Search For:

Displaying 1-47 out of 47 total
Performance-Based Design Applied Analysis of Large-Scale Commercial Complexes
Found in: Computer Distributed Control and Intelligent Environmental Monitoring, International Conference on
By Zheng Yan-qiu, Zheng Fei-fei
Issue Date:February 2011
pp. 1620-1623
With the urbanized development, large-scale commercial complexes emerge rapidly in which many constructive shapes and formats distribution exist. However, the current design of fire protection code is unable to stipulate them. Although it really resolved m...
 
Error Tolerant Address Configuration for Data Center Networks with Malfunctioning Devices
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Xingyu Ma,Chengchen Hu,Kai Chen,Che Zhang,Hongtao Zhang,Kai Zheng,Yan Chen,Xianda Sun
Issue Date:June 2012
pp. 708-717
Address auto-configuration is a key problem in data center networks, where servers and switches encode topology information into their addresses for routing. A recent work DAC [2] has been introduced to address this problem. Without malfunctions, DAC can a...
 
Fluid-Solid Coupling Seepage-Based Numerical Simulation of Mechanical Oil Expression from Peanut
Found in: Engineering Computation, International Conference on
By Xiao Zheng, Yan You, Guoxiang Lin, Nong Wan, Yaxin Zhang
Issue Date:May 2009
pp. 67-70
In view of effect of fluid-solid coupling on flow of oil fluids through media and effect of rheology on fluid–solid coupling, the numerical simulation models of mechanical oil expression from vegetable oil were developed. The models were solved by using of...
 
Numerical Simulation of Mechanical Oil Expression from Sesame Based on Fluid-Solid Coupling Flowing through Porous Media
Found in: Computational Sciences and Optimization, International Joint Conference on
By Xiao Zheng, Yan You, Guoxiang Lin, Yaxin Zhang
Issue Date:April 2009
pp. 645-648
The numerical simulation model of mechanical oil expression from vegetable oil was developed. It was solved by using of combining finite difference with finite element. The displacement experiment for extracted sesame was used to validate the model. As an ...
 
Research of Synchronization Robustness in Video Digital Watermarking
Found in: Computing, Communication, Control and Management, ISECS International Colloquium on
By Xiao-shi Zheng, Yan-ling Zhao, Na Li, Guang-qi Liu, Wei Zhou
Issue Date:August 2008
pp. 276-279
Most of attacks in video digital watermarking are synchronization attacks. They can be classified as temporal and spacial synchronization attacks after characteristics of video digital watermarking are analyzed. Then synchronization robustness can be divid...
 
Pseudonym-based RFID Discovery Service to Mitigate Unauthorized Tracking in Supply Chain Management
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Qiang Yan, Robert H. Deng, Zheng Yan, Yingjiu Li, Tieyan Li
Issue Date:September 2010
pp. 21-26
Unauthorized tracking of RFID tagged assets at the system level, where an adversary tracks movement of RFID tagged assets by eavesdropping network messages or compromising date center servers, has not been well recognized in prior research. Compared to the...
 
Research of Welding Robot Controlled by PMAC and ARM Two Processors
Found in: Informatics in Control, Automation and Robotics, International Asia Conference on
By Xingang Miao, Su Wang, Zheng Yan, Jiang Chen
Issue Date:February 2009
pp. 111-113
Using the Delta Tau’s PMAC (Programmable Multi-Axis Controller) as the kernel of control, which can carry out all sorts of algorithm in welding robot. Using Philips’ ARM (Advance RISC Machines) as the kernel of peripheral interface, so it can communicate w...
 
Automated Large-Scale Simulation Test-Data Generation for Object-Oriented Software Systems
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Yujun Zheng, Yan Ma, Jinyun Xue
Issue Date:November 2007
pp. 74-79
Enterprise information systems must be populated with large-scale live data to ensure the testing and evaluating effectiveness, but current development processes typically implement test-data generation as an isolated task and incorporate very little autom...
 
Unwanted Content Control via Trust Management in Pervasive Social Networking
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Zheng Yan,Raimo Kantola, Gaowa Shi, Peng Zhang
Issue Date:July 2013
pp. 202-209
MANET has a good prospect of becoming a practical platform of social networking and computing to support instant social activities and communications, now named pervasive social networking (PSN). However, at the same time as mobile users expect useful and ...
 
A Research Model for Trustworthy Pervasive Social Networking
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Zheng Yan, Peng Zhang,Valtteri Niemi,Raimo Kantola
Issue Date:July 2013
pp. 1522-1527
Social networking has extended its popularity from the Internet to the mobile domain. Nowadays, mobile Internet can work together with self-organized ad hoc networks to offer advanced pervasive social networking (PSN) at any time and in any place. Trust pl...
 
Modeling the Dynamic Trust of Online Service Providers Using HMM
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Xiaoming Zheng,Yan Wang,Mehmet A. Orgun
Issue Date:June 2013
pp. 459-466
Online trading takes place in a very complex environment full of uncertainty in which deceitful service providers or sellers may strategically change their behaviors to maximize their profits. The proliferation of deception cases makes it essential and cha...
 
An Adaptive Gateway for Smart Home
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Jun Hui Zheng,Yan Wang,Wen Rong Tan
Issue Date:June 2013
pp. 1729-1732
Smart home is widely used and has been an important part in everyday life. There are some problems to establish gateway for smart home. As we know, standards in the systems are different which makes it hard to exchange information between the consumer elec...
 
Implementation of an Evaluation Platform for Unwanted Traffic Control via Trust Management
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Yue Shen,Zheng Yan,Raimo Kantola
Issue Date:November 2012
pp. 79-86
People's life has been totally changed by the fast growth of the Internet, which provides opportunities to get access to huge amount of information resources, killer services and applications, offering users great convenience. However, various unwanted or ...
 
An approach of secure and fashionable recognition for pervasive face-to-face social communications
Found in: 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
By Zheng Yan,Yu Chen,Peng Zhang
Issue Date:October 2012
pp. 853-860
Pervasive social communications are instant social activities through communications based on mobile elements, e.g., via mobile ad hoc networks. Meanwhile, fashionable technology is becoming a trend in Human-Computer Interaction (HCI) design. It extends th...
 
Message from TrustCom Workshop/Symposium Chairs
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Indrajit Ray,Zheng Yan,Shui Yu,Lei (Chris) Liu
Issue Date:June 2012
pp. xxxii
No summary available.
   
Message from TrustID Symposium Chairs
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Zheng Yan,Raimo Kanatola,Peng Zhang
Issue Date:June 2012
pp. xxxiii
No summary available.
   
Unwanted Traffic Control via Hybrid Trust Management
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Zheng Yan,Raimo Kantola,Yue Shen
Issue Date:June 2012
pp. 666-673
At the same time as the Internet provides a lot of social value, it is bogged down by unwanted traffic, which is malicious, harmful or unexpected for its receiver. This paper proposes an unwanted traffic control solution through hybrid trust management. It...
 
Gemini: A Handbag for Pervasive Social Communications
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yu Chen,Zheng Yan
Issue Date:June 2012
pp. 820-825
Fashionable technology is becoming a trend in HCI design. It extends the traditional understanding of HCI by emphasizing on the aesthetic element. Pervasive social communications are instant social activities through communications based on mobile elements...
 
A New Digital Chaotic Sequence Generator Based on Logistic Map
Found in: Innovations in Bio-inspired Computing and Applications, International Conference on
By Zheng Yan-Bin,Ding Qun
Issue Date:December 2011
pp. 175-178
Chaos has been shown some appropriate for encryption system with its good statistical chrematistics and the sensibility for its initial value. While limited by the finite precision of computer, chaos system appearing dynamical degradation properties due to...
 
A Research Model for Human-Computer Trust Interaction
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Zheng Yan,Raimo Kantola,Peng Zhang
Issue Date:November 2011
pp. 274-281
Trust plays an important role in human-computer interaction. It helps people overcome risk and uncertainty. With the rapid growth of computer and networking technology, human-computer trust has been paid attention to. This paper studies the factors that in...
 
Implementation of a Reputation System for Pervasive Social Networking
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Yu Chen,Zheng Yan,Valtteri Niemi
Issue Date:November 2011
pp. 857-862
A Mobile Ad Hoc Network (MANET) is becoming a practical platform for pervasive social networking. People chat with each other via MANET for instant social activities. How to help mobile users to build up trust in such an environment is becoming an importan...
 
Building up Trusted Identity Management in Mobile Heterogeneous Environment
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Peng Zhang,Hanlin Sun,Zheng Yan
Issue Date:November 2011
pp. 873-877
Mobile Internet enables mobile users to access Internet services through mobile networks. Currently, cellular networks are converging with various wireless networks, e.g., WLAN, MANET, which forms a heterogeneous mobile environment. In such environment, it...
 
Theoretical Issues in the Study of Trust in Human-Computer Interaction
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Zheng Yan,Raimo Kantola,Peng Zhang
Issue Date:November 2011
pp. 853-856
Trust helps users overcome perceptions of uncertainty and engages in usage. It plays an important role in human-computer interaction. This position paper studies the theoretical issues in the study of trust in Human-Computer Interaction (HCI). We propose a...
 
Unwanted Traffic Control via Global Trust Management
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Zheng Yan,Raimo Kantola,Yue Shen
Issue Date:November 2011
pp. 647-654
People's life has been totally changed by the fast growth of Internet. It provides an incentive platform for many killer services and applications. However, it also offers an easy channel to distribute various contents that could be unwanted by users. This...
 
Trust Behavior Based Recommender System for Software Usage
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Zheng Yan,Peng Zhang
Issue Date:October 2011
pp. 589-591
Trust plays an important role in software usage. It helps users overcome perceptions of uncertainty and risk and engages in trust behaviors. In this position paper, we propose using the trust behavior as a main characteristic to provide software recommenda...
 
Price of Anarchy in Transportation Networks with Heterogeneous Agents
Found in: Computational Sciences and Optimization, International Joint Conference on
By Chengli Zheng, Yan Chen
Issue Date:April 2011
pp. 56-60
This article proposes a model to analyze the transporttion networks with heterogeneous agents, who contribute to congestion differently. This is the generalization of homogeneous model. It turns out that the optimum from social planning is high dependent o...
 
Hovering Control of Unmanned Small Size Helicopter Based on Adaptive Inverse Control Theory
Found in: Digital Manufacturing and Automation, International Conference on
By Jin-song Li, Xi Cao, Guo-zheng Yan, Li-bo Song
Issue Date:December 2010
pp. 805-811
Adaptive inverse control (AIC) theory is introduced to inhibit interferences such as side wind during hovering control for small-sized unmanned helicopter. Based on this theory, an AIC control block diagram is improved to accommodate with the characteristi...
 
Autonomic Trust Management for a Component-Based Software System
Found in: IEEE Transactions on Dependable and Secure Computing
By Zheng Yan,Christian Prehofer
Issue Date:November 2011
pp. 810-823
Trust plays an important role in software systems, especially component-based systems in which components or their environments vary. This paper introduces an autonomic trust management solution for a component-based software system. We propose an adaptive...
 
Principle and Application of Component Mode Synthesis Method
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Ji-zhou Zheng, Yan Zhang
Issue Date:March 2010
pp. 935-938
The component mode synthesis (CMS) technique has been widely used in engineering for its efficiency in dynamic analyses. The principle of CMS with fixed interfaces is introduced, the detail steps in calculation are summed up, and the flow chart of algorith...
 
Dynamic Characteristics of Elastic Circular Toroidal Shells
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Ji-zhou Zheng, Yan Zhang
Issue Date:March 2010
pp. 42-45
In this paper, the free vibrations of incomplete toroidal shells with different meridional boundary conditions are studied based on the linear Flugge thin shell theory. The cross-section of toroidal shells is assumed to be a closed circle. The circumferent...
 
Message Receiver Determination in Multiple Simultaneous IM Conversations
Found in: IEEE Intelligent Systems
By Junze Wang, Furong Wang, Zheng Yan, Benxiong Huang
Issue Date:May 2011
pp. 24-31
<p>Automatically detecting instant message receivers by applying semantic relevance can help improve the usability of current IM systems and make multiple, simultaneous IM conversations more convenient.</p>
 
Study on the Component-Based Applications System Framework
Found in: Information Technology and Applications, International Forum on
By Chunying Zheng, Yan He, Xiangyang Pang
Issue Date:May 2009
pp. 684-689
Component is to have a solution to reuse software and the introduction of its attempt to a low self-up, pre-and large-scale custom-assembled to resolve the problem created the software system. On the market today there are a number of components-implemente...
 
A New Method of Parameters Optimization of Plant Growth Posture
Found in: Information and Computing Science, International Conference on
By Xiang Li, Xiang Zheng, Yanli Li
Issue Date:May 2009
pp. 114-116
Plant simulation is one of hot research fields in Computer Graphics. But the choice of model parameters is related to the simulation results directly. The paper proposed a new method that used L-system and illumination model to establish plant simulation m...
 
The Application of Genetic Algorithm in Embedded System Hardware-software Partitioning
Found in: Electronic Computer Technology, International Conference on
By Shijue Zheng, Yan Zhang, Tingting He
Issue Date:February 2009
pp. 219-222
In this paper, we use Genetic Algorithm to do the embedded system hardware-software co-design. The result indicates that the Genetic Algorithm can solve the problem of embedded system hardware-software co-design. An important task of embedded system design...
 
Bounds on the Value of Fuzzy Solution to Fuzzy Programming Problem
Found in: Computational Intelligence and Security, International Conference on
By Ming-Fa Zheng, Yan-Kui Liu
Issue Date:December 2007
pp. 505-509
The paper is concerned with finding the refined bounds on the value of fuzzy solution to fuzzy programming prob- lem. In this paper we first present the definitions which are the sum of pairs expected value (SPEV), the expected value of the reference scena...
 
Predicting Trustworthiness for Component Software
Found in: Security, Privacy and Trust in Pervasive and Ubiquitous Computing, International Workshop on
By Zheng Yan
Issue Date:July 2007
pp. 1-6
Trust has been recognized as an important factor for component software. In this paper, we propose a methodology to predict trustworthiness of a software component for downloading and execution. The methodology is based on a trust model of software compone...
 
Adaptive Location Update Area Design for PCS Networks under 2D Markov Walk Model
Found in: Local Computer Networks, Annual IEEE Conference on
By Jun Zheng, Yan Zhang, Ling Wang, Jinlin Chen
Issue Date:November 2006
pp. 247-253
In PCS networks, location management operation expends the limited wireless resources to keep track the location information of a mobile terminal. Various dynamic location update (LU) schemes have been proposed to improve the efficiency of location managem...
 
A Conceptual Architecture of a Trusted Mobile Environment
Found in: Security, Privacy and Trust in Pervasive and Ubiquitous Computing, International Workshop on
By Zheng Yan
Issue Date:June 2006
pp. 75-81
Trust is crucial in mobile communications. How to establish a trusted mobile environment is becoming more and more important for mobile device venders, mobile service providers and mobile networking operators. This paper presents a conceptual architecture ...
 
Learning Kernel-Based HMMs for Dynamic Sequence Synthesis
Found in: Computer Graphics and Applications, Pacific Conference on
By Tianshu Wang, Nan-Ning Zheng, Yan Li, Ying-Qing Xu, Heung-Yeung Shum
Issue Date:October 2002
pp. 87
In this paper we present an approach that synthesizes a dynamic sequence from another related sequence, and apply it to a virtual conductor: to synthesize linked figure animation from an input music track. We propose that the mapping between two dynamic se...
 
8-Bit Multiplier Simulation Experiments Investigating the Use of Power Supply Transient Signals for the Detection of CMOS Defects
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By James F. Plusquellic, Amy Germida, Zheng Yan
Issue Date:November 1999
pp. 68
Transient Signal Analysis is a digital device testing method that is based on the analysis of voltage transients at multiple test points. In this paper, the power supply transient signals from simulation experiments on an 8-bit multiplier are analyzed at m...
 
Defect Detection using Power Supply Transient Signal Analysis
Found in: Test Conference, International
By Amy Germida, Zheng Yan, James F. Plusquellic, Fidel Muradali
Issue Date:September 1999
pp. 67
Transient Signal Analysis is a digital device testing method that is based on the analysis of voltage transients at multiple test points. The power supply transient signals of an 8-bit multiplier are analyzed using both hardware and simulations experiments...
 
A Methodology to Predicate Human-Being's Movement Based on Movement Group
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Zhe Guo, Zheng Yan, Furong Wang
Issue Date:December 2010
pp. 612-619
Individual mobility is a popular research topic in mobile communications. One interesting question is: is the movement of human-beings independent although they may not want to follow with each other? This paper explores the phenomenon of group movement by...
 
Study on the instructional model in rural distance education for K-12
Found in: Computer Science and Information Technology, International Conference on
By Yun Cheng, Zhongmei Zheng, Yanli Wang, Chengling Zhao, Feng Wang
Issue Date:August 2009
pp. 100-103
The rural modern distance education project in China has created a digital teaching and learning environment for rural K-12 schools in the west, this will inevitably bring series of challenges to traditional instructional models. This essay made a comparat...
 
Constructing Trust Networks Based on Small-World Theories
Found in: Young Computer Scientists, International Conference for
By Jun Zheng, Yan Qin, Jianyong Zhu, Xinyou Li
Issue Date:November 2008
pp. 1957-1962
Trust relationships between agents provide a strong foundation for realizing security in ubiquitous computing environments. This approach is inspired by real-life networks. Furthermore, many studies show that real-life networks have the “small-world phenom...
 
AdChatRep: a reputation system for MANET chatting
Found in: Proceedings of 1st international symposium on From digital footprints to social and community intelligence (SCI '11)
By Yu Chen, Zheng Yan
Issue Date:September 2011
pp. 43-48
A Mobile Ad Hoc Network (MANET) is becoming a practical platform for pervasive social networking. People chat with each other via MANET for instant social activities. How to help mobile users to build up trust in MANET chatting is becoming an interesting i...
     
PicToon: a personalized image-based cartoon system
Found in: Proceedings of the tenth ACM international conference on Multimedia (MULTIMEDIA '02)
By Heung-Yeung Shum, Hong Chen, Lin Liang, Nan-Ning Zheng, Yan Li, Ying-Qing Xu
Issue Date:December 2002
pp. 171-178
In this paper, we present PicToon, a cartoon system which can generate a personalized cartoon face from an input Picture. PicToon is easy to use and requires little user interaction. Our system consists of three major components: an image-based Cartoon Gen...
     
Estimation of Wrist Force/torque for Robot Gripper using Neural Network
Found in: Robotics and Biomimetics, IEEE International Conference on
By Guo-zheng Yan, Ting Wu, Ke-jun Xu
Issue Date:December 2006
pp. 1450-1453
This paper proposes a kind of estimation method of wrist force/torque for robots. The method adopts the data fusion technique according to the output variations of the finger force sensors installed in the gripper. The finger force sensors are used to meas...
 
 1