Search For:

Displaying 1-18 out of 18 total
Integrated Powertrain Control of Gearshift for Automatic Transmission
Found in: Pervasive Computing, Signal Porcessing and Applications, International Conference on
By Jinwu Gao, Zhiyuan Liu
Issue Date:September 2010
pp. 239-242
In this paper, an integrated powertrain control of gearshift for automatic transmission is developed: engine control by torque regulation is incorporated to suppress the shock of output shaft torque, whilst a clutch slip controller is applied to transfer t...
Dynamic Analysis of the Accelerometer's Shell Based on ANSYS
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Wenyi Sun, Linghui Wu, Baiqing Liu, Wei Fu, Zhiyuan Liu
Issue Date:April 2009
pp. 67-70
The dynamic characteristics of an accelerometer’s shell is analyzed. To avoid resonance and subsequent failure, the shell’s natural frequencies and harmonic response are important considerations in structure optimization, for they significantly influence t...
Locating the Address of Local Variables to Achieve a Buffer Overflow
Found in: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS)
By Zhiyuan An,Liu Haiyan
Issue Date:June 2013
pp. 1999-2002
Buffer overflow is a kind of serious security problem, it is due to lack of experience of programmers and testing is not brought, and is a relatively common form of hacking attacks. This article first explains the composition of the process in memory, the ...
Study on the Improved A2/O Process Used in Swine Wastewater Treatment
Found in: Digital Manufacturing and Automation, International Conference on
By Mingfen Niu,Zhuoping Li,Zhiyuan Liu
Issue Date:August 2011
pp. 1172-1175
An experiment of treating anaerobic fermented hog pen sewage by improved A2/O reactor was carried out to study the pollution mater reducing rate during the course of combine domestication. After anaerobic fermented cultivation course of hog pen sewage by A...
The Bio-remediation Technology of Organophosphorus Pesticides Contaminated Soil
Found in: Digital Manufacturing and Automation, International Conference on
By Mingfen Niu,Zhiyuan Liu,Wei Cui,Zhuoping Li
Issue Date:August 2011
pp. 1217-1220
In order to increase the degradation efficiency of chlorpyrifos pesticides in soil, a organ phosphorous degrading condition was optimized for a compound microbial agent which composed of a high-performance microbial and unninghamella. Orthogonal design tab...
Modeling Social Annotations via Latent Reason Identification
Found in: IEEE Intelligent Systems
By Xiance Si,Zhiyuan Liu,Maosong Sun
Issue Date:November 2010
pp. 42-49
The probabilistic Tag Allocation Model (TAM) explains social tags by modeling the latent reasoning behind each tag in order to disambiguate them and identify noise.
Extending a Key-Chain Based Certified Email Protocol with Transparent TTP
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Zhiyuan Liu, Jun Pang, Chenyi Zhang
Issue Date:December 2010
pp. 630-636
Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduce the storage requirement of the trusted third party (TTP). We extend their protocol to satisfy the property of TTP transparency, using existing verifiably ...
Realization of Buffer Overflow
Found in: Information Technology and Applications, International Forum on
By An Zhiyuan, Liu Haiyan
Issue Date:July 2010
pp. 347-349
In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC (Computer Emergency Response Term/Coodination Center) issued advice on the buffer overflow vulnerability for more than accounted for 5...
Identity Based Group Key Management Scheme for Ad Hoc Groups
Found in: Multimedia Information Networking and Security, International Conference on
By Zhiyuan Liu, Li Li, Xi-cai Cheng
Issue Date:November 2009
pp. 425-429
Many wireless ad-hoc applications for military battlefield and emergency situations depend upon secure group communications. But group key management for ad-hoc networks meets a great challenge because of mobility, limited power, unreliable multi-hop commu...
A Novel Group Key Establishment Scheme for Ad Hoc Networks
Found in: Multimedia Information Networking and Security, International Conference on
By Zhiyuan Liu, Jian-she Wu, Peng Ji
Issue Date:November 2009
pp. 530-533
In mobile ad hoc networks, due to unreliable wireless media, nodes mobility and lack of infrastructure, providing a key establishment scheme is a challenge in this unique network environment. In this paper, a novel group key establishment scheme is propose...
A Novel Strategy for Visual Tracking and Visual Information Extraction
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Zhiyuan Liu, Bingbing Lee, Kai Lee, Jing Jiang, Meng Lee, Jiejun Qiu
Issue Date:April 2009
pp. 475-478
A novel strategy for the visual tracking and the information extracted problem is proposed which is for the case of maneuvering target. The strategy contains two methods. One is used to tracking, and the other one is used to extract the information of the ...
Variable Structure GA Based Motion Planning of a Three-Limbed Robot
Found in: Measuring Technology and Mechatronics Automation, International Conference on
By Ming Pang, ZhiYuan Liu, ShouChen Cai, Zongwei Ren, Yanhe Zhu
Issue Date:April 2009
pp. 519-522
A novel progressive genetic algorithm was developed for motion planning of a three-limbed robot. The proposed motion planning method can be used to find a optimal joints trajectory from the initial to the final position and orientation. On the basis of the...
Text Classification Based on Transfer Learning and Self-Training
Found in: International Conference on Natural Computation
By Yabin Zheng, Shaohua Teng, Zhiyuan Liu, Maosong Sun
Issue Date:October 2008
pp. 363-367
Traditional text classification methods make a basic assumption: the training and test set are homologous, while this na?ve assumption may not hold in the real world, especially in the web environment. Documents on the web change from time to time, pre-tra...
Secure Routing Protocol based Trust for Ad Hoc Networks
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Zhiyuan Liu, Shejie Lu, Jun Yan
Issue Date:August 2007
pp. 279-283
An ad hoc network is a kind of wireless network without centralized administration or fixed network infrastructure, in which nodes perform routing discovery and routing maintenance in a self-organized way. However, this flexible network topology introduces...
Securing Membership Control in Mobile Ad Hoc Networks
Found in: Information Technology, International Conference on
By Yunfang Feng, Zhiyuan Liu, Jun Li
Issue Date:December 2006
pp. 160-163
Lack of online trusted dealer and group membership dynamics make the membership control become a challenging task in wireless ad hoc network. Based on the threshold cryptography (and verifiable secret sharing), we propose a secure membership control scheme...
User Behaviors in Related Word Retrieval and New Word Detection: A Collaborative Perspective
Found in: ACM Transactions on Asian Language Information Processing (TALIP)
By Lixing Xie, Liyun Ru, Maosong Sun, Yabin Zheng, Yang Zhang, Zhiyuan Liu
Issue Date:December 2011
pp. 1-26
Nowadays, user behavior analysis and collaborative filtering have drawn a large body of research in the machine learning community. The goal is either to enhance the user experience or discover useful information hidden in the data. In this article, we con...
PLDA+: Parallel latent dirichlet allocation with data placement and pipeline processing
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Edward Y. Chang, Maosong Sun, Yuzhou Zhang, Zhiyuan Liu
Issue Date:April 2011
pp. 1-18
Previous methods of distributed Gibbs sampling for LDA run into either memory or communication bottlenecks. To improve scalability, we propose four strategies: data placement, pipeline processing, word bundling, and priority-based scheduling. Experiments s...
Asymmetrical query recommendation method based on bipartite network resource allocation
Found in: Proceeding of the 17th international conference on World Wide Web (WWW '08)
By Maosong Sun, Zhiyuan Liu
Issue Date:April 2008
pp. 1-7
This paper presents a new query recommendation method that generates recommended query list by mining large-scale user logs. Starting from the user logs of click-through data, we construct a bipartite network where the nodes on one side correspond to uniqu...