Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Energy Storage Capacity Optimization for Deviation Compensation in Dispatching Grid-Connected Wind Power

    Many uncertain factors in wind power forecasting lead to large prediction errors. Various prediction technologies have been developed to reduce errors and improve the dispatch-ability of grid-connected wind po...

    Jian-hong Zhu, Kang Li, Renji Xu, Ju** Gu in Recent Advances in Sustainable Energy and … (2021)

  2. No Access

    Chapter and Conference Paper

    Artificial Bee Colony Algorithm Based on Ensemble of Constraint Handing Techniques

    Artificial Bee Colony (ABC) Algorithm was firstly proposed for unconstrained optimization problems. Later many constraint processing techniques have been developed for ABC algorithms. According to the no free ...

    Yue-Hong Sun, Dan Wang, Jian-**ang Wei in Intelligent Computing Theories and Applica… (2018)

  3. No Access

    Chapter and Conference Paper

    Newton Method for Interval Predictor Model with Sphere Parameter Set

    In this paper, we study the construction of interval prediction model. After introducing the family of models and some basic information, we present the computational results for the construction of interval p...

    Xuan **ao, Peng Wang, Jian-Hong Wang in Cloud Computing and Security (2017)

  4. No Access

    Chapter and Conference Paper

    A Tight Security Reduction Designated Verifier Proxy Signature Scheme Without Random Oracle

    Most of existing designated verifier proxy signature (DVPSt) schemes which are proved to be secure in the standard model is constructed based on Water’s identity-based encryption. Therefore, security reduction...

    **aoming Hu, Hong Lu, Yan Liu, Jian Wang in Computational Science and Its Applications… (2015)

  5. No Access

    Chapter and Conference Paper

    An Execution Tracing Tool for Multi-tier Web Applications

    A precise request tracing tool is essential to help both developers and administrators debug performance problems of multi-tier web applications. This paper introduces a non-intrusive end-to-end runtime path t...

    Jian Xu, Hong Zhang, QianMu Li in Advanced Research on Computer Science and … (2011)

  6. No Access

    Chapter and Conference Paper

    Research and Analysis of TD-SCDMA Uplink Capacity

    In 3thG system network planning, the cell capacity calculation is a very important and critical issue. Assumed under the single-service of TD-SCDMA, this paper investigated the uplink cell capacities of the TD-SC...

    Hao Chen, Tong Yang, Jian-fu Teng, Hong He in Advanced Research on Computer Education, S… (2011)

  7. No Access

    Chapter and Conference Paper

    An Improvement Method for Daugman’s Iris Localization Algorithm

    An improvement method is present in this paper for Daugman’s iris localization algorithm. It may make iris localization more rapid and more precise. It may also decrease the computational complexity of the loc...

    Zhi-yong Peng, Hong-zhou Li, Jian-ming Liu in Advances in Neural Networks – ISNN 2011 (2011)

  8. No Access

    Chapter and Conference Paper

    Spatio-temporal Simulation of Epidemiological SIQR Model Based on the Multi-Agent System with Focus on Influenza A (H1N1)

    Influenza A (H1N1) has caused tremendous damage in the world, so to learn its law is of great significance in the epidemic prevention and social stability. Taking the multi-agent system (MAS), geo-spatial envi...

    Hong **ao, Huaiyu Tian, Lei Shao, Jian Zhao in Computational Intelligence and Intelligent… (2010)

  9. No Access

    Chapter and Conference Paper

    Improving Web-Based OOV Translation Mining for Query Translation

    Query translation is the most widely used approach for cross-language information retrieval (CLIR). The major challenge of query translation is translating Out-Of-Vocabulary (OOV) terms. This paper proposes th...

    Yun Dong Ge, Yu Hong, Jian Min Yao, Qiao Ming Zhu in Information Retrieval Technology (2010)

  10. No Access

    Chapter and Conference Paper

    A Probability-Based Framework for Dynamic Resource Scheduling in Grid Environment

    Recent enthusiasm in grid computing has resulted in a tremendous amount of research in resource scheduling techniques for tasks in a workflow. Most of the work on resource scheduling is aimed at minimizing the...

    San-Yih Hwang, Jian Tang, Hong-Yang Lin in Advances in Grid and Pervasive Computing (2008)

  11. No Access

    Chapter and Conference Paper

    Application of Weighted Ideal Point Method to Environmental/Economic Load Dispatch

    This paper proposes a novel environmental/economic load dispatch model by considering the fuel cost and emissionfunctions with uncertain co-efficients and the constraints of a ramp rate. The uncertain coeffici...

    Guo-li Zhang, Geng-yin Li, Hong **e in Advances in Machine Learning and Cyberneti… (2006)

  12. No Access

    Chapter and Conference Paper

    Practical t-out-n Oblivious Transfer and Its Applications

    General constructions of t-out-n (string) oblivious transfers and millionaire protocol are presented using two-lock crypto-system, which enables Alice to send Bob secret without shared key. In the proposed t-out-

    Qian-Hong Wu, Jian-Hong Zhang, Yu-Min Wang in Information and Communications Security (2003)