Skip to main content

previous disabled Page of 18
and
  1. No Access

    Chapter and Conference Paper

    The Reversibility of Kapitza Resistance

    Although research of the Kapitza resistance has continued for many years, there still is not a definite and quantitative result for the reversibility of the effect (1,2). The reason lies in the technical diffi...

    Yun-hui Xu, Jia-qi Zheng, Wei-yan Guan in Phonon Scattering in Condensed Matter V (1986)

  2. No Access

    Chapter and Conference Paper

    Development of a Variational Boundary Integral Method for the Analysis of Fully Three Dimensional Crack Advance Problems

    A variational boundary integral method is developed for the analysis of three dimensional cracks of arbitrary geometry in both isotropic and anisotropic elastic solids. By representing the opening displacement...

    Guanshui Xu, Ali S. Argon, Michael Ortiz, Allan Bower in Computational Mechanics ’95 (1995)

  3. No Access

    Chapter and Conference Paper

    Numerical Analysis of Residual Stress due to Surface Induction Hardening

    A finite element method (FEM) was utilized here to analyse the distribution of residual stresses generated by surface induction hardening. The transformation induced plasticity (TRIP) and the latent heat were ...

    Dong-hui Xu, Zhen-Bang Kuang in Computational Mechanics ’95 (1995)

  4. No Access

    Chapter and Conference Paper

    A New Approach to the Treatment of Atopic Dermatitis: Antioxidant Vitamins and Atopic Dermatitis

    Atopic dermatitis is a chronic inflammatory disorder that is frequently observed in affluent societies. An increased IgE in atopic dermatitis is a consequence of an imbalance between CD4+ T-cell subsets, T-hel...

    Mitsuki Yoshioka, Haruhiko Dozono, Koji Aoyama in Food Factors for Cancer Prevention (1997)

  5. No Access

    Chapter and Conference Paper

    A method for integrating deductive databases

    This paper presents an approach for integrating deductive databases. In our approach deductive databases are expressed in a functional database programming language. For integrating the extensional parts of de...

    Lihui Xu, Alexandra Poulovassilis in Advances in Databases (1997)

  6. No Access

    Chapter and Conference Paper

    Two-variable linear programming in parallel

    Two-variable linear programming is a fundamental problem in computational geometry. Sequentially, this problem was solved optimally in linear time by Megiddo and Dyer using the elegant prune-and-search techniq...

    Danny Z. Chen, **hui Xu in Algorithm Theory — SWAT'98 (1998)

  7. No Access

    Chapter and Conference Paper

    Finding an Optimal Path without Growing the Tree

    In this paper, we study a class of optimal path problems with the following phenomenon: The space complexity of the algorithms for reporting the lengths of single-source optimal paths for these problems is asympt...

    Danny Z. Chen, Ovidiu Daescu, **aobo (Sharon) Hu, **hui Xu in Algorithms — ESA’ 98 (1998)

  8. No Access

    Chapter and Conference Paper

    Optimal Beam Penetrations in Two and Three Dimensions

    The problem of computing an optimal beam among weighted regions (called the optimal beam problem) arises in several applied areas such as radiation therapy, stereotactic brain surgery, medical surgery, geological...

    Danny Z. Chen, **aobo Hu, **hui Xu in Algorithms and Computation (2000)

  9. No Access

    Chapter and Conference Paper

    Topological Peeling and Implementation

    We present a new approach, called topological peeling, and its implementation for traversing a portion AR of the arrangement formed by n lines within a convex region R on the plane. Topological peeling visits the...

    Danny Z. Chen, Shuang Luan, **hui Xu in Algorithms and Computation (2001)

  10. No Access

    Chapter and Conference Paper

    An Experimental Study and Comparison of Topological Peeling and Topological Walk

    In this paper, we present an experimental study comparing two algorithms, topological peeling and topological walk, for traversing arrangements of planar lines. Given a set H of n lines and a convex region R on a...

    Danny Z. Chen, Shuang Luan, **hui Xu in Computing and Combinatorics (2002)

  11. No Access

    Chapter and Conference Paper

    A Variable Consistent Server Replication Model for Mobile Database

    This paper presents a variable consistent replication model, called Variable Consistent Server Replication (VCSR), for mobile database. Based on the three-tier data replication architecture, VCSR uses the dece...

    **hui Xu, Ming Xu in Advanced Parallel Processing Technologies (2003)

  12. No Access

    Chapter and Conference Paper

    Visual Features Extracting & Selecting for Lipreading

    This paper has put forward a way to select and extract visual features effectively for lipreading. These features come from both lowlevel and high-level, those are compensatory each other. There are 41 dimensi...

    Hong-xun Yao, Wen Gao, Wei Shan, Ming-hui Xu in Audio- and Video-Based Biometric Person Au… (2003)

  13. No Access

    Chapter and Conference Paper

    Traveling Salesman Problem of Segments

    In this paper, we present a polynomial time approximation scheme (PTAS) for a variant of the traveling salesman problem (called segment TSP) in which a traveling salesman tour is sought to traverse a set of n ∈-s...

    **hui Xu, Yang Yang, Zhiyong Lin in Computing and Combinatorics (2003)

  14. No Access

    Chapter and Conference Paper

    An Efficient Algorithm for Determining 3-D Bi-plane Imaging Geometry

    Biplane projection imaging is one of the primary methods for imaging and visualizing the cardiovascular systems in medicine. A key problem in such a technique is to determine the imaging geometry (i.e., the ro...

    **hui Xu, Guang Xu, Zhenming Chen in Computational Science and Its Applications… (2004)

  15. No Access

    Chapter and Conference Paper

    List Data Extraction in Semi-structured Document

    The amount of semi-structured documents is tremendous online, such as business annual reports, online airport listings, catalogs, hotel directories, etc. List, which has structured characteristics, is used to ...

    Hui Xu, Juan-Zi Li, Peng Xu in Web Information Systems Engineering – WISE 2005 (2005)

  16. No Access

    Chapter and Conference Paper

    Research on Reliability Evaluation of Series Systems with Optimization Algorithm

    The failure probability of a system can be expressed as an integral of the joint probability density function within the failure domain defined by the limit state functions of the system. Generally, it is very...

    Wei** Jiang, Yusheng Xu, Yuhui Xu in Advances in Intelligent Computing (2005)

  17. No Access

    Chapter and Conference Paper

    Research on a Direct Adaptive Neural Network Control Method of Nonlinear Systems

    The problem of direct adaptive neural control for a class of nonlinear systems with an unknown gain sign and nonlinear uncertainty is discussed in this paper. Based on the principle of sliding mode control and...

    Wei** Jiang, Yusheng Xu, Yuhui Xu in Advances in Natural Computation (2005)

  18. No Access

    Chapter and Conference Paper

    A Novel Data Mining Method Based on Ant Colony Algorithm

    Data mining has become of great importance owing to ever-increasing amounts of data collected by large organizations. This paper propose an data mining algorithm called Ant-Miner(I),which is based on an improv...

    Wei** Jiang, Yusheng Xu, Yuhui Xu in Advanced Data Mining and Applications (2005)

  19. No Access

    Chapter and Conference Paper

    An Improved Approximation Algorithm for Uncapacitated Facility Location Problem with Penalties

    In this paper, we consider an interesting variant of the facility location problem called uncapacitated facility location problem with penalties (UFLWP for short) in which each client is either assigned to an ope...

    Guang Xu, **hui Xu in Computing and Combinatorics (2005)

  20. No Access

    Chapter and Conference Paper

    A Novel Intrusions Detection Method Based on HMM Embedded Neural Network

    Due to the excellent performance of the HMM (Hidden Markov Model) in pattern recognition, it has been widely used in voice recognition, text recognition. In recent years, the HMM has also been applied to the i...

    Wei** Jiang, Yusheng Xu, Yuhui Xu in Advances in Natural Computation (2005)

previous disabled Page of 18