Intelligent Computing Methodologies
10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014. Proceedings
Article
We propose a framework of hand articulation detection from a monocular depth image using curvature scale space (CSS) descriptors. We extract the hand contour from an input depth image, and obtain the fingertip...
Article
A power monitoring and protection system based on an embedded processor was designed for the junction boxes (JBs) of an experimental seafloor observatory network in China. The system exhibits high reliability,...
Article
The distance-based outlier is a widely used definition of outlier. A point is distinguished as an outlier on the basis of the distances to its nearest neighbors. In this paper, to solve the problem of outlier ...
Article
Nowadays, there exist numerous images in the Internet, and with the development of cloud computing and big data applications, many of those images need to be processed for different kinds of applications by us...
Article
Tremendous amount of data are being generated and saved in many complex engineering and social systems every day. It is significant and feasible to utilize the big data to make better decisions by machine lear...
Article
In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software fe...
Chapter and Conference Paper
So far, most existing non-rigid structure from motion (NRSFM) problems are solved by the batch algorithm. In this paper, a more accurate online NRSFM is proposed based on the differential evolution (DE) algori...
Chapter and Conference Paper
Efficiency and effectiveness are two important metrics for the evaluation of evolutionary algorithms (EAs). Firstly, there exist a number of efficiency metrics in EA, such as population size, number of termina...
Chapter and Conference Paper
The social presence theory in social psychology suggests that computer-mediated online interactions are inferior to face-to-face, in-person interactions. In this paper, we consider the scenarios of organizing ...
Article
In this paper, we present a novel method for detail-generating geometry completion over point-sampled geometry. The main idea consists of converting the context-based geometry completion into the detail-based ...
Article
Designing eco-friendly system has been at the forefront of computing research. Faced with a growing concern about the server energy expenditure and the climate change, both industry and academia start to show ...
Book and Conference Proceedings
10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014. Proceedings
Article
An estimator for evaluating the parameters from the radar returned multicomponent micro-Doppler (m-D) signals is presented in this paper. While time frequency distribution (TFD) is commonly used to analyze the...
Article
For the existing problems of walking chair robot such as simple function, lower bearing capacity and not walking in complex environment, a novel varistructured quadruped/biped human-carrying walking chair robo...
Article
An IEEE 1588 based application scheme was proposed to achieve accurate time synchronization for a deep seafloor observatory network based on the communication topological structure of the Zhejiang University E...
Article
Micro-Doppler (m-D) effect is potential useful in radar target detection, recognition, and classification. While the m-D signals are always multicomponent, it is important to separate the m-D signals for featu...
Article
A planar capacitive sensor (PCS) capable of 2D large-scale measurement is presented in this paper. Displacement interpretation depends on independently measuring the periodic variation in capacitance caused by...
Chapter and Conference Paper
We consider the team formation problem in open collaborative projects existing in large community setting such as the Open Source Software (OSS) community. Given a query specifying a set of required skills for an...
Chapter and Conference Paper
With the development of wireless network, mobile Ad Hoc networks have been applied in many fields. But the security problem of Ad Hoc network has not been solved very well, and the security system of Ad Hoc ne...
Article
In order to customize multi-touch gestures for different applications, and facilitate multi-touch gesture recognition, an application oriented and shape feature based multi-touch gesture description and recogn...