Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Real-Time Multi-Application Network Traffic Identification Based on Machine Learning

    In this paper, kinds of network applications are first analyzed, and some simple and effective features from the package headers of network flows are then generated by using the method of time window. What is ...

    Meihua Qiao, Yanqing Ma, Yijie Bian, Ju Liu in Advances in Neural Networks – ISNN 2015 (2015)

  2. No Access

    Chapter and Conference Paper

    Capacity and Power Optimization for Collaborative Beamforming with Two Relay Clusters

    In this paper, we study two approaches to optimize the problems between capacity and power in a three-hop multi-relay network. In the first approach, two beamforming weight vectors are designed to maximize the...

    Bingbing Lu, Ju Liu, Chao Wang, Hongji Xu, Qing Wang in Advances in Swarm Intelligence (2014)

  3. No Access

    Chapter and Conference Paper

    Transmitter-Receiver Collaborative-Relay Beamforming by Simulated Annealing

    This paper considers the collaborative-relay beamforming (CRBF) design for a three-hop multi-relay network with one transmitter, one receiver and two clusters of relay nodes. It is assumed that, all the relay ...

    Dong Zheng, Ju Liu, Lei Chen, Yuxi Liu, Weidong Guo in Advances in Swarm Intelligence (2011)

  4. No Access

    Chapter and Conference Paper

    A Robust Non-Line-Of-Sight Error Mitigation Method in Mobile Position Location

    A novel non-line-of-sight (NLOS) error identification and range measurement reconstruction algorithm is proposed. First, a NLOS error identification technique is exploited to decide whether there is a NLOS pat...

    Sumei Chen, Ju Liu, Lin Xue in Advances in Neural Networks – ISNN 2009 (2009)

  5. No Access

    Chapter and Conference Paper

    ICA Based Super-Resolution Face Hallucination and Recognition

    In this paper, we propose a new super-resolution face hallucination and recognition method based on Independent Component Analysis (ICA). Firstly, ICA is used to build a linear mixing relationship between high...

    Hua Yan, Ju Liu, Jiande Sun, **nghua Sun in Advances in Neural Networks – ISNN 2007 (2007)

  6. No Access

    Chapter and Conference Paper

    A Novel Watermarking Method with Image Signature

    In this paper, we propose a novel invisible watermarking method with image signature, which can resist not only common image attacks but also copy attack. The image signature algorithm referred is based on Ima...

    **ao-Li Niu, Ju Liu, Jian-De Sun, Jian-** Qiao in Advances in Neural Networks - ISNN 2006 (2006)

  7. No Access

    Chapter and Conference Paper

    A 2DPCA-Based Video Watermarking Scheme for Resistance to Temporal Desynchronization

    Temporal synchronization is a problem that cannot be ignored in most video watermarking application. In this paper, a video watermarking scheme is proposed to resist temporal desynchronization by using shot se...

    Jiande Sun, Ju Liu, Hua Yan in Advances in Neural Networks - ISNN 2006 (2006)

  8. No Access

    Chapter and Conference Paper

    Blind Detection of Orthogonal Space-Time Block Coding Based on ICA Schemes

    Space-time block coding (STBC) can achieve transmit diversity gain and obtain higher coding gain without sacrifice of bandwidth. But the decoding requires accurate channel state information (CSI), which strong...

    Ju Liu, Bo Gu, Hongji Xu, Jian** Qiao in Advances in Neural Networks – ISNN 2005 (2005)

  9. No Access

    Chapter and Conference Paper

    A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components

    Digital watermarking is an enabling technique to prove the ownership of copyrighted digital products. But its utility may be reduced greatly by copy attack which can cause ownership ambiguity. In this paper, a...

    Ju Liu, Huibo Hu, Jiande Sun, Yu Huang in Advances in Neural Networks – ISNN 2005 (2005)

  10. No Access

    Chapter and Conference Paper

    A Novel Blind Deconvolution Method for Single-Output Chaotic Convolution Mixed Signal

    According to the chaotic characteristics, a deconvolution filter for single-output chaotic convolution mixed signal is designed by the linear predication error analysis. Then corrected estimated error from the...

    **efeng Cheng, Yong Zhang, Zhiquan Feng, Ju Liu in Advances in Neural Networks – ISNN 2005 (2005)

  11. No Access

    Chapter and Conference Paper

    A VQ-Based Blind Super-Resolution Algorithm

    In this paper, a novel method of blind Super-Resolution (SR) image restoration is presented. First, a learning based blur identification method is proposed to identify the blur parameter in which Sobel operato...

    Jian** Qiao, Ju Liu, Guoxia Sun in Advances in Intelligent Computing (2005)

  12. No Access

    Chapter and Conference Paper

    ICA-Based Beam Space-Time Block Coding with Transmit Antenna Array Selection

    Space-time block coding (STBC) can provide a fairly good diversity advantage over the Rayleigh fading channel, and the beam space-time block coding (BSTBC) scheme combining STBC with the transmit beamforming (...

    Hongji Xu, Ju Liu in Advances in Neural Networks - ISNN 2004 (2004)

  13. No Access

    Chapter and Conference Paper

    On the Performance of Space-Time Block Coding Based on ICA Neural Networks

    For conventional space-time block coding (STBC), the decoding usually requires accurate channel state estimation. However, the accuracy of the channel estimation strongly determines the system performance. Ind...

    Ju Liu, Hongji Xu, Yong Wan in Advances in Neural Networks - ISNN 2004 (2004)

  14. No Access

    Chapter and Conference Paper

    A Novel Denoising Algorithm Based on Feedforward Multilayer Blind Separation

    The blind source separation algorithm always does its best to retrieve source signals, so in fact the output is generally a stronger source added by some other weaker sources and noises. The algorithm proposed...

    **efeng Cheng, Ju Liu, Jian** Qiao, Yewei Tao in Advances in Neural Networks – ISNN 2004 (2004)

  15. No Access

    Chapter and Conference Paper

    Data Hiding in Independent Components of Video

    Independent component analysis (ICA) is a recently developed statistical technique which often characterizes the data in a natural way. Digital watermarking is the main technique for copyright protection of mu...

    Jiande Sun, Ju Liu, Huibo Hu in Advances in Neural Networks – ISNN 2004 (2004)