Now showing items 1-20 of 165

    • 3D image skeleton algorithms 

      Wu, Jiangui; Duan, Hong; Zhong, Qi; 段鸿 (IEEE Computer Society, 2011)
      Skeletons are compact representations of the original objects, which are useful for many visualization tasks including medical imaging, computer graphics, computer-aided design. We introduce the basic concepts and properties ...
    • A 3D Controllable Head and Face Modeling Method for a Certain Person 

      Hong, Duan; 段鸿 (IEEE COMPUTER SOC, 2008)
      Presents a method to reconstruct a controllable 3D head and face model for a specific person. The 3D grid-muscle head and face model of the certain person is created after selecting key feature points from a front face ...
    • A collaborative filtering recommendation algorithm based on user clustering and Slope One scheme 

      Wang, Jingjin; Lin, Kunhui; Li, Jia; 林坤辉 (IEEE Computer Society, 2013)
      Recommendation system has been widely used in electronic commerce, news, web2.0, E-learning and other fields. Collaborative filtering is one of the most important algorithms. But as scale of recommendation system continues ...
    • A fast and smooth carving algorithm for online 3D reconstruction 

      Gao, Xing; Yu, Ning; Liao, Ming-Hong; 廖明宏 (Trans Tech Publications, 2013)
      Online rapid three-dimensional reconstruction is widely applied in virtual reality, heritage preservation, bio-engineering and architectural fields. The error caused by image quality or manual import is the main reason for ...
    • A Fast Eye Localization Algorithm Using Integral Image 

      Huang, Chunde; Lin, Kunhui; Long, Fei; 林坤辉; 龙飞 (IEEE COMPUTER SOC, 2009)
      Eye localization is an essential step in automatic face recognition system(AFRC), since it has a direct influence on the overall recognition performance. In this paper, we present a simple and fast eye localization algorithm, ...
    • A fast simulation for thousands of M/2M/2 parallel Homogeneous Fork/Join pipelines 

      Chen, Ray Jinzhu; Tong, Muchenxuan; Jiang, Chuan; 姜川 (IEEE Computer Society, 2011)
      We study a parallel K-pipeline HFJ (Homogeneous Fork/Join queueing) system in which each pipeline has two identical exponential first-in-first-out services where each service has an infinite capacity queue. Jobs arrive ...
    • A feature selection method for malware detection 

      Jiang, Qingshan; Zhao, Xinxing; Huang, Kai; 姜青山; 黄凯 (IEEE Computer Society, 2011)
      Due to the serious network security problems in recent years, a large number of malware features have been emerged, which leads to increasing time-complexity and space-consumption for malware detection systems. Moreover, ...
    • A fingers vector detection method based on K vector and K-medoids clustering algorithm 

      Duan, Hong; Cai, Kun Yu; 段鸿 (Trans Tech Publications Ltd, 2013)
      This paper proposed a method of computing the hand direction vector. At first, using Kvector method, compute the K-slope of all the points on the contour to get a series of peak point sets; Then, cluster the sets which ...
    • A gesture trace detection method using DTW 

      Hong, Duan; Luo, Yang; 段鸿 (Trans Tech Publications Ltd, 2013)
      This paper puts forward a gestures trajectory recognition method based on DTW. Through the direction characteristic to calculate trajectory characteristics, and through the coding to quantize direction characteristic, and ...
    • A hierarchical clustering based on overlap similarity measure 

      Qu, Jun; Jiang, Qingshan; Weng, Fangfei; Hong, Zhiling; 姜青山 (IEEE COMPUTER SOC, 2007)
      Selecting the appropriate number of clusters and distinguishing partially overlapping and irregular data are two important problems in clustering. Hierarchical clustering provides a good solution to them. Similarity measure ...
    • A hybrid distance-based outlier detection approach 

      Huang, Yanyan; Zhang, Zhongnan; Liao, Minghong; Tan, Yize; Zhou, Shaobin; 张仲楠; 廖明宏 (IEEE Computer Society, 2012)
      Most real-world datasets have outliers. Outliers can imply abnormal states that often indicate significant performance degradation or danger in certain circumstances. Therefore, the outlier detection plays an important ...
    • A hybrid recommendation algorithm based on Hadoop 

      Lin, Kunhui; Wang, Jingjin; Wang, Meihong; 林坤辉; 王美红 (Institute of Electrical and Electronics Engineers Inc., 2014 Octob)
      Recommender system has been widely used and collaborative filtering algorithm is the most widely used algorithm in recommender system. As scale of recommender system continues to expand, the number of users and items of ...
    • A Hybrid Statistical Language Model Applied to the Domain Specific Information Retrieval 

      Wei Wang; Kunhui Lin; Changle Zhou; 林坤辉 (IEEE COMPUTER SOC, 2008)
      The traditional language model takes the multi-topics document corpus as the research target. In order to avoid the interference brought by the multi-topics problem, this paper focuses on the domain specific Information ...
    • A K-means clustering with optimized initial center based on Hadoop platform 

      Lin, Kunhui; Li, Xiang; Zhang, Zhongnan; Chen, Jiahong; 林坤辉; 张仲楠 (Institute of Electrical and Electronics Engineers Inc., 2014 Octob)
      With the explosive growth of data, the traditional clustering algorithms running on separate servers can not meet the demand. To solve the problem, more and more researchers implement the traditional clustering algorithms ...
    • A keypoints of fingers detection method based on K-medoids clustering and K-vector algorithm 

      Hong, Duan; Cai, Kun Yu; 段鸿 (Trans Tech Publications Ltd, 2013)
      The paper presents a calculation method to get the probable key points in hands outline. First, use K-vector to calculate the K-slope of all points in outline and get a series of peak point sets. Then, cluster the peak ...
    • A load balancing mechanism using Bloom Filter in strom system 

      Dong, Huai Lin; He, Ming Yuan; Wu, Qing Feng; Wu, Sheng Hang; 董槐林; 吴清锋 (Trans Tech Publications Ltd, 2014)
      When membership queries are evaluated in a set, the performance can be improved by a Bloom filter which is a space-efficient probabilistic data structure. According to its space-efficient character, Bloom Filter presented ...
    • A method for HMM-based system calls intrusion detection based on hybrid training algorithm 

      Wang, Panhong; Shi, Liang; Wang, Beizhan; Liu, Yangbin; Wu, Yuanqin; 史亮; 王备战 (IEEE Computer Society, 2011)
      HMM (Hidden Markov Model) is a very important intrusion detection tool. The classical HMM training algorithm is a climbing algorithm. It can only find a local optimal solution. To improve the accuracy of HMM training, this ...
    • A method for personalized 3D design of product based on Web3D 

      Lin, FengChun; Wen, TingXi; Yao, JunFeng; 姚俊峰 (Association for Computing Machinery, 2013)
      The statistics show that consumers have a strong desire of personalized products, and we can forecast that the consumption of personalized products will be another growth point of the e-commerce. Then, is it a rational ...
    • A method of hand signal segmentation based on YCbCr space and background difference 

      Hong, Duan; Yang, Luo; 段鸿 (Trans Tech Publications Ltd, 2013)
      This paper proposes a method of segmentation of hand signal, based on the skin color model in YCbCr space and background subtraction under complex background. This paper discussed the reasonable threshold selection of Cb, ...
    • A multi-touch interface for fast architectural sketching and massing 

      Sun, Qian; Lin, Juncong; Fu, Chi-Wing; Kaijima, Sawako; He, Ying; 林俊聪 (Association for Computing Machinery, 2013)
      Architectural sketching and massing are used by designers to analyze and explore the design space of buildings. This paper describes a novel multi-touch interface for fast architectural sketching and massing of tall ...