Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Detect Tracking Behavior Among Trajectory Data

    Due to the continuing improvements in location acquisition technology, a large population of GPS-equipped moving objects are tracked in a server. In emergency applications, users may want to detect whether a t...

    Jianqiu Xu, Jiangang Zhou in Advanced Data Mining and Applications (2017)

  2. No Access

    Chapter and Conference Paper

    A Tool for 3D Visualizing Moving Objects

    Visually representing query results and complex data structures in a database system provides a convenient way for users to understand and analyze the data. In this demo, we will present a tool for 3D visualiz...

    Weiwei Wang, Jianqiu Xu in Web and Big Data (2017)

  3. No Access

    Chapter and Conference Paper

    A Context-Aware MAC Protocol for VANETs

    Collision-free transmission is important for reliable and delay-bounded wireless communication, which is required by many safety-related applications in vehicular ad-hoc networks (VANETs). However, with the in...

    Qiu Xu, Haikuan Fan, Shuangfei Guo in Wireless Algorithms, Systems, and Applicat… (2013)

  4. No Access

    Chapter and Conference Paper

    Secure Digital Content Management in Library

    With the advancement of digital technologies and networks, all kinds of digital contents are stored in library and the registered users can use them in an easy way. However, piracy becomes increasingly rampant...

    Genjia **e, Zhongqiu Xu in Information and Business Intelligence (2012)

  5. No Access

    Chapter and Conference Paper

    Image Restoration Based on an AdaBoost Algorithm

    A novel image restoration method is developed based an AdaBoost algorithm. A sliding-window method is employed to extract image features and to obtain the input and output of BP neural network. An AdaBoost alg...

    Nian Cai, Feng **, Qing Pan, Shao-qiu Xu in Communications and Information Processing (2012)

  6. No Access

    Chapter and Conference Paper

    Research on Reversible Visible Watermarking Technique

    With the advancement of digital technologies and networks, all kinds of digital contents are distributed over Internet. However, piracy becomes increasingly rampant as customers can easily duplicate and redist...

    Zhongqiu Xu, Liangju Li, Genjia **e in Information and Business Intelligence (2012)