Skip to main content

previous disabled Page of 7
and
  1. No Access

    Chapter and Conference Paper

    The Main Features of the 1.56-M Telescope and its Status Quo

    This telescope was designed for determining the trigonometric parallaxes of faint stars. The otpical configuration is a Ritchey-Chrétien system and has only a f/10 Cassegrain focus for photographic work.

    Wan Lai, Zhu Neng-hong, Wang Lan-juan in Instrumentation and Research Programmes fo… (1986)

  2. No Access

    Chapter and Conference Paper

    Design Characteristics of the 1.56 m Astrometric Telescope and its Usage in Astrometry

    The 1.56m astrometric telescope (Fig. 1) is designed mainly for determining trigonometric parallaxes of faint stars.

    Wan Lai, Zhu Neng-hong, Wang Lan-juan, Yang Zheng-hua in Astrometric Techniques (1986)

  3. No Access

    Chapter and Conference Paper

    Regeneration of whole plants from Gracilaria asiatica Chang et **a protoplasts (Gracilariaceae, Rhodophyta)

    A large number of viable protoplasts were produced by enzymatic digestion of Gracilaria asiatica vegetative tissue. The protoplasts underwent initial division after 5–7 d in culture and developed into callus-like...

    Yan **ng-Hong, Su-Juan Wang in Fourteenth International Seaweed Symposium (1993)

  4. Chapter and Conference Paper

    Triangular grid protocol: An efficient scheme for replica control with uniform access quorums

    Replication is an important technique in distributed database systems. Many recent researches have focused on organizing multiple copies of replicated data into logical structures such as trees and square grid...

    Cheng -Hong Cho, Jer -Tsang Wang in Euro-Par'96 Parallel Processing (1996)

  5. No Access

    Chapter and Conference Paper

    An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing

    Cancelable biometrics has been proposed for canceling and re-issuing biometric templates and for protecting privacy in biometrics systems. Recently, new cancelable biometric approaches are proposed based on Bi...

    King-Hong Cheung, Adams Kong, David Zhang in Knowledge-Based Intelligent Information an… (2005)

  6. Chapter and Conference Paper

    HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks

    Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. The energy efficiency is a key design issue that needs to be enhanced to improve the life sp...

    Ying-Hong Wang, Hung-Jen Mao in Embedded and Ubiquitous Computing – EUC 20… (2005)

  7. No Access

    Chapter and Conference Paper

    Exploring Content-Based and Image-Based Features for Nude Image Detection

    This paper introduces some widely used techniques related to nude image detection. By analyzing the merits and drawbacks of these techniques, a new nude image detection method is proposed. The proposed approac...

    Shi-lin Wang, Hong Hui, Sheng-hong Li, Hao Zhang in Fuzzy Systems and Knowledge Discovery (2005)

  8. Chapter and Conference Paper

    A Context-Aware System for Smart Home Applications

    Context-awareness is an important part for ubiquitous computing. Many applications of ubiquitous computing have to access some related contexts in order to provide the right services at the right time and the ...

    Wen-Yang Wang, Chih-Chieh Chuang in Embedded and Ubiquitous Computing – EUC 20… (2005)

  9. No Access

    Chapter and Conference Paper

    A Collaborative E-learning System Based on Multi-agent

    Based on the analysis of the process of the collaborative e-learning system and the characteristics of Multi-agent technology, this paper brings forward a collaborative e-learning system framework founded on M...

    Jun Wang, Yong-Hong Sun, Zhi-** Fan, Yan Liu in Internet and Network Economics (2005)

  10. No Access

    Chapter and Conference Paper

    Research on Construction and Interoperability of Complex Distributed Simulation System

    This paper presents an assumed interoperability framework of Complex Distributed Simulation System (CDSS). On the basis of it, interoperability conceptual model of C4I simulation system, distributed weapon pla...

    Ning Li, Zhou Wang, Wei-Hua Liu in Systems Modeling and Simulation: Theory an… (2005)

  11. No Access

    Chapter and Conference Paper

    Autapse Modulated Bursting

    In this paper we present a model of autapses which are synapses connecting axons and dendrites of the same neuron and feeding back axonal action potentials to the own dendritic tree. The timely physiological s...

    Guang-Hong Wang, ** Jiang in Advances in Neural Networks - ISNN 2006 (2006)

  12. No Access

    Chapter and Conference Paper

    REDRP: Reactive Energy Decisive Routing Protocol for Wireless Sensor Networks

    The wireless sensor network (WSNs) was extensively deployed and researched for many applications in recently. By taking the advantage of smaller dimension, lower cost and simple structure of the sensor node, t...

    Ying-Hong Wang, Yi-Chien Lin, **-Fang Fu in Ubiquitous Intelligence and Computing (2006)

  13. No Access

    Chapter and Conference Paper

    Autonomous Navigation Based on the Velocity Space Method in Dynamic Environments

    We present a new local obstacle avoidance approach for mobile robots in partially known environments on the basis of the curvature-velocity method (CVM), the lane-curvature method (LCM) and the beam-curvature ...

    Shi Chao-xia, Hong Bing-rong, Wang Yan-qing in Advances in Natural Computation (2006)

  14. Chapter and Conference Paper

    An Efficient Key-Update Scheme for Wireless Sensor Networks

    A novel key-update scheme is proposed for wireless sensor networks. The center server in a wireless sensor network first broadcasts a series of randomly generated code slices to sensor nodes. Upon receiving al...

    Chien-Lung Wang, Gwoboa Horng, Yu-Sheng Chen in Computational Science – ICCS 2006 (2006)

  15. No Access

    Chapter and Conference Paper

    The Study of a Knowledge-Based Constraints Network System (KCNS) for Concurrent Engineering

    This research article demonstrates the use of a constraints network for modeling the knowledge which is necessary for concurrent product design. A Knowledge-based Constraints Network System (KCNS) has been dev...

    Wei-ming Wang, Jie Hu, Fei Zhou, Da-yong Li in Advances in Machine Learning and Cyberneti… (2006)

  16. No Access

    Chapter and Conference Paper

    The Dynamics of Network Minority Game

    The evolutionary dynamics of minority games based on three generic networks have been investigated : Kauffman’s NK networks (Kauffman nets), growing directed networks (GDNets), and growing directed networks with ...

    Bing-Hong Wang in Simulated Evolution and Learning (2006)

  17. No Access

    Chapter and Conference Paper

    Efficient 3D Face Reconstruction from a Single 2D Image by Combining Statistical and Geometrical Information

    In this paper, we present an efficient algorithm for reconstructing 3D head model from a single 2D image based on using a 3D eigenhead model. This system is composed of two components, offline training of the ...

    Shu-Fan Wang, Shang-Hong Lai in Computer Vision – ACCV 2006 (2006)

  18. No Access

    Chapter and Conference Paper

    A Novel Battery System Combined H2-FeCO3 Generation

    In order to solve the difficult problems of greenhouse effect and energy resource in short supply, develo** a battery system utilizing carbon dioxide and ferrous waste has significant potential in buffering ...

    Hong-wei Chen, **-quan Wang, Yong-hua Li in Challenges of Power Engineering and Enviro… (2007)

  19. No Access

    Chapter and Conference Paper

    A Parallel Independent Component Implement Based on Learning Updating with Forms of Matrix Transformations

    PVM (Parallel virtual machine) library is a tool which used processes large amounts of data sets. This paper wants to achieve a high performance solution that exploits PVM library and parallel computers to sol...

    **g-Hui Wang, Guang-Qian Kong, Cai-Hong Liu in Advanced Intelligent Computing Theories an… (2007)

  20. No Access

    Chapter and Conference Paper

    Location Estimation with Mobile Nodes in Wireless Sensor Networks

    The sensor nodes of wireless sensor networks (WSNs) have the following abilities such as: sensing, computation, and wireless communication capabilities. Hence, WSNs can be used for various application domains....

    Ying-Hong Wang, Chien-Min Lee, Wei-Ting Chen in Ubiquitous Intelligence and Computing (2007)

previous disabled Page of 7