Search For:

Displaying 1-49 out of 49 total
A Hybrid Escalating Evolutionary Algorithm for Multi-objective Flow-Shop Scheduling
Found in: International Conference on Natural Computation
By Ruifeng Shi, Yiming Zhou, Hong Zhou
Issue Date:August 2007
pp. 426-430
A hybrid escalating evolutionary algorithm, which aims at solving multi-objective flow-shop scheduling problems, is proposed in this paper. The new algorithm takes an escalating evolutionary structure, which helps it escaping from premature, and an elitism...
 
CHMasters: A Scalable and Speed-Efficient Metadata Service in Distributed File System
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Min Xu,Junrui Zhou,Wei Zhou,Hong An
Issue Date:October 2011
pp. 394-399
Distributed file system (DFS) is playing important roles of supporting large distributed data-intensive applications to meet storage needs. Typically, the design of DFS, such as GFS in Google, DMS in Cisco and TFS in Alibaba, is driven by observations of s...
 
An Interpolation Method by Predicting the Direction of Pixel Texture Changing Trend for H.264/AVC Intra Prediction
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Jingli Zhou, Hong Zhou, Xianyong Yang
Issue Date:December 2008
pp. 884-888
Intra prediction is employed by H.264/AVC in the pixel domain and plays a significant role in the improvement of the coding efficiency. By analyzing the H.264 intra prediction interpolation, we find that there are two problems exist: Firstly, the method do...
 
Human Facial Feature Localisation by Gabor Filter and Clustering
Found in: Intelligent Human-Machine Systems and Cybernetics, International Conference on
By Mian Zhou, Hong Wei, Xiangjun Wang, Pengcheng Wen, Feng Liu
Issue Date:August 2010
pp. 14-17
Human facial features localization is an important process of face recognition, since it helps generating face images in accordance with specified criteria, or building unique face model. This paper presents a novel method for finding facial features throu...
 
Research on Multi-objective Collaborative Optimization Model and Algorithm of Supply Chain System Based on Complex Needs
Found in: Software Engineering, World Congress on
By Hong-jun Peng, Mei-hua Zhou, Hong-hong Zhang
Issue Date:May 2009
pp. 424-428
The collaborative optimization of supply chain system is studied based on complex needs in this paper. The Multi-Objective Collaborative Optimization Model is established. This model takes profits and customer satisfaction as the goal, and designs differen...
 
Research on Supply Chain Coordination Model of Green Remanufacturing with Outsourcing
Found in: Information Science and Engieering, International Symposium on
By Cai Ming, Fan Tijun, Zhou Hong, Xu Weixia
Issue Date:December 2010
pp. 24-29
In this paper, a mathematical model is developed to analyze supply chain coordination consisted of a manufacturer and an outsourcer in green remanufacturing. On condition that allowing manufacturer delay in payment, we build an objective function of optima...
 
Clustering Large Attributed Graphs: An Efficient Incremental Approach
Found in: Data Mining, IEEE International Conference on
By Yang Zhou, Hong Cheng, Jeffrey Xu Yu
Issue Date:December 2010
pp. 689-698
In recent years, many networks have become available for analysis, including social networks, sensor networks, biological networks, etc. Graph clustering has shown its effectiveness in analyzing and visualizing large networks. The goal of graph clustering ...
 
Dynamic Integration Mechanism for Job-Shop Scheduling Model Base Using Multi-agent
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Niu Li, Zhou Hong, Han Xiaoting
Issue Date:December 2009
pp. 421-425
A kind of model base architecture for job-shop scheduling systems is proposed in this paper. In order to meet the complex and changeable requirements of job-shop scheduling problem and fit the specific features of model base management and job-shop schedul...
 
From the Inference System Suitable for Human to the Inference System Suitable for Computer
Found in: Intelligent Information Technology Application Workshops, International Symposium on
By Xunwei Zhou, Hong Bao
Issue Date:December 2008
pp. 219-223
The rule in rule-based system can be divided into two categories: inference rule and knowledge expressed by
 
Mining Double-Connective Association Rules from Multiple Tables of Relational Databases
Found in: Computer Science and Software Engineering, International Conference on
By Xunwei Zhou,Hong Bao
Issue Date:December 2008
pp. 271-279
Single-dimensional association rule and multidimensional association rule in conventional association rule mining are single-connective association rules, because they have only one connective: →.
 
Query-Sensitive Similarity Measure for Content-Based Image Retrieval
Found in: Data Mining, IEEE International Conference on
By Zhi-Hua Zhou, Hong-Bin Dai
Issue Date:December 2006
pp. 1211-1215
Similarity measure is one of the keys of a high-performance content-based image retrieval (CBIR) system. Given a pair of images, existing similarity measures usually produce a static and constant similarity score. However, an image can usually be perceived...
 
Counting Steel Rods Online Using LQV Neural Network in Real-time Images
Found in: International Conference on Information Acquisition
By Qi Sui-ping, Zhang Hong-jian, Li Xiu-juan, Zhou Hong-liang
Issue Date:August 2006
pp. 956-960
Although various modifications of learning vector quantization had been presented in many literatures, the applications about them in the industries are relatively few, especially in the steel industries. This paper presents a method of on-line measurement...
 
Quantitative Analysis of Inter-block Dependence in Speculative Execution
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Junrui Zhou, Hong An, Yanyan Zou, Tao Sun
Issue Date:July 2013
pp. 991-998
Given increasingly abundant resources on substrate, speculative execution has been proposed to seek opportunities for improving performance of sequential applications restricted by control dependence and data dependence. In spite of benefits obtained from ...
 
Joint Decoding of Primary and Secondary Users in Cognitive Radio Systems with Opportunistic Interference Cancellation
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Zhaorong Zhou,Hong Long,Yu Wang,Tao Jiang,Sanshan Sun
Issue Date:October 2012
pp. 818-823
In underlay cognitive radio (CR) systems, besides decoding secondary users (SUs) in sequence with interference cancellation (IC), the cognitive base station (CBS) can also decode and cancel the signal of a primary user (PU) before processing some SUs' sign...
 
Research on Fast 1-D DCT Algorithm Based on Parallel Computing
Found in: Computer Science and Electronics Engineering, International Conference on
By Guang Yu,Wenbang Sun,Maiyu Zhou,Hong Cheng
Issue Date:March 2012
pp. 192-195
Discrete cosine transform (DCT) is applied widely in the field of signal processing. But the transform operation is complicated, and a large amount of multiply operation and addition operation affect largely the transform efficiency. To overcome such drawb...
 
Power Transformer Fault Diagnosis Based on Integrated of Rough Set Theory and Neural Network
Found in: Intelligent System Design and Engineering Application, International Conference on
By Ai-hua Zhou,Hong Song,Hui Xiao,Xiao-hui Zeng
Issue Date:January 2012
pp. 1463-1465
In this paper, a rough set (RS) and neural network (NN) integrated algorithm based fault a gnosis for power transformers, using dissolved gas analysis (DGA) is proposed. This approach takes advantage of the knowledge reduction ability of rough set and good...
 
Research on the Construction of the Logistics Information Platform in Large-Scale Coal Enterprises
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Liu Bing-wu,Zhou Hong
Issue Date:November 2011
pp. 377-381
At present, large-scale coal enterprises are in a low level of shared data in supply purchasing and circulation information. The paper carries out a proper decomposition and comb on the logistics business system in large-scale coal enterprises and proposes...
 
Analysis on Hospital Competitiveness Typical Archetype of Key Variable-Oriented Based on System Dynamics
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Li-qing Li, Xiao-gang Zhou, Hong-lang Li
Issue Date:November 2010
pp. 105-109
In the paper, takes three-A level hospital in Jiangxi province as an example, based on the survey in the concrete hospital and systematic analysis on hospital actual situation, with the help of the literature review, research methodology and analytical fra...
 
Simulated Annealing-Genetic Algorithm and Its Application in CDMA Multi-user Detection
Found in: Intelligent Networks and Intelligent Systems, International Workshop on
By Yue Zhou, Hong Wang, Yingzi Wei, Jing Wang
Issue Date:November 2010
pp. 638-640
It is evident that the 3G(3rd-generation) and B3G(Beyond Third Generation in mobile communication system) communication systems need higher wireless capacity. Multi-user detection(MUD) technique is one of the key techniques in Code Division Multiple-Access...
 
A GSPN-based Grid Resource Schedule Algorithm
Found in: Grid and Cloud Computing, International Conference on
By Zhi-xiang Yuan, Jun Zhou, Hong Ye
Issue Date:November 2010
pp. 457-460
The paper analyses the load imbalance problem and the QoS-based fault-tolerant scheduling algorithm in Grid Resource Scheduling, and proposes a new scheduling algorithm based on the priority of a task-based parameters of Qos constrained scheduling strategy...
 
A Measurement of Software Trustworthiness Based on Approximation Algorithms
Found in: Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
By Jie Zhou, Hong Zhu
Issue Date:October 2010
pp. 282-287
The trustworthiness of algorithms is one of the important parts of that of softwares. We introduce a trust model and define trustworthy degree for the approximation algorithms by a probability approach. Relative properties are investigated based on the str...
 
Clustering Efficient Method on Mass Chinese Text Based on Semantic Concept
Found in: Information Technology and Applications, International Forum on
By Liu Jinling, Zhou Hong
Issue Date:July 2010
pp. 151-155
In the current thinking of the Chinese text clustering, most clustering algorithms are limited by the data’s scalability and the results’ interpretability. This paper presents an efficient Chinese text clustering method based on semantic concepts. This met...
 
Towards an Empirical Reuse Approach for the Software Evolution: A Case Study
Found in: Quality Software, International Conference on
By Ziyou Wang, Minghui Zhou, Hong Mei
Issue Date:July 2010
pp. 282-287
Software systems must evolve, or they risk losing market share to competitors. However, evolving such a system is extraordinarily difficult, complicated, and time consuming. In this case, how to reuse the existing features of the previous version and reduc...
 
Research on Sliding Mode Control for Near-Surface AUV Depth Regulation in Waves Circumstance
Found in: Electrical and Control Engineering, International Conference on
By Jian-sen Shen, Xu-chang Zhou, Hong-gang Zhang
Issue Date:June 2010
pp. 1760-1764
The paper addresses the problems of depth regulation control of a torpedo-like autonomous underwater vehicle (AUV) in wave circumstance. A mathematical model of AUV's pith motion in vertical plane is established by simplifying and linearizing the nonlinear...
 
The Design and Development of DSP Based Ring Main Unit FTU (Feeder Automation Terminal Unit) in Intelligent Distribution
Found in: Electrical and Control Engineering, International Conference on
By Zhou Hong, Luo Xing, Deng Qijun
Issue Date:June 2010
pp. 2299-2302
RMU (Ring Main Unit) is small footprint, easy to use, but difficult to measure multiple analog signals, in response to these characteristics, this paper proposes a design of intelligent distribution ring main unit FTU (Feeder Terminal Unit) based on DSP. T...
 
Design and Implement of Drawing of GOO One-Line Diagram of Smart Distribution Network
Found in: Electrical and Control Engineering, International Conference on
By Deng Qijun, Zhou Hong, Chen Yong
Issue Date:June 2010
pp. 3533-3536
The design and implement of drawing of GOO (Graphic - Object -Oriented) one-line diagram of smart distribution network are realized using GDI + technology and the class and interface method in Windows environment. Four levels of class are designed with the...
 
Study of the AVL-tree index range query based on P2P networks
Found in: International Conference on E-Business and E-Government
By Liu Jin-ling,Zhou Hong
Issue Date:May 2010
pp. 1699-1702
The complex multi-attribute query processing in the large-scale distributed systems is a research topic focused by both academia and industry. This paper introduces a common architecture of the multi-dimensional data range queries based on the P2P network ...
 
Study on Labor Status of Workers in Urban China Based on Multinomial Logit Model
Found in: Education Technology and Computer Science, International Workshop on
By Tan Lan, Zhou Hong
Issue Date:March 2010
pp. 425-428
This paper divides the labor status into 3 catalogues: employment, unemployment and out of labor force, and then analyzes the influencing factor of the labor status based on multinomial logit model and the micro data coming from the Urban Household Survey ...
 
A Novel k-Means Algorithm for Clustering and Outlier Detection
Found in: Future Information Technology and Management Engineering, International Seminar on
By Yinghua Zhou, Hong Yu, Xuemei Cai
Issue Date:December 2009
pp. 476-480
A three-stage k-means algorithm of O(nkt) polynomial time is proposed to cluster the numerical data and detect the outliers. The clusters are preliminarily determined at the first stage. The local outliers of each cluster are found out and their influences...
 
A New Source Address Validation Scheme Based on IBS
Found in: Information Assurance and Security, International Symposium on
By Ning-ning Lu, Hua-chun Zhou, Hong-ke Zhang
Issue Date:August 2009
pp. 334-337
Source address authentication is very important to change current serious network security situation. In this article, we propose a new source address validation scheme based on IBS algorithm and study its security using SVO logic. We find that our scheme ...
 
What-if Analysis in MOLAP Environments
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Guoliang Zhou, Hong Chen
Issue Date:August 2009
pp. 405-409
What-if analysis is important for decision-maker to evaluate adopting new strategy and help knowledge discovery. It mostly occurs in OLAP environments, based on implementation OLAP is divided into MOLAP and ROLAP. Most research focus on ROLAP but in the in...
 
Towards Dynamic Component Updating: A Flexible and Lightweight Approach
Found in: Computer Software and Applications Conference, Annual International
By Zan Xiao, Donggang Cao, Chao You, Minghui Zhou, Hong Mei
Issue Date:July 2009
pp. 468-473
Dynamic component updating, which allows a running system to be updated without interrupting its execution, has been recognized as an important requirement for distributed systems. However, most of existing approaches complicate the component development b...
 
Hypothetical Queries on Multidimensional Dataset
Found in: Business Intelligence and Financial Engineering, International Conference on
By Guoliang Zhou, Hong Chen, Yansong Zhang
Issue Date:July 2009
pp. 539-543
Hypothetical queries evaluate the effect of adopting or changing some strategy then aiding in decision making. Hypothetical queries simulate some modifications and assess the effect. But in OLAP environments modify data will result in cube recomputation wh...
 
The Effectiveness of Passport Source Address Validation Scheme
Found in: Information Processing, Asia-Pacific Conference on
By Ning-ning Lu, Hua-chun Zhou, Hong-ke Zhang
Issue Date:July 2009
pp. 92-95
Passport is a new secure and adoptable source address validation technique, which has attracted fully attention. In this article, we research into the efficiency of Passport. First of all, we build a mathematical model to describe Passport’s function, then...
 
The Impact of E-money on the Economy
Found in: Computer Science and Information Engineering, World Congress on
By Zhou Hong
Issue Date:April 2009
pp. 126-130
From 1990’s, e-money has developed very quickly. Many economists proposed their view by theory. They think that e-money, designed to substitute central bank currency, could take impact on money supply, especially on the narrowly defined stock of money, M1....
 
Design and Research of WebQuest Teaching System Model Based on Multi-agent
Found in: Computer Science and Software Engineering, International Conference on
By Li Tian, Zhou Hong
Issue Date:December 2008
pp. 1168-1171
Starting from the actual application of WebQuest teaching system, the paper proposes the concept of combining Agent technology with WebQuest teaching model, provides the definition of MAS_WQT model, and expounds the functions of each Agent in MAS_WQT, alon...
 
Pose Determination of 3D Object Based on Four Straight Lines
Found in: International Conference on Natural Computation
By Lijuan Qin, Yulan Hu, Yingzi Wei, Yue Zhou, Hong Wang
Issue Date:October 2008
pp. 188-192
Pose determination of 3D object with respect to a camera is an important problem in computer vision. Straight line is one feature which exists widely in natural environments. In this paper, a new pose determination method from four straight line correspond...
 
The Variant of Gaussian Kernel and Its Model Selection Method
Found in: International Conference on Natural Computation
By Shui-Sheng Zhou, Hong-Wei Liu, Feng Ye
Issue Date:August 2007
pp. 683-687
The classification problem by nonlinear support vector machine with kernel function is discussed in this paper. The stretching ratio is defined in order to analyze the performance of the kernel function. A new type of kernel function is introduced by modif...
 
Optimizing Update Threshold for Distance-based Location Tracking Strategies in Moving Object Environments
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Jing Zhou, Hong Va Leong, Qin Lu, Ken C. K. Lee
Issue Date:June 2007
pp. 1-8
In distance-based location update schemes with a predefined distance threshold d, an object reports its location to the location server, whenever it is located more than a distance of d away from the location expected of by the server. Adopting a small thr...
 
A New Watermarking Protocol of Copyright Protection
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Ru Zhang, Xiao-gang Yu, Lin-na Zhou, Hong-peng Li
Issue Date:December 2006
pp. 83-88
Most existing watermarking protocols deal with the copyright protection as a transaction between the seller and the buyer. However, these protocols don.t appropriately resolve the copyright problem of copyright authority, copyrighter, ICP and customer. To ...
 
Product Model Data Exchange Technology of Heterogeneous Systems in Collaborative Design Environment
Found in: International Conference on Artificial Reality and Telexistence
By Xiao Zhou, Hong Jia, Yanlin Lu, Weilong Ding
Issue Date:December 2006
pp. 145-148
The network design based on internet/intranet among cooperative enterprises is a hot topic nowadays, and information exchange is one of the key issues of the collaborative design among heterogeneous systems in the field of network manufacturing. Compared w...
 
The Evaluation of Parallel FEM Techniques Based on Graph Partitioning
Found in: International Conference on Artificial Reality and Telexistence
By Guobin Zhou, Hong Jia, Yanlin Lu
Issue Date:December 2006
pp. 566-569
This paper studies and compares PNR and rMSATS methods for load balancing in parallel finite element analysis. Both the strengths and weaknesses of two algorithms are discussed. Some possible improvements to the two algorithms are also suggested and studie...
 
Multi-agent Paradigm and Conceptual Graphs in Information Retrieval Model
Found in: Intelligent Systems Design and Applications, International Conference on
By Yong Zhang, Li-li Hou, Zhen-long Zhou, Hong-chang Ding
Issue Date:October 2006
pp. 875-880
With the growing amount of on-line information and its dynamic nature, users? burden of retrieving information has become heavier and existing passive working is too inefficient to meet users? needs. An intelligent information retrieval model based on mult...
 
Generic Adaptive Moving Object Tracking Algorithms
Found in: Parallel Processing, International Conference on
By Jing Zhou, Hong Va Leong, Qin Lu, Ken C.K. Lee
Issue Date:August 2006
pp. 93-100
Moving Object Databases (MODs), the core component of location server to support location-related applications, keep track of the locations of moving objects which submit location update reports to the centralized server. In resource-limited wireless envir...
 
Face Verification Using GaborWavelets and AdaBoost
Found in: Pattern Recognition, International Conference on
By Mian Zhou, Hong Wei
Issue Date:August 2006
pp. 404-407
This paper presents a new face verification algorithm based on Gabor wavelets and AdaBoost. In the algorithm, faces are represented by Gabor wavelet features generated by Gabor wavelet transform. Gabor wavelets with 5 scales and 8 orientations are chosen t...
 
A Multi-Property Trust Model for Reconfiguring Component Software
Found in: Quality Software, International Conference on
By Minghui Zhou, Hong Mei, Lu Zhang
Issue Date:September 2005
pp. 142-149
While component software continues to grow in size and complexity, it becomes increasingly difficult to ensure qualities for component services, especially at run-time. This paper focuses on a framework on middleware for dynamic re-configuration of compone...
 
Pose Invariant Face Recognition
Found in: Automatic Face and Gesture Recognition, IEEE International Conference on
By Fu Jie Huang, Tsuhan Chen, Zhihua Zhou, Hong-Jiang Zhang
Issue Date:March 2000
pp. 245
In this paper, we describe a novel neural network architecture, which can recognize human faces with any view in a certain viewing angle range (from left 30 degrees to right 30 degrees out of plane rotation). View-specific eigenface analysis is used as the...
 
A New Computational Tool for the Post Session Analysis of the Prepulse Inhibition Test in Neural Science
Found in: Computational Science and Engineering, IEEE International Conference on
By Hongbo Zhou, Hong-Ju Yang, Haiyun Xu, Qiang Cheng
Issue Date:August 2009
pp. 1077-1080
Prepulse inhibition (PPI) refers to the reduction in startle reaction towards a startle-eliciting “pulse” stimulus when it is shortly preceded by a sub-threshold “prepulse” stimulus. PPI deficits have been seen in various neuropsychiatric disorders, such a...
 
A Service-Oriented Trust Management Model on Application Server
Found in: Web Services, IEEE International Conference on
By Minghui ZHOU, Hong MEI
Issue Date:September 2006
pp. 170-177
In the service-oriented architecture, the components deployed on application servers are published as web services. Though many researches focus on how to authorize at the web service level currently, there is little work involving the authorization gap be...
 
 1