Suchergebnisse - "2012 2nd International Conference on Computer Science and Network Technology"

  1. 1

    Sensing-throughput tradeoff for interference-aware cognitive radio networks von Kan, Changju, Ding, Guoru, Song, Fei, Wu, Qihui

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Nowadays cognitive radio networks (CRNs) have been proposed as a promising method to solve the problem of radio spectrum shortage and spectrum sensing has been …”
    Volltext
    Tagungsbericht
  2. 2

    Acceleration of MPC using graphic processing unit von Yang Gang, Liu Mingguang

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Model Predictive control (MPC) algorithm owns good performance but causes heavy computational burden. This disadvantage makes it only applied for small systems …”
    Volltext
    Tagungsbericht
  3. 3

    Utility-based load distribution for QoS provisioning and utility maximization in wireless random access networks von Gu, Bo, Zhang, Cheng, Yamori, Kyoko, Xu, Sugang, Tanaka, Yoshiaki

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… In this paper, a utility-based load distribution approach is introduced for relieving congestion at certain popular spaces within the network …”
    Volltext
    Tagungsbericht
  4. 4

    Voting affinity propagation algorithm for clustering XML documents von Wang, Xu, Wei, Jinmao, Fan, Baoquan, Yang, Ting

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Affinity propagation algorithm(AP) is a new powerful tool for unsupervised clustering. Yet AP can't work well as expected on the datasets with high-similarity …”
    Volltext
    Tagungsbericht
  5. 5

    A mutation-based fuzz testing approach for network protocol vulnerability detection von Han, Xing, Wen, Qiaoyan, Zhang, Zhao

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Mutation-based fuzz testing is a very effective approach to improve the security and reliability of protocol implementations, however, present mutation-based …”
    Volltext
    Tagungsbericht
  6. 6

    A detection approach for solitary pulmonary nodules based on CT images von Shao, Hong, Cao, Li, Liu, Yang

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… It has been indicated that detection of pulmonary nodules plays an important role in diagnosing lung cancer in early-stage. In this paper, we propose an …”
    Volltext
    Tagungsbericht
  7. 7

    The load balancing algorithm in cloud computing environment von Haozheng Ren, Yihua Lan, Chao Yin

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… With the users and the types of application on the cloud computing platform increasing, it becomes a critical problem about how to use the resources in the …”
    Volltext
    Tagungsbericht
  8. 8

    Research of space-object detection and tracking simulation system based on HLA von Ji-hua, Zhang, Ning, Zhao, Lei, Cai, Ru-yu, Fan, Bin, Tan, Qing-Jun, Qu

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… An expandable open simulation system structure based on HLA technology and against the background of detection and tracking ability analysis is designed …”
    Volltext
    Tagungsbericht
  9. 9

    Application of hyperspectral remote sensing in mineral identification and mapping von Zhang Ting-ting, Liu Fei

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Hyperspectral remote sensing technology can identify mineral finely compared with traditional remote sensing techniques since many tens of bands are recorded …”
    Volltext
    Tagungsbericht
  10. 10

    Range expansion for pico cell in heterogeneous LTE - A cellular networks von Yasir, Basim A., Su, Gang, Bachache, Nasseer

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… In LTE-Advanced, a heterogeneous network (HetNet) where femtocells and picocells overlaid onto macrocells is extensively discussed in addition to traditional …”
    Volltext
    Tagungsbericht
  11. 11

    Application layer ddos detection using clustering analysis von Ye, Chengxu, Zheng, Kesong, She, Chuyu

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Many methods were designed in previous literatures to protect systems from IP and TCP layers distributed denial of service attacks instead of the application …”
    Volltext
    Tagungsbericht
  12. 12

    The design and implementation of mobile communication base station inspection system based on Web technology von Yang, Kun, Cheng, Bo, Peng, Yong

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… The Mobile Communication Base Station Inspection is one type of basic work to ensure safe operation of the base station equipment. By using the mobile …”
    Volltext
    Tagungsbericht
  13. 13

    A real-time automatic detection of phishing URLs von Zhang, Jianyi, Wang, Yonghao

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Phishing scam, a fraudulent attempt that masquerades as a trustworthy entity to obtain users' sensitive data, has become the most dangerous form of online …”
    Volltext
    Tagungsbericht
  14. 14

    Image segmentation based on Support Vector Machine von Wang, Xuejun, Wang, Shuang, Zhu, Yubin, Meng, Xiangyi

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… In content-based multimedia technologies, video object extraction has received more and more attention. In this paper, Support Vector Machine (SVM) is proposed …”
    Volltext
    Tagungsbericht
  15. 15

    A network traffic prediction model based on recurrent wavelet neural network von Zhang, Kun, Chai, Yinping, Fu, Xing-an

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… The network traffic prediction model is the foundation of network performance analysis and designing. The traditional traffic models have the weakness of …”
    Volltext
    Tagungsbericht
  16. 16

    A new trajectory clustering algorithm based on TRACLUS von Jiashun, Chen

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Most trajectory clustering algorithms including the famous TRACLUS require the setting of two input parameters and are sensitive to input parameters. Incorrect …”
    Volltext
    Tagungsbericht
  17. 17

    Object-oriented and ontology context-aware modeling based on XML von Xu Jianfeng, Wang Dong

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… In order to solve the problem of providing service to users by using context-aware modeling in pervasive computing, this paper proposes a context-aware …”
    Volltext
    Tagungsbericht
  18. 18

    Prediction of user interest based on collaborative filtering for personalized academic recommendation von Yu, Jie, Xie, Kege, Zhao, Haihong, Liu, Fangfang

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… The development of Internet provides academic researchers with abundant information, which also brings them heavier and heavier information burden, because to …”
    Volltext
    Tagungsbericht
  19. 19

    Saliency computation and simplification of point cloud data von Yu, Haifeng, Wang, Rui, Chen, Junli, Liu, Liang, Wan, Wanggen

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… According to human visual sensitivity, in this paper, we present a new simplification of point cloud based on point saliency. In order to find the nearest K …”
    Volltext
    Tagungsbericht
  20. 20

    Sentiment analysis of Chinese micro-blog using semantic sentiment space model von Sui, Huang, Jianping, You, Hongxian, Zhang, Wei, Zhou

    ISBN: 1467329630, 9781467329637
    Veröffentlicht: IEEE 01.12.2012
    “… Recently public, government, company and other forms of communities are extremely vocal about their opinions and perceptions on their appeals, policies and …”
    Volltext
    Tagungsbericht