Skip to main content

previous disabled Page of 28
and
  1. No Access

    Book and Conference Proceedings

    Conceptual Modeling for Advanced Application Domains

    ER 2004 Workshops CoMoGIS, CoMWIM, ECDM, CoMoA, DGOV, and eCOMO, Shanghai, China, November 8-12, 2004. Proceedings

    Shan Wang, Katsumi Tanaka in Lecture Notes in Computer Science (2004)

  2. No Access

    Chapter

    Highlevel Verification of Control Intensive Systems Using Predicate Abstraction

    Predicate abstraction has been widely used for model checking hardware/software systems. However, for control intensive systems, existing predicate abstraction techniques can potentially result in a blowup of ...

    Edmund Clarke, Orna Grumberg in Formal Methods and Models for System Design (2004)

  3. No Access

    Chapter and Conference Paper

    Web Taxonomy Integration Using Spectral Graph Transducer

    We address the problem of integrating objects from a source taxonomy into a master taxonomy. This problem is not only currently pervasive on the web, but also important to the emerging semantic web. A straight...

    Dell Zhang, **aoling Wang, Yisheng Dong in Conceptual Modeling – ER 2004 (2004)

  4. No Access

    Chapter and Conference Paper

    Global-Based Structure Damage Detection Using LVQ Neural Network and Bispectrum Analysis

    In this paper, a new approach for the global-based structure damage detection is proposed, which is based on the combination of bispectrum feature extraction technique and LVQ neural network identification met...

    Guangming Dong, ** Chen, Xuanyang Lei in Advances in Neural Networks – ISNN 2005 (2005)

  5. No Access

    Chapter and Conference Paper

    APForecast: An Adaptive Forecasting Method for Data Streams

    This research investigates continuous forecasting queries with alterable forecasting-step over data streams. A novel Adaptive Precision forecasting method to forecasting single attribute value of item in a sin...

    Yong-li Wang, Hong-bing Xu, Yi-sheng Dong in Knowledge-Based Intelligent Information an… (2005)

  6. No Access

    Chapter and Conference Paper

    A Genetic Algorithm Based Method for Molecular Docking

    The essential of Molecular docking problem is to find the optimum conformation of ligand bound with the receptor at its active site. Most cases the optimum conformation has the lowest interaction energy. So th...

    Chun-lian Li, Yu Sun, Dong-yun Long, **-cheng Wang in Advances in Natural Computation (2005)

  7. No Access

    Chapter and Conference Paper

    Orthogonally Rotational Transformation for Naive Bayes Learning

    Naive Bayes is one of the most efficient and effective learning algorithms for machine learning, pattern recognition and data mining. But its conditional independence assumption is rarely true in real-world ap...

    Limin Wang, Chunhong Cao, Haijun Li, Haixia Chen in Computational Intelligence and Security (2005)

  8. No Access

    Article

    New sequential Monte Carlo methods for nonlinear dynamic systems

    In this paper we present several new sequential Monte Carlo (SMC) algorithms for online estimation (filtering) of nonlinear dynamic systems. SMC has been shown to be a powerful tool for dealing with complex dy...

    Dong Guo, **aodong Wang, Rong Chen in Statistics and Computing (2005)

  9. No Access

    Chapter and Conference Paper

    The IIR Submission to CSLP 2006 Speaker Recognition Evaluation

    This paper describes the design and implementation of a practical automatic speaker recognition system for the CSLP speaker recognition evaluation (SRE). The speaker recognition system is built upon four subsy...

    Kong-Aik Lee, Hanwu Sun, Rong Tong, Bin Ma in Chinese Spoken Language Processing (2006)

  10. No Access

    Chapter

    Robust Segmentation of Characters Marked on Surface

    Optical character recognition (OCR) is widely used for automation. Typical OCR algorithm runs on each character and it include preprocessing step of separating each character from input image. Most segmentatio...

    Jong-Eun Ha, Dong-Joong Kang, Mun-Ho Jeong in Intelligent Computing in Signal Processing… (2006)

  11. No Access

    Chapter and Conference Paper

    Short Term Load Forecasting Model Based on Support Vector Machine

    An artificial neural network was used for sample preprocessing in this paper. Firstly, the data points were classified into three types as follows: the high load type, the medium load type and the low load typ...

    Dong-**ao Niu, Qiang Wang, **-Chao Li in Advances in Machine Learning and Cybernetics (2006)

  12. No Access

    Chapter and Conference Paper

    A Fast Temporal Texture Synthesis Algorithm Using Segment Genetic Algorithm

    Texture synthesis is a very active research area in computer vision and graphics, and temporal texture synthesis is one subset of it. We present a new temporal texture synthesis algorithm, in which a segment g...

    Li Wen-hui, Meng Yu, Zhang Zhen-hua, Liu Dong-fei in Foundations of Intelligent Systems (2006)

  13. No Access

    Chapter and Conference Paper

    Supervised Inference of Gene Regulatory Networks by Linear Programming

    The development of algorithms for reverse-engineering gene regulatory networks is boosted by microarray technologies, which enable the simultaneous measurement of all RNA transcripts in a cell. Meanwhile the c...

    Yong Wang, Trupti Joshi, Dong Xu in Computational Intelligence and Bioinformat… (2006)

  14. No Access

    Chapter and Conference Paper

    An Expert System Based on BP Neural Networks for Pre-splitting Blasting Design

    The issue of pre-splitting blasting design is investigated in this paper. According to the principle of expert system and neural networks, Visual C++ 6.0 and SQL Sever 2000 are employed to develop hybrid exper...

    **aohong Li, **nfei Wang, Yongkang Dong in Advances in Neural Networks - ISNN 2006 (2006)

  15. No Access

    Chapter and Conference Paper

    A Low-Power CMOS Analog Neuro-fuzzy Chip

    This paper proposes a low-power high-speed CMOS analog two- input/one-output neuro-fuzzy chip, the basic blocks of which are Gaussian membership function circuit, minimization circuit, and a centroid algorithm...

    Wang Wei-zhi, ** Dong-ming in Advances in Natural Computation (2006)

  16. No Access

    Chapter and Conference Paper

    Platform-Level Multiple Sensors Simulation Based on Multi-agent Interactions

    In order to support the advanced concept technology demonstration of intelligence reconnaissance activities, multiple sensors simulation needs to provide enough detail to examine sensing dynamics on future bat...

    **ong Li, Kai Wang, **anggang Liu, Jiuting Duo in Agent Computing and Multi-Agent Systems (2006)

  17. No Access

    Chapter and Conference Paper

    Discriminative Transformation for Sufficient Adaptation in Text-Independent Speaker Verification

    In conventional Gaussian Mixture Model – Universal Background Model (GMM-UBM) text-independent speaker verification applications, the discriminability between speaker models and the universal background model ...

    Hao Yang, Yuan Dong, **anyu Zhao, Jian Zhao in Chinese Spoken Language Processing (2006)

  18. No Access

    Article

    Robust and active fault-tolerant control for a class of nonlinear uncertain systems

    A novel integrated design strategy for robust fault diagnosis and fault-tolerant control (FTC) of a class of nonlinear uncertain systems is proposed. The uncertainties considered in this paper are more general...

    You-Qing Wang, Dong-Hua Zhou, Li-Heng Liu in International Journal of Automation and Co… (2006)

  19. No Access

    Chapter and Conference Paper

    A Novel Cross Layer Power Control Game Algorithm Based on Neural Fuzzy Connection Admission Controller in Cellular Ad Hoc Networks

    The special scenario of the topology in the cellular Ad Hoc networks was analyzed and a novel cross layer power control game algorithm based on Neural Fuzzy Connection Admission Controller (NFCAC) was proposed...

    Yong Wang, Dong-Feng Yuan, Ying-Ji Zhong in Advances in Neural Networks – ISNN 2007 (2007)

  20. No Access

    Article

    Chameleon Hashes Without Key Exposure Based on Factoring

    Chameleon hash is the main primitive to construct a chameleon signature scheme which provides non-repudiation and non-transferability simultaneously. However, the initial chameleon hash schemes suffer from the...

    Wei Gao, Xue-Li Wang, Dong-Qing **e in Journal of Computer Science and Technology (2007)

previous disabled Page of 28