Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Modeling Dynamic System by Recurrent Neural Network with State Variables

    A study is performed to investigate the state evolution of a kind of recurrent neural network. The state variable in the neural system summarize the information of external excitation and initial state, and de...

    Min Han, Zhiwei Shi, Wei Wang in Advances in Neural Networks - ISNN 2004 (2004)

  2. No Access

    Chapter and Conference Paper

    A Novel Individual Blood Glucose Control Model Based on Mixture of Experts Neural Networks

    An individual blood glucose control model (IBGCM) based on the Mixture of Experts (MOE) neural networks algorithm was designed to improve the diabetic care. MOE was first time used to integrate multiple indivi...

    Wei Wang, Zheng-Zhong Bian, Lan-Feng Yan in Advances in Neural Networks - ISNN 2004 (2004)

  3. No Access

    Chapter and Conference Paper

    A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security

    Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer security in recent years. In this paper, a new intrusion detection method based on P...

    Wei Wang, **aohong Guan, **angliang Zhang in Advances in Neural Networks - ISNN 2004 (2004)

  4. No Access

    Chapter and Conference Paper

    Localized Recursive Estimation in Wireless Sensor Networks

    This paper proposes a localized recursive estimation scheme for parameter estimation in wireless sensor networks. Given any parameter occurred at some location and time, a number of sensors recursively estimat...

    Bang Wang, Kee Chaing Chua, Vikram Srinivasan in Mobile Ad-hoc and Sensor Networks (2005)

  5. No Access

    Chapter and Conference Paper

    Multisensors Information Fusion with Neural Networks for Noninvasive Blood Glucose Detection

    A multisensors information fusion model (MIFM) based on the Mixture of Experts (ME) neural networks was designed to fuse the multi-sensors signals for infrared noninvasive blood glucose detection. ME algorithm...

    Wei Wang, Lanfeng Yan, Baowei Liu, Heng Zhang in Advances in Neural Networks – ISNN 2005 (2005)

  6. No Access

    Chapter and Conference Paper

    Worst and Best Information Exposure Paths in Wireless Sensor Networks

    This paper proposes the concept of information exposure for a point and for a path based on estimation theory. The information exposure of a point is defined as the probability that the absolute value of estim...

    Bang Wang, Kee Chaing Chua, Wei Wang in Mobile Ad-hoc and Sensor Networks (2005)

  7. No Access

    Chapter and Conference Paper

    Efficient Group Key Management for Dynamic Peer Networks

    In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...

    Wei Wang, Jianfeng Ma, SangJae Moon in Mobile Ad-hoc and Sensor Networks (2005)

  8. No Access

    Chapter and Conference Paper

    Adaptive Neural Network Control for Nonlinear Systems Based on Approximation Errors

    A stable adaptive neural network control approach is proposed in this paper for uncertain nonlinear strict-feedback systems based on backstep**. The key assumptions are that the neural network approximation ...

    Yan-Jun Liu, Wei Wang in Advances in Neural Networks - ISNN 2006 (2006)

  9. No Access

    Chapter and Conference Paper

    Nonlinear System Adaptive Control by Using Multiple Neural Network Models

    Multiple radial based function (RBF)neural network models are used to cover the uncertainty of time variant nonlinear system, and multiple element controllers are set up based on the multiple RBF models. At ev...

    **ao-Li Li, Yun-Feng Kang, Wei Wang in Advances in Neural Networks - ISNN 2006 (2006)

  10. No Access

    Chapter and Conference Paper

    Estimation of the Future Earthquake Situation by Using Neural Networks Ensemble

    Earthquakes will do great harms to the people, to estimate the future earthquake situation in Chinese mainland is still an open issue. There have been previous attempts to solve this problem by using artificia...

    Tian-Yu Liu, Guo-Zheng Li, Yue Liu, Geng-Feng Wu in Advances in Neural Networks - ISNN 2006 (2006)

  11. No Access

    Chapter and Conference Paper

    Sensor Density for Complete Information Coverage in Wireless Sensor Networks

    Coverage is a very important issue in wireless sensor networks. Current literature defines a point to be covered if it is within the sensing radius of at least one sensor. This is a conservative definition of ...

    Bang Wang, Kee Chaing Chua, Vikram Srinivasan, Wei Wang in Wireless Sensor Networks (2006)

  12. No Access

    Chapter and Conference Paper

    Traffic Volume Forecasting Based on Wavelet Transform and Neural Networks

    This paper focuses on traffic volume forecasting that is an essential component of any responsive traffic control or route guidance system. A new approach for traffic volume prediction is proposed based on wav...

    Shuyan Chen, Wei Wang in Advances in Neural Networks - ISNN 2006 (2006)

  13. No Access

    Chapter and Conference Paper

    Stochastically Consistent Caching and Dynamic Duty Cycling for Erratic Sensor Sources

    We present a novel dynamic duty cycling scheme to maintain stochastic consistency for caches in sensor networks. To reduce transmissions, base stations often maintain caches for erratically changing sensor sou...

    Shanzhong Zhu, Wei Wang, Chinya V. Ravishankar in Distributed Computing in Sensor Systems (2006)

  14. No Access

    Chapter and Conference Paper

    Cooperative Grid Jobs Scheduling with Multi-objective Genetic Algorithm

    Job scheduling on computational grids is a key problem in large scale grid-based applications for solving complex problems. The aim is to obtain an efficient scheduler able to allocate dependable jobs originat...

    Bin Zeng, Jun Wei, Wei Wang in Parallel and Distributed Processing and Applications (2007)

  15. No Access

    Chapter and Conference Paper

    Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network

    Regression analysis between features of high-dimension is receiving attention in environmental learning of mobile robot. In this paper, we propose a novel framework, namely General regression neural network (G...

    Ke Wang, Wei Wang, Yan Zhuang in Advances in Neural Networks – ISNN 2007 (2007)

  16. No Access

    Chapter and Conference Paper

    Soft-Sensor Method Based on Least Square Support Vector Machines Within Bayesian Evidence Framework

    Based on the character and requirement of the dynamic weighing of loader, the soft sensor technique was adapted as the weighing method, and the least square support vector machine (LS-SVM) as its modelling met...

    Wei Wang, Tianmiao Wang, Hongxing Wei in Advances in Neural Networks – ISNN 2007 (2007)

  17. No Access

    Chapter and Conference Paper

    Loss Tomography in Wireless Sensor Network Using Gibbs Sampling

    The internal link performance inference has become an increasingly important issue in operating and evaluating a sensor network. Since it is usually impractical to directly monitor each node or link in the wir...

    Yongjun Li, Wandong Cai, Guangli Tian, Wei Wang in Wireless Sensor Networks (2007)

  18. No Access

    Chapter and Conference Paper

    Analog Circuit Fault Fusion Diagnosis Method Based on Support Vector Machine

    Lack of fault samples and statistic characteristic of artificial neural network, which restrict its more development and application in fault diagnosis. Support Vector Machine (SVM) is a machine – learning alg...

    Zhihong Feng, Zhigui Lin, Wei Fang, Wei Wang in Advances in Neural Networks – ISNN 2009 (2009)

  19. Chapter and Conference Paper

    Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC

    In this paper, we present the first distinguishing attack on HMAC and NMAC based on MD5 without related keys, which distinguishes the HMAC/NMAC-MD5 from HMAC/NMAC with a random function. The attack needs 297 quer...

    **aoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang in Advances in Cryptology - EUROCRYPT 2009 (2009)

  20. No Access

    Chapter and Conference Paper

    Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1

    In this paper, we present a new distinguishing attack which works for secret prefix MAC based on 65-step (12-76) SHA-1. By birthday paradox, we first guarantee the existence of an internal collision at the out...

    Siyuan Qiao, Wei Wang, Keting Jia in Information, Security and Cryptology – ICISC 2009 (2010)

previous disabled Page of 3