Skip to main content

previous disabled Page of 13
and
  1. No Access

    Chapter and Conference Paper

    Group-theoretical aspects of completely integrable systems

    M. A. Semenov-Tian-Shansky in Twistor Geometry and Non-Linear Systems (1982)

  2. No Access

    Chapter and Conference Paper

    Symmetries in nuclei

    Using the second quantization method, we introduce the supergroup U(281+4) for the nucleon LS-coupled shell S = {(nl)N}. Then by use of the method to obtain Lie subalgebras and the method of coupled tensor operat...

    Cheng-tian Feng in Group Theoretical Methods in Physics (1988)

  3. No Access

    Chapter and Conference Paper

    Aeroelasticity analysis of aircraft wings in flutter-onset or post-flutter regime

    Because the flutter phenomenon is usually associated with large deformations/deflections, the structural solution based on linear theory gives inaccurate or totally unphysical solution because the equilibrium ...

    B. Tian, K. N. Ghia in Fifteenth International Conference on Nume… (1997)

  4. No Access

    Chapter and Conference Paper

    Evaluation of Visual Notification Cues for Ubiquitous Computing

    With increased use of mobile information technology and increased amounts of information comes the need to simplify information presentation. This research considers whether low-information-rate displays (such...

    Peter Tarasewich, Christopher S. Campbell, Tian **a in UbiComp 2003: Ubiquitous Computing (2003)

  5. No Access

    Chapter and Conference Paper

    Diversity of Epiphytic Pseudomonads on Grass and other Plant Species

    Isolates of Pseudomonas were made from the phyllosphere of both rye grass and meadow grass at two different sites. Fatty acid profiling and rep-PCR fingerprints illustrated that most of the isolates were a geneti...

    D.-H. Tian, D. E. Stead, R. H. A. Coutts in Pseudomonas syringae and related pathogens… (2003)

  6. No Access

    Chapter and Conference Paper

    Mobile Middleware Based on Distributed Object

    Some limitations exist in the mobile middleware based on the Java RMI Technology. On the background of middleware, distributed object computing and mobile computing, the paper proposes an architecture of mobil...

    Song Chen, Shan Wang, Ming-Tian Zhou in Grid and Cooperative Computing (2004)

  7. No Access

    Chapter and Conference Paper

    Continuous Production of Butanol by Clostridium acetobutylicum Immobilized in a Fibrous Bed Bioreactor

    We explored the influence of dilution rate and pH in continuous cultures of Clostridium acetobutylicum. A 200-mL fibrous bed bioreactor was used to produce high cell density and butyrate concentrations at pH 5.4 ...

    Wei-Cho Huang, David E. Ramey in Proceedings of the Twenty-Fifth Symposium … (2004)

  8. No Access

    Chapter and Conference Paper

    Research on Adaptable Replication Protocol

    Traditional replication protocols lack adaptation and performance consideration after introducing replication. We propose a new replication protocol that adopts logical token ring architecture with dynamically...

    Dong Zhao, Ya-wei Li, Ming-tian Zhou in Grid and Cooperative Computing (2004)

  9. No Access

    Chapter and Conference Paper

    A Hollow-Fiber Membrane Extraction Process for Recovery and Separation of Lactic Acid from Aqueous Solution

    An energy-efficient hollow-fiber membrane extraction process was successfully developed to separate and recover lactic acid produced in fermentation. Although many fermentation processes have been developed fo...

    Han**g Huang, Shang-Tian Yang in Proceedings of the Twenty-Fifth Symposium … (2004)

  10. No Access

    Chapter and Conference Paper

    Long-Term Prediction of Discharges in Manwan Hydropower Using Adaptive-Network-Based Fuzzy Inference Systems Models

    Forecasting reservoir inflow is important to hydropower reservoir management and scheduling. An Adaptive-Network-based Fuzzy Inference System (ANFIS) is successfully developed to forecast the long-term dischar...

    Chun-Tian Cheng, Jian-Yi Lin, Ying-Guang Sun in Advances in Natural Computation (2005)

  11. No Access

    Chapter and Conference Paper

    Collaborative Web Application for Flood Control System of Reservoirs

    Flood control for reservoirs require operations in a dynamic and cooperative manner in order to respond to the changing flood control conditions. There is an increasing emphasis on the collaboration of multipl...

    Chun-tian Cheng, K. W. Chau, Gang Li in Web Technologies Research and Development … (2005)

  12. No Access

    Chapter and Conference Paper

    HMM-Based Audio Keyword Generation

    With the exponential growth in the production creation of multimedia data, there is an increasing need for video semantic analysis. Audio, as a significant part of video, provides important cues to human perce...

    Min Xu, Ling-Yu Duan, Jianfei Cai in Advances in Multimedia Information Process… (2005)

  13. No Access

    Chapter and Conference Paper

    A Secured Mobile Phone Based on Embedded Fingerprint Recognition Systems

    This paper presents a prototype design and implementation of secured mobile phones based on embedded fingerprint recognition systems. One is a front-end fingerprint capture sub-system and the other is a back-e...

    **njian Chen, Jie Tian, Qi Su, **n Yang in Intelligence and Security Informatics (2005)

  14. No Access

    Chapter and Conference Paper

    A Fingerprint Authentication System Based on Mobile Phone

    With the increasing volume of sensitive and private information stored in the mobile phone, the security issue of mobile phone becomes an important field to investigate. This paper proposes a fingerprint authe...

    Qi Su, Jie Tian, **njian Chen, **n Yang in Audio- and Video-Based Biometric Person Au… (2005)

  15. No Access

    Chapter and Conference Paper

    Using Boosting Learning Method for Intrusion Detection

    It is an important research topic to improve detection rate and reduce false positive rate of detection model in the field of intrusion detection. This paper adopts an improved boosting method to enhance gener...

    Wu Yang, **ao-Chun Yun, Yong-Tian Yang in Advanced Data Mining and Applications (2005)

  16. No Access

    Chapter and Conference Paper

    Design and Comparison of Lightweight Group Management Strategies in EnviroSuite

    Tracking is one of the major applications of wireless sensor networks. EnviroSuite, as a programming paradigm, provides a comprehensive solution for programming tracking applications, wherein moving environmental...

    Liqian Luo, Tarek Abdelzaher, Tian He in Distributed Computing in Sensor Systems (2005)

  17. Chapter and Conference Paper

    Understanding the Session Durability in Peer-to-Peer Storage System

    This paper emphasizes that instead of long-term availability and reliability, the short-term session durability analysis will greatly impact the design of the real large-scale Peer-to-Peer storage system. In t...

    **g Tian, Yafei Dai, Hao Wang, Mao Yang in Computational Science – ICCS 2006 (2006)

  18. No Access

    Chapter and Conference Paper

    Research on User-Centered Design and Recognition Pen Gestures

    Pen-based user interface has become a hot research field in recent years. Pen gesture plays an important role in Pen-based user interfaces. But it’s difficult for UI designers to design, and for users to learn...

    Feng Tian, Tiegang Cheng, Hongan Wang, Guozhong Dai in Advances in Computer Graphics (2006)

  19. No Access

    Chapter and Conference Paper

    Integration of Collaborative Design and Process Planning for Artificial Bone Scaffold 3D Printer Nozzle

    The requirement for high-quality product with reduced cost and time-to-market in multidisciplinary project is demanding. Integration of design and process planning with computer aided techniques can provide a ...

    Yan-En Wang, **u-Tian Yan in Cooperative Design, Visualization, and Eng… (2006)

  20. No Access

    Chapter and Conference Paper

    Connected Set Cover Problem and Its Applications

    We study an extension of the set cover problem, the connected set cover problem, the problem is to find a set cover of minimal size that satisfies some connectivity constraint. We first propose two algorithms ...

    Tian-** Shuai, **ao-Dong Hu in Algorithmic Aspects in Information and Management (2006)

previous disabled Page of 13