Skip to main content

and
  1. Article

    Open Access

    An Efficient Algorithm of Star Subgraph Queries on Urban Traffic Knowledge Graph

    Knowledge graph has wide applications in the field of computer science. In the knowledge service environment, the information is large and explosive, and it is difficult to find knowledge of common phenomena. ...

    Tao Sun, Jianqiu Xu, Cai** Hu in Data Science and Engineering (2022)

  2. No Access

    Article

    Human motion tracking and 3D motion track detection technology based on visual information features and machine learning

    Human motion detection is a major subject of investigation in the field of machine visualization and synthetic integration. It serves a wide and important spectrum of applications in terms of visual surveillan...

    **n Zhang, Zhongqiu Xu, Hongbo Liao in Neural Computing and Applications (2022)

  3. No Access

    Chapter and Conference Paper

    ARCA: A Tool for Area Calculation Based on GPS Data

    In this paper, we develop a tool to efficiently and effectively calculate agricultural machinery’s working area based on farming machinery’s GPS data. The tool works as follows. First, we pre-process GPS data ...

    Su**g Song, Jie Sun, Jianqiu Xu in Database Systems for Advanced Applications (2021)

  4. No Access

    Article

    Moving Objects with Transportation Modes: A Survey

    In this article, we survey the main achievements of moving objects with transportation modes that span the past decade. As an important kind of human behavior, transportation modes reflect characteristic movem...

    Jian-Qiu Xu, Ralf Hartmut Güting, Yu Zheng in Journal of Computer Science and Technology (2019)

  5. No Access

    Chapter and Conference Paper

    A Mobile Phone Data Visualization Tool for People Flow Analysis

    Mobile phone data contain the information of each interaction between mobile phones and telecommunication infrastructures. These data provide a wealth of information about urban dynamics and human activities s...

    Liangjian Chen, Siyu Chen, Shengnan Guo, Yue Yang, Jianqiu Xu in Web and Big Data (2019)

  6. No Access

    Chapter and Conference Paper

    An Efficient Provably Secure Password-Based Authenticated Key Agreement

    Password-based authenticated key agreement enables several parties to establish a shared cryptographically strong key over an insecure network using short low entropy passwords. This authenticated key agreemen...

    Hanqiu Xu, Qing** Wang, **g Zhou, Ou Ruan in Innovative Mobile and Internet Services in… (2018)

  7. No Access

    Article

    Reverse Furthest Neighbors Query in Road Networks

    Given a road network G = (V,E), where V (E) denotes the set of vertices(edges) in G, a set of points of interest P and a query point q residing in G, the reverse furthest neighbors (Rfn ...

    **ao-Jun Xu, **-Song Bao, Bin Yao in Journal of Computer Science and Technology (2017)

  8. No Access

    Chapter and Conference Paper

    A System for Querying and Displaying Typed Intervals

    We consider that a database stores a set of typed intervals, each of which defines start and end points, a weight and a type. Typed intervals enrich the data representation and support applications involving d...

    Jianqiu Xu, Junxiu Liang in Advances in Spatial and Temporal Databases (2017)

  9. No Access

    Chapter and Conference Paper

    Detect Tracking Behavior Among Trajectory Data

    Due to the continuing improvements in location acquisition technology, a large population of GPS-equipped moving objects are tracked in a server. In emergency applications, users may want to detect whether a t...

    Jianqiu Xu, Jiangang Zhou in Advanced Data Mining and Applications (2017)

  10. No Access

    Chapter and Conference Paper

    A Tool for 3D Visualizing Moving Objects

    Visually representing query results and complex data structures in a database system provides a convenient way for users to understand and analyze the data. In this demo, we will present a tool for 3D visualiz...

    Weiwei Wang, Jianqiu Xu in Web and Big Data (2017)

  11. No Access

    Chapter and Conference Paper

    Secure Digital Content Management in Library

    With the advancement of digital technologies and networks, all kinds of digital contents are stored in library and the registered users can use them in an easy way. However, piracy becomes increasingly rampant...

    Genjia **e, Zhongqiu Xu in Information and Business Intelligence (2012)

  12. No Access

    Chapter and Conference Paper

    Image Restoration Based on an AdaBoost Algorithm

    A novel image restoration method is developed based an AdaBoost algorithm. A sliding-window method is employed to extract image features and to obtain the input and output of BP neural network. An AdaBoost alg...

    Nian Cai, Feng **, Qing Pan, Shao-qiu Xu in Communications and Information Processing (2012)

  13. No Access

    Chapter and Conference Paper

    Research on Reversible Visible Watermarking Technique

    With the advancement of digital technologies and networks, all kinds of digital contents are distributed over Internet. However, piracy becomes increasingly rampant as customers can easily duplicate and redist...

    Zhongqiu Xu, Liangju Li, Genjia **e in Information and Business Intelligence (2012)