Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Pattern Recognition Based on Stability of Discrete Time Cellular Neural Networks

    In this paper, some sufficient conditions are obtained to guarantee that discrete time cellular neural networks (DTCNNs) can have some stable memory patterns. These conditions can be directly derived from the ...

    Zhigang Zeng, De-Shuang Huang, Zengfu Wang in Advances in Neural Networks – ISNN 2004 (2004)

  2. No Access

    Chapter and Conference Paper

    Multiple Classifiers Fusion System Based on the Radial Basis Probabilistic Neural Networks

    The fusion system designing of multiple classifiers, which is based on the radial basis probabilistic neural network (RBPNN), is discussed in this paper. By means of the proposed design method, the complex str...

    Wen-Bo Zhao, Ming-Yi Zhang, Li-Ming Wang in Intelligent Data Engineering and Automated… (2004)

  3. No Access

    Chapter and Conference Paper

    Stability Analysis of Discrete-Time Cellular Neural Networks

    Discrete-time cellular neural networks (DTCNNs) are formulated and studied in this paper. Several sufficient conditions are obtained to ensure the global stability of DTCNNs with delays based on comparison met...

    Zhigang Zeng, De-Shuang Huang, Zengfu Wang in Advances in Neural Networks – ISNN 2004 (2004)

  4. No Access

    Chapter and Conference Paper

    A Novel Clustering Analysis Based on PCA and SOMs for Gene Expression Patterns

    This paper proposes a novel clustering analysis algorithm based on principal component analysis (PCA) and self-organizing maps (SOMs) for clustering the gene expression patterns. This algorithm uses the PCA te...

    Hong-Qiang Wang, De-Shuang Huang, **ng-Ming Zhao in Advances in Neural Networks - ISNN 2004 (2004)

  5. No Access

    Chapter and Conference Paper

    A Novel Hybrid GA/SVM System for Protein Sequences Classification

    A novel hybrid genetic algorithm(GA)/Support Vector Machine (SVM) system, which selects features from the protein sequences and trains the SVM classifier simultaneously using a multi-objective genetic algorith...

    **ng-Ming Zhao, De-Shuang Huang in Intelligent Data Engineering and Automated… (2004)

  6. No Access

    Chapter and Conference Paper

    Global Convergence of Steepest Descent for Quadratic Functions

    This paper analyzes the effect of momentum on steepest descent training for quadratic performance functions. Some global convergence conditions of the steepest descent algorithm are obtained by directly analyz...

    Zhigang Zeng, De-Shuang Huang, Zengfu Wang in Intelligent Data Engineering and Automated… (2004)

  7. No Access

    Chapter and Conference Paper

    Investment Selection and Risk Management for Insurance Corporation

    The problems related to the investment selection and risk management are very important for the insurance corporation and are considered in this paper. When performing the investment selection and risk managem...

    Yan-Ling Wang, De-Li Yang in Intelligent Data Engineering and Automated… (2006)

  8. No Access

    Chapter and Conference Paper

    Long-Range Temporal Correlations in the Spontaneous in vivo Activity of Interneuron in the Mouse Hippocampus

    The spontaneous in vivo firings of neuron in mouse hippocampus are generally considered as neuronal noise, where there is no any correlation in the inter-spike interval (ISI) sequences. In the present study, w...

    Sheng-Bo Guo, Ying Wang, **ng Yan in Advanced Intelligent Computing Theories an… (2007)

  9. No Access

    Chapter and Conference Paper

    A Novel Local Sensitive Frontier Analysis for Feature Extraction

    In this paper, an efficient feature extraction method, named local sensitive frontier analysis (LSFA), is proposed. LSFA tries to find instances near the crossing of the multi-manifold, which are sensitive to ...

    Chao Wang, De-Shuang Huang, Bo Li in Emerging Intelligent Computing Technology … (2009)

  10. No Access

    Chapter and Conference Paper

    Gender Recognition from Gait Using Radon Transform and Relevant Component Analysis

    In this paper, a new method for gender recognition via gait silhouettes is proposed. In the feature extraction process, Radon transform on all the 180 angle degrees is applied to every silhouette to construct ...

    Lei Chen, Yunhong Wang, Yiding Wang in Emerging Intelligent Computing Technology … (2009)

  11. No Access

    Chapter and Conference Paper

    An Quadtree Coding in E-chart

    With the development of IT and traffic logistics in sea, more function and performance of electronic chart (E-chart) in the navigation is needed. In the meantime, the requirement for high performance E-chart, ...

    Zhong-jie Zhang, **an Wu, De-peng Zhao in Information Computing and Applications (2010)

  12. No Access

    Chapter and Conference Paper

    Application Oriented Semantic Multi-touch Gesture Description Method

    To make multi-touch gestures better fit applications and facilitate the recognition of multi-touch gestures, this paper presents an application oriented semantic multi-touch gesture description method. Multi-t...

    De-xin Wang, Mao-jun Zhang in Advanced Intelligent Computing Theories an… (2010)

  13. No Access

    Chapter and Conference Paper

    A Scheduling Method of Maintenance Work Based on Dynamic Priority

    The scheduling problem of maintenance work on the equipment support station influences the support efficiency, especially for a station which repairs a large number of failed items from more than one subordina...

    Ying-wu Peng, De-jun Mao, Wei-yi Chen, Rui Wang in Applied Informatics and Communication (2011)

  14. No Access

    Chapter and Conference Paper

    Bioinformatics Analysis of the Complete Nucleotide Sequence of Duck Plague Virus UL22 Gene

    UL22 gene, also named gH gene(GenBank accession No. EU195089) from duck plague virus (DPV) CHv strain which was isolated in our laboratory, is a 2505bp segment. The analysis about the characteristics of this g...

    Li-Sha Yang, An-Chun Cheng, Ming-Shu Wang in Information Computing and Applications (2012)

  15. No Access

    Chapter and Conference Paper

    Design and Analysis of Missile Two-Loop Autopilot with Angle of Attack Feedback

    In order to eliminate the static error of the classic two loop autopilot, the PI compensator is introduced into the control system. To enhance the robustness of two loop autopilot with PI compensator, an angle...

    Jiang Wang, Zhe Yang, De-fu Lin in System Simulation and Scientific Computing (2012)

  16. No Access

    Chapter and Conference Paper

    A New Weighted ARC-SC Approach for Leaf Image Recognition

    In this paper, we present a novel feature extraction approach for plant leaf image recognition, which applies the arc length information to replace the Euclidean distance in traditional Shape Context (SC) meth...

    Zhi-De Zhi, Rong-**ang Hu in Intelligent Computing Theories and Applications (2012)

  17. No Access

    Chapter and Conference Paper

    Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture

    In NSS’10, Shao and Chin pointed out that Hsiang and Shih’s dynamic ID-based remote user authentication scheme for multi-server environment has several security flaws and further proposed an improved version w...

    Ding Wang, Chun-guang Ma, De-li Gu, Zhen-shan Cui in Network and System Security (2012)

  18. No Access

    Chapter and Conference Paper

    Staffing Open Collaborative Projects Based on the Degree of Acquaintance

    We consider the team formation problem in open collaborative projects existing in large community setting such as the Open Source Software (OSS) community. Given a query specifying a set of required skills for an...

    Mohammad Y. Allaho, Wang-Chien Lee in Database Systems for Advanced Applications (2013)

  19. No Access

    Chapter and Conference Paper

    A Survey on the Security of Multihop Ad Hoc Network

    With the development of wireless network, mobile Ad Hoc networks have been applied in many fields. But the security problem of Ad Hoc network has not been solved very well, and the security system of Ad Hoc ne...

    Yuan De-yu, Liu Tong, Wei Geng-yu, Wang Zhi-zhao in Trustworthy Computing and Services (2013)

  20. No Access

    Chapter and Conference Paper

    An Accurate Online Non-rigid Structure from Motion Algorithm

    So far, most existing non-rigid structure from motion (NRSFM) problems are solved by the batch algorithm. In this paper, a more accurate online NRSFM is proposed based on the differential evolution (DE) algori...

    Ya-** Wang, Zhan-Li Sun, Yang Qian in Advanced Intelligent Computing Theories an… (2015)

previous disabled Page of 2