Find Research Output

Research Output
  • All
  • Scholar Profiles
  • Research Units
  • Research Output
Filter
Department Publication Year Content Type Data Sources

SELECTED FILTERS

2012
Clear all

1.BEYOND CODES AND PIXELS

Author:Fischer, T;De Biswas, K;Ham, JJ;Naka, R;Huang, WX

Source:PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED ARCHITECTURAL DESIGN RESEARCH IN ASIA (CAADRIA 2012): BEYOND CODES AND PIXELS,2012,Vol.

2.Critically paintable, choosable or colorable graphs

Author:Riasat, A;Schauz, U

Source:DISCRETE MATHEMATICS,2012,Vol.312

Abstract:We extend results about critically k-colorable graphs to choosability and paintability (list colorability and on-line list colorability). Using a strong version of Brooks' Theorem, we generalize Gallai's Theorem about the structure of the low-degree subgraph of critically k-colorable graphs, and introduce a more adequate lowest-degree subgraph. We prove lower bounds for the edge density of critical graphs, and generalize Heawood's Map-Coloring Theorem about graphs on higher surfaces to paintability. We also show that on a fixed given surface, there are only finitely many critically k-paintable/k-choosable/k-colorable graphs, if k >= 6. In this situation, we can determine in polynomial time k-paintability, k-choosability and k-colorability, by giving a polynomial time coloring strategy for "Mrs. Correct". Our generalizations of k-choosability theorems also concern the treatment of non-constant list sizes (non-constant k). Finally, we use a Ramsey-type lemma to deduce all 2-paintable, 2-choosable, critically 3-paintable and critically 3-choosable graphs, with respect to vertex deletion and to edge deletion. (C) 2012 Elsevier B.V. All rights reserved.

3.Robust Localisation of Pedestrians with Cast Shadows Using Homology in A Monocular View

Author:Xu, M;Jia, TY;Lu, L;Smith, JS

Source:PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC),2012,Vol.

Abstract:In this paper an object detection algorithm is proposed, which is robust in the presence of cast shadows and is based on geometric projections. The novelty of the work lies in the use of homology mapping of the foreground regions between different parallel planes within a monocular view, unlike some existing algorithms which depend on the use of multiple cameras. The results on an open video dataset are provided.

4.集群背景下的市场势力与企业自主创新研究——基于苏州电子信息行业的实证检验

Author:刘钊;

Source:Journal of Changshu Institute of Technology,2012,Vol.26

Abstract:利用苏州电子信息行业的微观数据,研究产业集群中企业的市场势力对企业自主创新的影响。结果表明,企业在集群中纵向市场势力的增强对企业创新有促进作用,但横向市场势力反而会抑制企业的技术创新。

5.Neutralizing and non-neutralizing antibody responses in HIV-1 subtype C chronically infected patients with divergent rates of disease progression

Author:Archary, D;Rong, R;Gordon, ML;Boliar, S;Gray, ES;Dugast, A;Hermanus, T;Goulder, PJ;Coovadia, HM;Morris, L;Alter, G;Derdeyn, CA;Ndung'u, T

Source:RETROVIROLOGY,2012,Vol.9

6.Some criteria for a graph to be Class 1

Author:Akbari, S;Cariolaro, D;Chavooshi, M;Ghanbari, M;Zare, S

Source:DISCRETE MATHEMATICS,2012,Vol.312

Abstract:Let G be a graph. The core of G, denoted by G(Delta), is the subgraph of G induced by the vertices of degree Delta(G), where Delta(G) is the maximum degree of G. A k-edge coloring of a graph G is a function f : E(G) -> L, where vertical bar L vertical bar = k and f(e(1)) not equal f(e(2)), for every two adjacent edges e(1), e(2) of G. The edge chromatic number of G, denoted by chi'(G), is the minimum number k for which G has a k-edge coloring. A graph G is said to be Class 1 if chi'(G) = Delta(G) and Class 2 if chi'(G) = Delta(G) + 1. In this paper, it is shown that, for every connected graph of even order, if G(Delta) = C-6, then G is Class 1. Also, we prove that, if G is a connected graph, and every connected component of G(Delta) is a unicyclic graph or a tree, and G(Delta) is not a disjoint union of cycles, then G is Class 1. (C) 2011 Elsevier B.V. All rights reserved.

7.The distinctive effects of dual-level leadership behaviors on employees' trust in leadership: An empirical study from China

Author:Bai, YT;Li, PP;Xi, YM

Source:ASIA PACIFIC JOURNAL OF MANAGEMENT,2012,Vol.29

Abstract:The loss of trust within and between organizations has become serious worldwide, especially in China. In this study, we seek to explain why as well as how leaders at two different levels (i.e., the top management and the supervisory levels) affect employees' trust in leadership at the two levels distinctively, especially in the context of China as an emerging economy. Adopting the perspective of multi-level social exchanges within organizations, we develop a dual-level model with perceived organizational support and leader-member exchange as two major mediating mechanisms for the distinctive effects of transformational leadership behaviors on employees' trust in leadership at both top management and supervisory levels, respectively. The empirical evidence based on a sample of 357 Chinese employees and their supervisors supports the proposed model. Both theoretical and practical implications of our findings are discussed.

8.A Novel Hybrid ACO/SA Approach to Solve Stochastic Dynamic Facility Layout Problem (SDFLP)

Author:Lee, TS;Moslemipour, G;Ting, TO;Rilling, D

Source:EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS,2012,Vol.304

Abstract:This paper proposes a new hybrid algorithm using ant colony optimization and simulated annealing intelligent approaches to solve a stochastic dynamic facility layout problem in which product demands are normally distributed random variables with known probability density function that changes from period to period in a random manner. Finally, the performance of the proposed algorithm is compared with the simulated annealing and another approach using data taken from the literature.

9.Strategically Managing Facility Management Knowledge Sharing via Web 2.0

Author:Pak, DHA;Li, RYM

Source:COMPUTER APPLICATIONS FOR COMMUNICATION, NETWORKING, AND DIGITAL CONTENTS,2012,Vol.350

Abstract:Transaction costs requires reductions and via knowledge practices and the Web 2.0. This can be significantly curtailed, the study looks at the literature and the success of the social network site, Facebook and draws conclusions thereof.

10.亚洲地区食品价格上浮与相应的货币政策

Author:李雪寒;杨吉峰

Source:Economic Vision,2012,Vol.

Abstract:本文着眼于,亚洲地区近期食品价格的上涨已普遍影响到了整体范围内的物价上浮.同时,在没有施行政策紧缩的亚洲各地区内,伴随全球经济低谷,各地区预期中的经济增长率的减缓却没有对物价上浮产生任何决定性阻力.本文讨论了,目前为应对食品价格上涨问题而应采取的适宜货币政策所要面临的问题和挑战.

11.A self-test and self-repair approach for analog integrated circuits

Author:Karmani, Mouna ; Khedhiri, Chiraz ; Man, Ka Lok ; Krilavicˇius, Tomas ; Hamdi, Belgacem ; Rahmani, Amir-Mohammad

Source:2012 2nd Baltic Congress on Future Internet Communications, BCFIC 2012,2012,Vol.

Abstract:With the continuous increase of integration densities and complexities, secure integrated circuits (ICs) are more and more required to guarantee reliability for safety-critical applications in the presence of soft and hard faults. Thus, testing has become a real challenge for enhancing the reliability of safety-critical systems. This paper presents a Self-Test and Self-Repair approach which can be used to tolerate the most likely defects of bridging type that create a resistive path between VDD supply voltage and the ground occurring in analog CMOS circuits during the manufacturing process. The proposed testing approach is designed using the 65 nm CMOS technology. We then used an operational amplifier (OPA) to validate the technique and correlate it with post layout simulation results. © 2012 IEEE.

12.Insight of direct search methods and module-integrated algorithms for Maximum Power Point Tracking (MPPT) of stand-alone photovoltaic systems

Author:Ma J.;Man K.L.;Ting T.O.;Guan S.-U.;Ma J.;Wong P.W.H.;Man K.L.;Lee H.;Jeong T.;Sean J.-K.

Source:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2012,Vol.7513

Abstract:By detection of input signal, Maximum Power Point Tracking (MPPT) algorithms are used to maximize the potential output power. Since Perturbation and Observe (P&O) method was first applied in a Photovoltaic (PV) system, a myriad of MPPT algorithms has been proposed. With the pros and cons of various MPPT algorithms, a detailed analysis of several typical direct search and module-integrated MPPT algorithms is presented in this paper. Directions of future work for implementing new MPPT algorithms are also outlined. © IFIP International Federation for Information Processing 2012.

13.Molecular Identification of Chronic Bee Paralysis Virus Infection in Apis mellifera Colonies in Japan

Author:Morimoto, T;Kojima, Y;Yoshiyama, M;Kimura, K;Yang, B;Kadowaki, T

Source:VIRUSES-BASEL,2012,Vol.4

Abstract:Chronic bee paralysis virus (CBPV) infection causes chronic paralysis and loss of workers in honey bee colonies around the world. Although CBPV shows a worldwide distribution, it had not been molecularly detected in Japan. Our investigation of Apis mellifera and Apis cerana japonica colonies with RT-PCR has revealed CBPV infection in A. mellifera but not A. c. japonica colonies in Japan. The prevalence of CBPV is low compared with that of other viruses: deformed wing virus (DWV), black queen cell virus (BQCV), Israel acute paralysis virus (IAPV), and sac brood virus (SBV), previously reported in Japan. Because of its low prevalence (5.6%%) in A. mellifera colonies, the incidence of colony losses by CBPV infection must be sporadic in Japan. The presence of the (-) strand RNA in dying workers suggests that CBPV infection and replication may contribute to their symptoms. Phylogenetic analysis demonstrates a geographic separation of Japanese isolates from European, Uruguayan, and mainland US isolates. The lack of major exchange of honey bees between Europe/mainland US and Japan for the recent 26 years (1985-2010) may have resulted in the geographic separation of Japanese CBPV isolates.

14.ARTIFICIAL INTELLIGENCE APPROACH TO SoC ESTIMATION FOR SMART BMS

Author:Man, KL;Chen, C;Ting, TO;Krilavicius, T;Chang, J;Poon, SH

Source:ELECTRICAL AND CONTROL TECHNOLOGIES,2012,Vol.

Abstract:One of the most important and indispensable parameters of a Battery Management Systems (BMS) is accurate estimates of the State of Charge (SoC) of the battery. It can prevent battery from damage or premature aging by avoiding over charge/discharge. Due to the limited capacity of a battery, advanced methods must be used to estimate precisely the SoC in order to keep battery safely being charged and discharged at a suitable level and to prolong its life cycle. In this paper, we review several effective approaches: Coulomb counting, Open Circuit Voltage (OCV) and Kalman Filter method for performing the SoC estimation; then we propose Artificial Intelligence (AI) approach that can be efficiently used to precisely determine the SoC estimation for the smart battery management system as presented in [1]. By using our proposed approach, a more accurate SoC measurement will be obtained for the smart battery management system.

15.Equivariant totally real 3-spheres in the complex projective space CPn

Author:Fei, J;Peng, CK;Xu, XW

Source:DIFFERENTIAL GEOMETRY AND ITS APPLICATIONS,2012,Vol.30

Abstract:In this paper we study the equivariant totally real immersions from S-3 into CPn. We first reduce these immersions to a system of algebraic equations by the unitary representations of SU(2). We give some explicit examples of minimal totally real isometric immersions from S-3/m(m+2)(3) into CPn, and characterize the minimal totally real isometric immersions from S-3/m(m+2)(3) into CPn by the standard example. We also give many minimal linearly full isometric immersions from S-1/5(3) into CP7. CP11 and CP15. As an application of our method, we classify equivariant Lagrangian S-3 in CP3 again. (C) 2012 Elsevier B.V. All rights reserved.

16.Real-time Video Streaming Exploiting the Late-arrival Packets

Author:Xiao, JM;Tillo, T;Lin, CY;Zhao, Y

Source:2012 PICTURE CODING SYMPOSIUM (PCS),2012,Vol.

Abstract:For real-time video applications, such as video telephony service, the allowed maximum end-to-end transmission delay is usually fixed. The packets arriving at the destination out of the maximum end-to-end delay are treated as late-arrival packets, and these packets are discarded in traditional video transmission systems. In this paper, in order to improve the system performance, we propose to exploit these packets to update the decoder reference buffer. Two schemes are proposed to exploit the late-arrival packets, one scheme is to use sliding-window updating, where the updating window is moving; another scheme is to use fixed-window update together with systematic Reed-Solomon code. The effectiveness of the two schemes are validated by simulation results without adding extra delay. It is found that in both schemes, the updating window size plays an important role on the system performance.

17.Cities Under Siege: The New Military Urbanism

Author:Williams, A

Source:ARCHITECTURAL REVIEW,2012,Vol.231

18.领导的眼力

Author:席酉民

Source:创业天下,2012,Vol.

Abstract:西安陕鼓动力股份公司印建安董事长给我讲了一个工人的故事——

19.Asymptotic Properties of the Markov Branching Process with Immigration

Author:Li, JP;Chen, AY;Pakes, AG

Source:JOURNAL OF THEORETICAL PROBABILITY,2012,Vol.25

Abstract:We consider the Markov branching process with immigration allowing the possibility of infinite numbers of offspring and/or immigrants. Our focus is on the construction and uniqueness of the minimal transition function and on its asymptotic behavior. Conditional limit theorems for the population size are given in cases for which the transition function is dishonest.

20.When to Refinance Mortgage Loans in a Stochastic Interest Rate Environment

Author:Gan, SW;Zheng, J;Feng, XX;Xie, DJ

Source:INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTIST, IMECS 2012, VOL II,2012,Vol.2196

Abstract:Refinancing refers to the replacement of an existing debt obligation with another debt obligation to take the advantage of a lower interest rate. This paper reflects our ongoing work to find a desirable refinancing time for mortgage borrowers to minimize the total payments in a dynamic interest rate environment. To simulate the alternative financial service that the market may offer, it is assumed that the future interest rate follows a stochastic model with mean-reverting property, which is essentially the only required market condition to implement our method. To make it more applicable to the real financial practice, two balance settlement schemes are considered and compared. Numerical simulations with varying samplings lead to several interesting characteristics pertaining to the optimal mortgage refinancing period. Our method is robust and user friendly, thus is useful for financial institutions and individual property investors.
Total 235 results found
Copyright 2006-2020 © Xi'an Jiaotong-Liverpool University 苏ICP备07016150号-1 京公网安备 11010102002019号