Zhen Li,Ali Jannesari,Felix Wolf
Issue Date:October 2013
pp. 1004-1013
Although multicore CPUs are dominating the market of desktops and servers, writing programs that utilize the available hardware parallelism on these architectures still remains a challenge. In this paper, we present a dynamic approach for automatically ide...
Traffic Measurement Based DNSSEC Analysis
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Yong Wang,Xiaochun Yun,Yao Yao,Gang Xiong,Zhen Li
Issue Date:October 2012
pp. 62-69
Method of DNSSEC traffic measurement is introduced based on the identification of resource records in DNSSEC. Through the analysis of DNSSEC traffic in several levels which are resource record type, packet length, signature property, and IP features, chara...
Parallel Simulation of Large-Scale Artificial Society on CPU/GPU Mixed Architecture
Found in: 2012 ACM/IEEE/SCS 26th Workshop on Principles of Advanced and Distributed Simulation (PADS)
By Gang Guo,Bin Chen,Xiao Gang Qiu,Zhen Li
Issue Date:July 2012
pp. 174-177
Parallel simulations focus on conservative or optimistic algorithms to guarantee state consistency and causal order of messages between logical processes (LPs). It is usually hard for application domain users to develop complicated models for parallel simu...
Modified ACO for General Continuous Function Optimization
Found in: Intelligent System Design and Engineering Application, International Conference on
By Zhen Li,Xiuhua Chen,Hai Wang
Issue Date:January 2012
pp. 348-354
For the drawbacks of application in general function optimization using Ant Colony Optimization (ACO), ant's move method and pheromone updating strategy is modified on ACO. And typical problems are used to demonstrate its validation. The results show that ...
QoS Multipath Routing Protocol Based on Cross Layer Design for Ad hoc Networks
Found in: Internet Computing and Information Services, International Conference on
By Jian Chen,Zhen Li,Juanwei Liu,Yonghong Kuo
Issue Date:September 2011
pp. 261-264
No summary available.
Local Shape Context Based Real-time Endpoint Body Part Detection and Identification from Depth Images
Found in: Computer and Robot Vision, Canadian Conference
By Zhenning Li, Dana Kulic
Issue Date:May 2011
pp. 219-226
For many human-robot interaction applications, accurate localization of the human, and in particular the endpoints such as the head, hands and feet, is crucial. In this paper, we propose a new Local Shape Context Descriptor specifically for describing the ...
An Accurate Image Matching Algorithm Based on Multiple Constrains
Found in: Computational and Information Sciences, International Conference on
By He Zhen, Li Qiongyan, Ma Feng
Issue Date:December 2010
pp. 661-664
An image matching algorithm is presented in order to get an accurate matching for dense image points. The main idea is using multiple constrains including affine transformation, epipolar geometry, gray-scale correlation and RGB correlation to do step by st...
NLOS Mitigation Method for TDOA Measurement
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Hao Jiang, Jie Xu, Zhen Li
Issue Date:October 2010
pp. 196-199
In this paper, a non-line-of-sight (NLOS) error mitigation on time-difference-of-arrival (TDOA) measurements from pilot signals of a wireless communication network is proposed to solve the positioning and tracking issue involved in the environments where s...
Key-Frame Extraction Using Kernel-Based Locality Preserving Learning
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Zhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li
Issue Date:October 2010
pp. 655-658
The key frame extraction from a video sequence is a crucial step for content-based video analysis, with key frames clients can summarize a long video and know about the content of the video. In this paper, we propose a novel scheme to extract key frames ba...
Compression of 3D Triangle Meshes with a Generalized Parallelogram Prediction Scheme Based on Vector Quantization
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Zhongbao Chen, Fuliang Bao, Zhigang Fang, Zhen Li
Issue Date:October 2010
pp. 184-187
The transmission and storage of large amounts of vertex geometry data are required for rendering geometrically detailed 3D graphic models. To mitigate bandwidth requirements, vector quantization (VQ) is an effective lossy vertex data compression technique ...
Research on Pervasive Computing Security
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Long Zhao Hua, Jia Zhen, Li Tao
Issue Date:October 2010
pp. 111-115
When the concept of pervasive computing is proposed, from a simple application model to the study of various algorithms, the technology of pervasive computing is developing rapidly. This paper firstly introduced the concept of pervasive computing and its s...
Research of Process Migration Mechanism Based on Checkpoint in Computational Grid
Found in: ChinaGrid, Annual Conference
By Wenxing Wang, Zhen Li
Issue Date:July 2010
pp. 245-248
Checkpoint mechanism is very important for long-running and large-scale scientific project computing tasks. So it just meet the requirements of fault-tolerant in grid system. This paper imports GridCPR into Grid Environment. When a job was failed, it can b...
Data Transfer Based on Multiple Replicas in the Grid Environment
Found in: ChinaGrid, Annual Conference
By Qian Zhang, Zhen Li
Issue Date:July 2010
pp. 240-244
Data are special kinds of resource in grid, and their flow, management and uniform view play an important role in the grid system. This paper presents a dynamic adaptive data transfer model based on multiple replicas in the grid environment, compared with ...
Reverse Backtracking Research of Chinese Segmentation Based on Dictionary of Hash Structure
Found in: Information Technology and Computer Science, International Conference on
By Liang Zhen, Li Yu-sheng
Issue Date:July 2010
pp. 265-267
To improve the first word dictionary with hash structure and the reverse maximum matching segmentation algorithm, the last word dictionary based on Hash structure which records word length is designed. By utilizing the reverse maximum matching methods, it ...
Study on the Recommendation Trust Model Based on Encouragement and Punishment
Found in: International Conference on E-Business and E-Government
By HongYun Cai,Zhen Li,JunFeng Tian
Issue Date:May 2010
pp. 1355-1358
In the open distributed environment, the knowledge of belief is absent for the entity with which we will contact, so the recommendation trust is very important for the distributed system. In this paper a recommendation trust model is proposed based on enco...
Briefly Discussing on the Application of Vermiculite in the Passage Collecting Pool Purifying Filtration System
Found in: Intelligent Computation Technology and Automation, International Conference on
By Zhen Li, Zhao-hui Liu, Ren-jie Qin
Issue Date:May 2010
pp. 895-897
As a clay mineral material, the vermiculite does well in the auto-absorption to the pollutants in the flowing water on the pavement. The paper according to the passage collecting pool purifying filtration system of the project of Hengda Section belonging t...
Application Sandbox Model Based on System Call Context
Found in: Communications and Mobile Computing, International Conference on
By Zhen Li, Hongyun Cai, Junfeng Tian, Wu Chen
Issue Date:April 2010
pp. 102-106
An application sandbox model based on system call context is proposed and applied to intrusion detection. It overcomes some drawbacks of traditional special-purpose sandboxes: inconvenience for selecting sandbox with user involvement and inaccuracy of intr...
Pedestrian Detection Based on a New Two-Step Framework
Found in: Education Technology and Computer Science, International Workshop on
By Zhen Li, Zhiqiang Wei, Bo Yin, Xiaopeng Ji, Ruobing Shan
Issue Date:March 2010
pp. 56-59
In this paper, we propose a new framework in pedestrian detection using a two-step classification algorithm, which is a “coarse to fine” course. The framework consists of a full-body detection (FBD) step and a head-shoulder detection (HSD) step. The FBD st...
Realization of the Data Surveillance Technology Based on the B/S Framework
Found in: Computer Engineering and Applications, International Conference on
By Xuejun Yue, Tiansheng Hong, Zhen Li, Zhijie Ye
Issue Date:March 2010
pp. 698-701
Data surveillance is widely used in the actual production areas of process industry. This paper attempt s to discuss and study a brand new data surveillance technology based on the B/ S scheme from two aspect s of theoretical design and practical applicati...
A Comparative Study of Mobile-Based Landmark Recognition Techniques
Found in: IEEE Intelligent Systems
By Kim-Hui Yap, Tao Chen, Zhen Li, Kui Wu
Issue Date:January 2010
pp. 48-57
<p>Mobile-based landmark recognition is becoming increasingly appealing due to the proliferation of mobile devices coupled with improving processing techniques, imaging capability, and networking infrastructure.</p>
Discover significant associations of orthologous simple sequence repeat patterns with gene ontology terms
Found in: Bioinformatics and Biomedicine Workshop, IEEE International Conference on
By Chien-Ming Chen, Chia-Sheng Chuang, Zhen-Li Huang, Tun-Wen Pai
Issue Date:November 2009
pp. 209-213
Several simple sequence repeats (SSRs) have been demonstrated to regulate gene functions, and SSR mutations in a disease gene may cause different genetic disorders. In order to identify putative functional SSR patterns, a Web system for discovering signifi...
A Multi-hop Routing Protocol Based on Fixed Radio Wave in Wireless Sensor Network
Found in: Convergence Information Technology, International Conference on
By Shi-Mei Jin, Ning Sun, Yong-Zhen Li
Issue Date:November 2009
pp. 15-19
Recently, in order to improve the energy efficiency of WSN(Wireless Sensor Network), widely research have been carried on. But, up to the present, all presented methods are based on direct communication between CH(cluster head) and sink node, and based on ...
Research on Resource Directory Service for Sharing Remote Sensing Data under Grid Environment
Found in: Grid and Cloud Computing, International Conference on
By Lina Yu, Xiang Sun, Qing Wang, Wanlin Gao, Ganghong Zhang, Zili Liu, Zhen Li, Jin Wang
Issue Date:August 2009
pp. 344-347
Because of the features of remote sensing data such as large quantity, complex format and wide distribution in heterogeneous storage devices of different geographic locations, it is quite difficult for integrating, exchanging and sharing remote sensing dat...
A Research on Grid-Based Geometric Correction for Remote Sensing Image
Found in: Information Technology and Computer Science, International Conference on
By Zili Liu, Qing Wang, Wanlin Gao, Ganghong Zhang, Zhen Li, Lina Yu, Jin Wang
Issue Date:July 2009
pp. 24-27
On the base of studying and analyzing the Globus Toolkit2.4 platform and remote sensing technology, this article uses the grid platform Globus Toolkit2.4 and the mode of parallel processing, develops a method of geometric correction for processing remote s...
Modeling Trusted Software with Process Algebras
Found in: New Trends in Information and Service Science, International Conference on
By Yang Jie, Peng Zhen, Li Guo-dong, Qi De-yu
Issue Date:July 2009
pp. 123-126
This paper introduces the process algebra language with its powerful standard model-checking tools for trusted software architectures, which deals with incompatibility between two components due to a single interaction or the combination of several interac...
Visual Simulation of the Temperature Field in the Ceramic Roller Kiln
Found in: Computational Intelligence and Natural Computing, International Conference on
By Zhihua Wei, Paipai Chang, Wenbi Rao, Zhen Li
Issue Date:June 2009
pp. 486-489
This paper has presented a numerical simulation method of the temperature field in the ceramic roller kiln. The method was that the model of firing zone with single-kiln was created by fluid dynamics software in which the standard k-ε turbulence model, DO ...
An Enhanced Collaborative Filtering Algorithm Based on Time Weight
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Yang Huai-Zhen, Li Lei
Issue Date:May 2009
pp. 262-265
Because traditional collaborative filtering algorithm does not consider the influence of time on user’s interests, taking equal consideration with different user’s interests in different time leads to the neighbors may not be the similar neighbors set. For...
Sandbox System Based on Role and Virtualization
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Zhen Li, Jun-Feng Tian, Feng-Xian Wang
Issue Date:May 2009
pp. 342-346
We present a sandbox system based on role and virtualization applied to intrusion detection, which overcomes some drawbacks of traditional sandbox system: heavy workload of administrating user’s access control information, imprecision of access control, se...
A Survey on Mobile Landmark Recognition for Information Retrieval
Found in: Mobile Data Management, IEEE International Conference on
By Tao Chen, Kui Wu, Kim-Hui Yap, Zhen Li, Flora S. Tsai
Issue Date:May 2009
pp. 625-630
The growing usage of mobile devices has led to proliferation of many mobile applications. A growing trend in mobile applications is centered on mobile landmark recognition. It is a new mobile application that recognizes a captured landmark using the mobile...
A Fast Algorithm of Image Layer-Presentation
Found in: Computer Science and Information Engineering, World Congress on
By Fang-Zhen Li, Zhi Gong, Xiao-Hong Shen, Nian Cai
Issue Date:April 2009
pp. 152-157
A new algorithm of image layer-presentation was proposed. The key concept of the algorithm was in that the image grayscale function f(x,y), which was comparatively irregular, was approximated by a series of high-regular grayscale functions gn(x,y). The alg...
 1  2 Next >>