Skip to main content

previous disabled Page of 7
and
  1. Chapter and Conference Paper

    Level-Set Curve Particles

    In many applications it is necessary to track a moving and deforming boundary on the plane from infrequent, sparse measurements. For instance, each of a set of mobile observers may be able to tell the position...

    Tingting Jiang, Carlo Tomasi in Computer Vision – ECCV 2006 (2006)

  2. No Access

    Chapter and Conference Paper

    Study on Debris Flow Hazard Discriminant Analysis and Zoning of One Dump

    Due to the dump consists of a large number of loose materials and it is located at the hillside, the dump with bad engineering geological condition is likely to constitute a composite slope mass. During the ra...

    Professor Shi-Guo Sun, Shao-Jie Feng in Advances in Environmental Geotechnics (2010)

  3. No Access

    Chapter and Conference Paper

    The Wideband Spectrum Sensing Based on Compressed Sensing and Interference Temperature Estimation

    Future cognitive radios will be capable of scanning a wide band of frequencies, in the order of a few GHz, and the employment of adaptive wave-forms according to the estimated spectrum of the licensed systems ...

    Ting Jiang, Shijun Zhai in Wireless Algorithms, Systems, and Applications (2010)

  4. Chapter and Conference Paper

    Study on Synthetic Evaluation of Human Performance in Manually Controlled Spacecraft Rendezvous and Docking Tasks

    Manual-Control Rendezvous and Docking (MCRVD) is a complex and demanding task which requires astronauts to control the direction of six-freedom of the spacecraft accurately by hand. Its performance has a close...

    Ting Jiang, Chunhui Wang, Zhiqiang Tian, Yongzhong Xu, Zheng Wang in Digital Human Modeling (2011)

  5. No Access

    Chapter and Conference Paper

    Lightweight Security for WSN Based on Network Coding

    The application of network coding has been improving the performance of Wireless Sensor Networks (WSN). Compared with previous, the security performance has been improved. But when faced with security attacks—...

    Xu Lu, Ting Jiang in Communications, Signal Processing, and Systems (2012)

  6. No Access

    Chapter and Conference Paper

    Research on Theory of Almost Perfect Binary-Third-Order Cyclic Autocorrelation Sequences

    Because higher-order cumulant (HOC) is insensitive to the adding Gaussian noise and symmetry non-Gaussian noise, a new kind of perfect discrete signal with good periodic correlation function is presented, whic...

    Yi Zhong, Zheng Zhou, Ting Jiang in Communications, Signal Processing, and Systems (2012)

  7. Chapter and Conference Paper

    Quality Estimation for H.264/SVC Inter-layer Residual Prediction in Spatial Scalability

    Scalable Video Coding (SVC) provides an efficient compression for the video bitstream equipped with various scalable configurations. H.264 scalable extension (H.264/SVC) is the most recent scalable coding stan...

    Ren-Jie Wang, Yan-Ting Jiang, Jiunn-Tsair Fang in Advances in Image and Video Technology (2012)

  8. No Access

    Chapter and Conference Paper

    A Method of Obstacle Identification Based on UWB and Selected Bispectra

    Ultra-wideband (UWB) radar is widely used in the obstacle identification, and the procedure is done by analyzing the echo signals. In this paper, a novel method of target detection is proposed. The perspective...

    Minglei You, Ting Jiang in Communications, Signal Processing, and Systems (2012)

  9. No Access

    Chapter and Conference Paper

    Toward Perception-Based Shape Decomposition

    The aim of this work is to decompose shapes into parts which are consistent to human perception. We propose a novel shape decomposition method which utilizes the three perception rules suggested by psychologic...

    Tingting Jiang, Zhongqian Dong, Chang Ma, Yizhou Wang in Computer Vision – ACCV 2012 (2013)

  10. No Access

    Chapter and Conference Paper

    J2EE-Based General Document Transceiver System

    Along with the development of computer network technology, network technology is integrate into management and has become important symbol and method of modern office. Sending and receiving of documents are es...

    Da** Gao, Wei Zhang, **nyan Liu, Zhenkai **e in Informatics and Management Science IV (2013)

  11. No Access

    Chapter and Conference Paper

    Research on Intelligent Recording and Broadcasting System in Classroom Teaching

    Though currently a large number of intelligent recording and broadcasting system of classroom teaching can proceed with transcribing and webcasting, the effects of the radio is far from ideal. It can’t maintai...

    Qing Dong, Fengting Jiang, Guangxing Wang in Informatics and Management Science VI (2013)

  12. No Access

    Chapter and Conference Paper

    Self-Adaptive Image Transfer with Unequal Protection by Prioritized LT Code

    The degree distribution of a fountain code is a key evaluation point. Good fountain codes should have low average degrees and fine performance. This paper suggests a way of allocating the source code based on ...

    Ya**an Wang, Ting Jiang in The Proceedings of the Second Internationa… (2014)

  13. No Access

    Chapter and Conference Paper

    A Method of Target Detection and Identification Based on UWB and PSO-WNN

    UWB radar is widely used in target detection and identification because of its spectrum in range of GHz. A novel method of target detection based on Particle Swarm Optimization-based Wavelet Neural Network (PS...

    Feng Gao, Ting Jiang in The Proceedings of the Second Internationa… (2014)

  14. No Access

    Chapter and Conference Paper

    Target Detection and Classification by UWB Communication Signal Based on Third-Order Cumulants

    We have taken an experimental study about a novel method of the feasibility of ultra-wideband (UWB) communication system to concealed obstacles detection and classification. The recognition of target can be ac...

    Yi Zhong, Zheng Zhou, Ting Jiang in The Proceedings of the Second Internationa… (2014)

  15. No Access

    Chapter and Conference Paper

    A Method of Object Identification Based on Gabor-Network and UWB

    UWB communication has obvious advantages in the aspect of transmission rate, power consumption and price cost. Therefore, it has become the focus of the academia and industry. For the low power consumption, hi...

    Kang Liu, Ting Jiang in The Proceedings of the Second Internationa… (2014)

  16. No Access

    Chapter and Conference Paper

    A New UWB Target Detection and Identification Method Based on Extreme Learning Machine

    UWB is a short-range wireless communication technology with strong resolution, detection and anti-jamming capability. UWB radar has been widely used in the transportation detection, bridge detection [1], medic...

    Hao Shen, Ting Jiang in The Proceedings of the Second Internationa… (2014)

  17. No Access

    Chapter and Conference Paper

    A New Method of Target Identification in UWB Communication System Based on Smooth Pseudo Wigner Ville Distribution and Semi-supervised Clustering

    Ultra Wideband (UWB) technology has been widely used for target identification with its strong penetrability, high resolution and good anti-interference ability. This paper proposes a new method to detect and ...

    Qiqi Tang, Ting Jiang in The Proceedings of the Second Internationa… (2014)

  18. No Access

    Chapter and Conference Paper

    Unequal-Compressed Sensing Based on the Characteristics of Wavelet Coefficients

    Compressed sensing (CS) has drawn quite an amount of attentions as a joint sampling and compression approach. Its theory shows that if a signal is sparse or compressible in a certain transform domain, it can b...

    Weiwei Li, Ting Jiang, Ning Wang in The Proceedings of the Third International… (2015)

  19. Chapter and Conference Paper

    Influence of Highlighting Words Beneath Icon on Performance of Visual Search in Tablet Computer

    This study compares the influence of different kinds of highlighting words beneath icons on visual search performance on the interface of tablets through response time and accurate rates of participants comple...

    Li Wang, Liezhong Ge, Ting Jiang, Hongyan Liu in Virtual, Augmented and Mixed Reality (2015)

  20. No Access

    Chapter and Conference Paper

    Compressed Sensing Method for Secret Key Generation Based on MIMO Channel Estimation

    In searching for alternative solutions of secret key generation in wireless networks, many physical-layer-based methods have been proposed. These methods exploit the inherent randomness and reciprocity of the ...

    Yuqi Li, Ting Jiang, **g**g Huang in The Proceedings of the Third International… (2015)

previous disabled Page of 7