Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleAugust 2011
A Novel Shot Boundary Detection Method Based on Genetic Algorithm-Support Vector Machine
IHMSC '11: Proceedings of the 2011 Third International Conference on Intelligent Human-Machine Systems and Cybernetics - Volume 01Pages 144–147https://doi.org/10.1109/IHMSC.2011.41Shot boundary detection (SBD) plays an important role in content-based video retrieval. In this paper, a novel algorithm for SBD based on support vector machine (SVM) and genetic algorithm (GA) is proposed. First of all, features of pixel domain and ...
- ArticleJuly 2009
An Identity-Based Proxy Signature from Bilinear Pairings
ICIE '09: Proceedings of the 2009 WASE International Conference on Information Engineering - Volume 02Pages 14–17https://doi.org/10.1109/ICIE.2009.125Currently, ID-based PKC has attracted much attention and got manyachievements. Proxy signature allows an original signer to delegatehis private key to a proxy signer to sign some message on behalf ofthe original signer. We present a ID-based proxy ...
- ArticleJuly 2009
The Design of an Antenna Array Used for the Suppression of Es Layer Clutter
ESIAT '09: Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology - Volume 02Pages 465–468https://doi.org/10.1109/ESIAT.2009.120There has Es layer clutter in the high frequency surface wave radar, and the Es layer clutter has the difference polarized characters with the signal. Horizontally polarized antennas can be added as auxiliary antennas in the high frequency surface wave ...
- ArticleMay 2009
A Design of a Random Roll Call System Based on VB
ICIC '09: Proceedings of the 2009 Second International Conference on Information and Computing Science - Volume 01Pages 316–318https://doi.org/10.1109/ICIC.2009.87Traditional roll call is usually taken in person by teacher. This is a very fussy and tedious task. In order to keep students interested and increase the teaching interactivity between the teacher and the students, we designed a Random Roll Call System ...
- ArticleDecember 2008
Availability and Cost Analysis of a Fault-Tolerant Software System with Rejuvenation
ICACTE '08: Proceedings of the 2008 International Conference on Advanced Computer Theory and EngineeringPages 261–265https://doi.org/10.1109/ICACTE.2008.115In recent years, remarkable attention has been paid to software aging phenomena, in which the performance of software systems degrades with time. Software aging may eventually leads to transient crash/hang failures. The well-known technique of software ...
- ArticleDecember 2008
A Model for the Ionospheric Clutter in HFSWR Radar
ICIII '08: Proceedings of the 2008 International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 01Pages 179–182https://doi.org/10.1109/ICIII.2008.54In order to find an effective arithmetic which can suppress the useless ionospheric clutter in a surface wave radar system, a new model for the ionospheric clutter is proposed here. Using the multiple phase-screen method used for the investigation of ...
- ArticleDecember 2008
Common Software-Aging-Related Faults in Fault-Tolerant Systems
CIMCA '08: Proceedings of the 2008 International Conference on Computational Intelligence for Modelling Control & AutomationPages 327–331https://doi.org/10.1109/CIMCA.2008.113In recent years, remarkable attention has been focused on software aging phenomena, in which the performance of software systems degrades with time. Fault-tolerant software systems which provide high assurance may suffer from such phenomena. Based on ...
- ArticleOctober 2008
Research on Consistent Measurement of Uncertainty Based on Entropy
ICICTA '08: Proceedings of the 2008 International Conference on Intelligent Computation Technology and Automation - Volume 01Pages 684–687https://doi.org/10.1109/ICICTA.2008.278Uncertainty is an essential characteristic of Intelligence. It has various types and usually each type can be measured in a different way. Thus, it is not helpful for thinking and processing as a whole. In this paper, based on entropy, we discuss the ...
- ArticleOctober 2008
Mining Negative Association Rules in Multi-database
FSKD '08: Proceedings of the 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery - Volume 02Pages 596–599https://doi.org/10.1109/FSKD.2008.120Negative association rules (NARs) catch mutually exclusive correlations among items. They play important roles in decision-making. But nowadays the techniques of NARs mining focus on mono-database. With the rapid development of information and ...
- ArticleAugust 2005
A pixel-level multisensor image fusion algorithm based on fuzzy logic
FSKD'05: Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part IPages 717–720https://doi.org/10.1007/11539506_89A new multisensor image fusion algorithm based on fuzzy logic is proposed. The membership function and fuzzy rules of the new algorithm is defined using the Fuzzy Inference System (FIS) editor of fuzzy logic toolbox in Matlab 6.1. The new algorithm is ...