Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    Semantics and completeness of Duration Calculus

    Duration Calculus was introduced in [1] as a notation to specify real-time systems, and as a calculus to verify theorems about such systems. Its distinctive feature is reasoning about durations of states within a...

    Michael R. Hansen, Zhou Chaochen in Real-Time: Theory in Practice (1992)

  2. No Access

    Chapter and Conference Paper

    Sign Correlation Detector for Blind Image Watermarking in the DCT Domain

    Digital watermarking is a key technique for protecting intellectual property of digital media. Due to the ability to detect watermark without the original image, blind watermarking is very useful if there are ...

    **aochen Bo, Lincheng Shen, Wensen Chang in Advances in Multimedia Information Process… (2001)

  3. No Access

    Chapter and Conference Paper

    Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain

    Digital watermarking is a key technique for protecting intellectual property of digital media. As a number of methods have been proposed in recent years to embed watermarks in images for various applications, ...

    **aochen Bo, Lincheng Shen, Wensen Chang in Information and Communications Security (2001)

  4. No Access

    Chapter and Conference Paper

    Agent-Based Social Simulation and Modeling in Social Computing

    Agent-based social simulation (ABSS) as a main computational approach to social simulation has attracted increasing attention in the field of social computing. With the development of computer and information ...

    **aochen Li, Wenji Mao, Daniel Zeng, Fei-Yue Wang in Intelligence and Security Informatics (2008)

  5. Chapter and Conference Paper

    Information Service System For Small Forestowners

    Individual owned forests have boomed in the last decade in China. Hundreds of millions of private forest owners have emerged since years of afforestation practice and collective forest ownership reform. Most o...

    Shaochen Zhang, Yun Li in Computer and Computing Technologies in Agriculture II, Volume 3 (2009)

  6. No Access

    Chapter and Conference Paper

    Robust Block and Gray-Level Histogram Based Watermarking Scheme

    As one of the crucial problems in watermarking, robustness against geometric distortion and JPEG compression becomes more than challenging and problematic. In this paper, a robust watermarking scheme based on ...

    Chi-Man Pun, **aochen Yuan in Advances in Multimedia Information Processing - PCM 2009 (2009)

  7. No Access

    Chapter and Conference Paper

    Optimal Inversion of Open Boundary Conditions Using BPNN Data-Driven Model Combined with Tidal Model

    One of major difficulties with numerical tidal models is accurate inversion of open boundary conditions. A data-driven model based on artificial neural network is developed to retrieve open boundary values. Al...

    Mingchang Li, Guangyu Zhang, Bin Zhou in Advances in Neural Networks – ISNN 2009 (2009)

  8. No Access

    Chapter and Conference Paper

    Robust Image Matching Method Based on Complex Wavelet Structural Similarity

    We apply the complex wavelet structural similarity index to image matching system and propose an image matching method which has strong robustness to image transform in spatial domain. Experimental results sho...

    Jianwei An, **aochen Zhang in Advances in Computer Science, Environment,… (2011)

  9. No Access

    Chapter and Conference Paper

    Agent-Based Modeling of Netizen Groups in Chinese Internet Events

    Internet events are public events with the participation of netizens to express their opinions or comments. As an emerging phenomenon, Internet events often draw nationwide attention and eventually influence o...

    Zhangwen Tan, **aochen Li, Wenji Mao in Intelligence and Security Informatics (2011)

  10. No Access

    Chapter and Conference Paper

    Identification and Analysis of Cell Cycle Phase Genes by Clustering in Correspondence Subspaces

    Correspondence analysis (CA) is a statistical method that is widely used in multiple disciplines to reveal relationships amongst variables. Among others, CA has been successfully applied for microarray data an...

    Ai Sasho, Shenhaochen Zhu, Rahul Singh in Advances in Computing and Communications (2011)

  11. No Access

    Chapter and Conference Paper

    Legal Theoretical Analysis on the Market Economy Mode of China—Discussing from the Status of Market Economy in Anti-dumpling

    Most of the discussion on Chinese market economy mode stayed in the representation, such as government-led and mixed economic model. However, the in-depth analysis of the reason for the formation of Chinese mo...

    **aoChen ** in Advances in Education and Management (2011)

  12. No Access

    Chapter and Conference Paper

    Research on Puncture Area Calibration of Image Navigation for Radio Frequency Ablation Robot

    Aiming at puncture image characteristic of robot auxiliary radio frequency ablation, a modified tradition camera calibration method is proposed in this paper. Based on the comprehensive analysis for puncture i...

    Peng Wang, Wei Cao, Wenhao Jiang in Intelligent Computing and Information Scie… (2011)

  13. No Access

    Chapter and Conference Paper

    Vision-Guided Robot Tracking Algorithm Based on Characteristic Description of Maneuvering Target

    The change of appearance characteristic is caused by changing viewpoint in the maneuvering target tracking. The traditional Camshift tracking algorithm based on a single color histogram model is not robust to ...

    Yuan Zhang, Peng Wang, **n Li, Shaochen Kang in Intelligent Computing and Information Scie… (2011)

  14. Chapter and Conference Paper

    Small-Scale Evaluation of Tobacco Planting Suitability Based on Spatial Information Technology

    Crop planting suitability evaluation is important for agricultural production. In this study, a comprehensive evaluation framework which combined geographical information system, remote sensing, global positio...

    Fengrui Chen, Guangxiong Peng, Wei Su in Computer and Computing Technologies in Agr… (2012)

  15. No Access

    Chapter and Conference Paper

    A Method of Software Defects Mining Based on Static Analysis

    Software defects are easy to cause when programming by C++ language, because of its features of flexibility and complexity, as well as its large number of undefined behaviors. According to “MISRA C++ 2008” saf...

    **aochen Lai, Kuanjiu Zhou, Likun Li in Advanced Research in Applied Artificial In… (2012)

  16. No Access

    Chapter and Conference Paper

    An Algorithm of Channel Assignment of MAC Layer in Ad Hoc Network Based on Dynamic Game with Perfect and Complete Information

    The nodes in Ad Hoc networks compete channels when communicating, with the features of no center and self-organization. In traditional channel assignment strategy of MAC layer, each node does not consider the ...

    **aochen Lai, Quanli Liu, Wei Wang, Likun Li in Advanced Research in Applied Artificial In… (2012)

  17. No Access

    Chapter and Conference Paper

    The Study of Path Planning of Welding Manipulator Based on Improved Genetic Algorithm

    One of the key problems of welding manipulator design is Path planning. It is of great significance to Planning out a reasonable path for manipulator to increase the productivity of the manipulator. Using impr...

    Banglin Zhang, Bingyang Luo, **aoyue Zhu in Pervasive Computing and the Networked World (2014)

  18. No Access

    Chapter and Conference Paper

    A Comparative Study on Full- and Half-Duplex Relaying Protocols with Practical Channel Estimates

    This paper investigates the performance of cooperative relaying protocols with practical channel estimates. Two relaying protocols, i.e., the full duplex relaying (FDR) protocol and half duplex relaying (HDR) ...

    Youyun Xu, **aochen **a in Wireless Algorithms, Systems, and Applications (2014)

  19. No Access

    Chapter and Conference Paper

    Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks

    In node capture attacks, an attacker intellectually captures nodes and extracts cryptographic keys from their memories to wreck security, reliability and confidentiality of wireless sensor networks. Previous m...

    Chi Lin, Guowei Wu, **aochen Lai, Tie Qiu in Algorithms and Architectures for Parallel … (2015)

  20. Chapter and Conference Paper

    MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage

    Outsourcing data to are remote cloud service provider allows organizations or individual users to store more data on the cloud storage than on private computer systems. However, a specific problem encountered ...

    Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu in Information and Communications Security (2016)

previous disabled Page of 5