1,274 results on '"Zhang Hong-Bin"'
Search Results
302. Residual Nuclides Induced in Cu Target by a 250 MeV Proton Beam
- Author
-
Zhang, Hong-Bin, primary, Zhang, Xue-Ying, additional, Ma, Fei, additional, Ju, Yong-Qin, additional, Ge, Hong-Lin, additional, Chen, Liang, additional, Zhang, Yan-Bin, additional, Wei, Ji-Fang, additional, Li, Yan-Yan, additional, Luo, Peng, additional, Wang, Jian-Guo, additional, Wan, Bo, additional, Xu, Xiao-Wei, additional, and Zhou, Bin, additional
- Published
- 2015
- Full Text
- View/download PDF
303. Study of neutron spectra in a water bath from a Pb target irradiated by 250 MeV protons
- Author
-
Li, Yan-Yan, primary, Zhang, Xue-Ying, additional, Ju, Yong-Qin, additional, Ma, Fei, additional, Zhang, Hong-Bin, additional, Chen, Liang, additional, Ge, Hong-Lin, additional, Wan, Bo, additional, Luo, Peng, additional, Zhou, Bin, additional, Zhang, Yan-Bin, additional, Li, Jian-Yang, additional, Xu, Jun-Kui, additional, Wang, Song-Lin, additional, Yang, Yong-Wei, additional, and Yang, Lei, additional
- Published
- 2015
- Full Text
- View/download PDF
304. Dynamic characteristics clustering of electric loads based on Kohonen neural network
- Author
-
Zhang Hong-bin, Dai Ai-ying, and Yang Weihong
- Subjects
Self-organizing map ,Engineering ,Artificial neural network ,business.industry ,Feature vector ,Control engineering ,AC power ,computer.software_genre ,Data modeling ,Electric power system ,Data mining ,business ,Cluster analysis ,computer ,Voltage - Abstract
The characteristics clustering of electric loads are of great importance to the Measurement-Based Modeling method. In this paper, a new method based on Kohonen self-organization neural network is presented for the characteristics clustering of dynamic loads. At first, the model of every group of load disturbance data is established, and then the responses of the load models to the same voltage excitation and the pre-disturbance active power of the loads are incorporated into the feature vectors. At last, Kohonen neural network is introduced to cluster. Many sets of load data measured from North China Power System in three years (1996–1998) have been dealt with using the method. The results show load characteristics have rule though they are random and time-varying. The feasibility of the Measurement-Based Modeling approach is also proved.
- Published
- 2010
- Full Text
- View/download PDF
305. Accurate reliability allocation of complex system using neutral networks
- Author
-
Zhang Hong-bin, Xi An-mina, and Jia Zhixin
- Subjects
Reliability theory ,Matrix (mathematics) ,Neutral network ,Mathematical optimization ,Artificial neural network ,business.industry ,Computer science ,Complex system ,Artificial intelligence ,Inverse problem ,business ,Reliability (statistics) ,Reciprocal - Abstract
For realizing accurate reliability allocation of complex system, a method based on inverse thinking is proposed in this paper. The important of every sub-system is determined by analyzing the inter-relationship between the changing of sub-system reliability and system reliability. The accurate reliability allocation model of the complex system is established based on the neural networks. The self-restriction conditions of every sub-system and the system reliability are taken as the input variables of the model, the bio-mutual ratio of sub-system reliability is taken as the output variables of the model. The important of every sub-system in the prophase reliability experiment is learned by the trained neural networks. Then, a positive reciprocal matrix can be formed by the output variables of the model. The reliability allocation coefficients of every sub-system can be achieved by solving the positive reciprocal matrix, and the expected reliability of every sub-system can also be achieved by substituting the reliability allocation coefficients into the reliability allocation formula. It is proved by the examples that the result of the model is completely according with the reliability allocation rules; the artificial factors in reliability allocation are avoided.
- Published
- 2009
- Full Text
- View/download PDF
306. Using the Selected Candidate Vectors to Determine Kernel Parameters
- Author
-
Li Xiaoyan and Zhang Hong-bin
- Subjects
Kernel method ,Variable kernel density estimation ,Kernel embedding of distributions ,business.industry ,String kernel ,Polynomial kernel ,Kernel (statistics) ,Radial basis function kernel ,Pattern recognition ,Artificial intelligence ,business ,Kernel principal component analysis ,Mathematics - Abstract
This paper proposes an improved scheme of using the inter-cluster distance in the feature space to choose the kernel parameters. First, the candidate vectors of the training set are selected. Then calculate the inter-cluster distance between classes to choose the proper kernel parameters. Finally the selected kernel parameters are used to train the Support Vector Machine (SVM) models. The basic principle is that the Support Vector (SV) set contains all information necessary to solve a given classification task. Experiment results show that our scheme costs much less computation time. Moreover, suitable kernel parameters can also be selected at the same time.
- Published
- 2009
- Full Text
- View/download PDF
307. A synthesis load model with distribution network for power transmission system simulation and its validation
- Author
-
Hou Jun-xian, Zhang Dongxia, Tang Yong, and Zhang Hong-bin
- Subjects
Engineering ,Electric power system ,Power transmission ,Power system simulation ,business.industry ,Electronic engineering ,AC power ,business ,Low voltage ,Induction motor ,Compensation (engineering) ,Power (physics) - Abstract
The deficiencies of existing load models and their implementations in power system simulation programs are addressed in this paper. To improve the load model for power system simulation, a Synthesis Load Model (SLM) with distribution network, which is consistent with the structure of power loads and distribution networks, is presented. The SLM is reasonable in structure and convenient to use. The SLM can simulate the load components and distribution systems including distribution network, reactive compensation and the generators connected to low voltage networks. The validity of SLM has been validated by four field tests of three-phase short circuit in Northeast China Power Grid in the years of 2004 and 2005 respectively.
- Published
- 2009
- Full Text
- View/download PDF
308. Tamper Detection and Self-Recovery of Image Based on Self-Embedding
- Author
-
Wang Jia-wen, Song Qiang, and Zhang Hong-bin
- Subjects
business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,Set partitioning in hierarchical trees ,Self-embedding ,Least significant bit ,Discrete cosine transform ,Computer vision ,Artificial intelligence ,business ,Bitstream ,Digital watermarking ,Image restoration ,Block (data storage) - Abstract
This paper presents a novel image watermarking scheme for both tamper detection and tampered image recovery. The basic principle of this scheme is to compress per block of the original image using SPIHT (Set Partitioning in Hierarchical Trees), then scramble and embed the bit stream into LSBs (Least Significant Bit) of corresponding offset block. Experimental results show that the proposed scheme can detect and locate tamper accurately, and recover tampered block data with satisfied image visual quality.
- Published
- 2009
- Full Text
- View/download PDF
309. Progressive Geometry-Driven Compression for Triangle Mesh Based on Binary Tree
- Author
-
Liu Hongnian, Liu Bo, and Zhang Hong-bin
- Subjects
Binary tree ,Mesh generation ,Triangle mesh ,Geometry ,Polygon mesh ,Static mesh ,Volume mesh ,ComputingMethodologies_COMPUTERGRAPHICS ,Data compression ,Mathematics ,Arithmetic coding - Abstract
Efficient algorithms for compressing three-dimensional (3D) triangle meshes have been widely developed in recent years, but most of them are designed to deal with manifold meshes. A progressive geometry-driven 3D triangle meshes algorithm is proposed in this work which can be easily extended to non-manifold mesh compression and polygon mesh compression. Different from connectivity-driven algorithms; our method starts with the geometry; it encodes the geometry data into a symbol sequence consisting of only three kinds of symbols. Edge collapse and vertex unification operator are used to encode the connectivity, and the symbol sequences can be further encoded by arithmetic coding.
- Published
- 2009
- Full Text
- View/download PDF
310. Design of a Distributed Spiders System Based on Web Service
- Author
-
Zhang Hong-bin and Li Guangli
- Subjects
computer.internet_protocol ,Application server ,Computer science ,business.industry ,Service-oriented architecture ,computer.software_genre ,World Wide Web ,Client–server model ,Server ,Web page ,Web service ,business ,computer ,Message queue ,Server-side redirect ,Computer network - Abstract
A distributed spiders antitype was designed by Web Service based on Service-Oriented Architecture(SOA).This antitype is made up of a server and several clients. The clients are controlled to download a new web page by the server according to the crawled pages. Moreover, they must manage the To Crawl , Crawled URL queues and Noise URL queue after analyzing it by multi-threads. Furthermore, they keep connection with the server to pass the unknown URL and domain names. The server is made up of the front platform and the background. The front platform controls the clients including the design of load balance policy and real-time monitoring of clients by Microsoft Message Queue(MSMQ). Web service is deployed on the server background which contains the structure of persistent data connection. With the help of this structure, the front platform and the clients can access data by the normative interface. Finally, a lot of experiments were done which show that the distributed spiders system has good robust performance.
- Published
- 2009
- Full Text
- View/download PDF
311. Fragmentations of 13-oxo-taxyunnansin A and their application to preparation of abeo-paclitaxel and abeo-docetaxel analogues
- Author
-
Zhao, Yu, Zhang, Hong-Bin, Liu, Ji-Kai, Su, Jia, Li, Yan, Yao, Zhu-Jun, and Zhao, Qin-Shi
- Published
- 2011
- Full Text
- View/download PDF
312. Application in Stomach Epidermis Tumors Segmentation by GVF Snake Model
- Author
-
Zhang Hong-bin and Li Guangli
- Subjects
Active contour model ,Vector flow ,business.industry ,Computer vision ,Segmentation ,Artificial intelligence ,Image segmentation ,Image boundary ,business ,Image restoration ,Edge detection ,Force field (chemistry) ,Mathematics - Abstract
GVF snake model means gradient vector flow snake model. It is a representative of the active contour model and it has been used to solve image segmentation for some conglutinated images. GVF snake model is also a new accurate arithmetic to obtain the boundary of the object edge especially for those stomach epidermis tumors which have several conglutinated areas. As the first step of this arithmetic, many pretreatment processes are necessary such as the gauss blur and the edge mapping to get the clearer image boundary before starting the image segmentation. The next step after pretreatment processes is calculating the GVF outside force field which makes the snake move quicker to the object boundary after the initial points been selected. The experiments also show that as the key parameter of GVF snake model, mu must be set below 0.3 in order to get better segmentation results, otherwise the snake cannot move closer to the object boundary because the GVF outside force field dies down.
- Published
- 2008
- Full Text
- View/download PDF
313. Feature extraction using wavelet packet decomposition based on MPEG-I
- Author
-
Zhang Hong-bin and Fu Bo-zhi
- Subjects
Signal processing ,Masking threshold ,business.industry ,Computer science ,Speech recognition ,Stationary wavelet transform ,Feature extraction ,Wavelet transform ,Pattern recognition ,Filter (signal processing) ,Speaker recognition ,Wavelet packet decomposition ,ComputingMethodologies_PATTERNRECOGNITION ,Wavelet ,Mel-frequency cepstrum ,Artificial intelligence ,business ,Transform coding - Abstract
This paper presents a method of features extraction in speaker recognition. This method divides voice signal into two parts based on the MPEG Psychological Model I, and processes them respectively. And then we analyze the extracted MFCC parameters, and compare the partition of frequency-band between Mel-spaced filter group and wavelet packet decomposition. We extract the coefficients by wavelet package transform (called ldquoWPTCrdquo) as diagnostic parameters used in the speaker recognition. The results of experiments indicated that it perform well than MFCC while using the WPTC based on MPEG-I.
- Published
- 2008
- Full Text
- View/download PDF
314. Recent Advances in Cotton Genomics
- Author
-
Zhang, Hong-Bin, Li, Yaning, Wang, Baohua, and Chee, Peng W.
- Subjects
Article Subject ,food and beverages - Abstract
Genome research promises to promote continued and enhanced plant genetic improvement. As a world's leading crop and a model system for studies of many biological processes, genomics research of cottons has advanced rapidly in the past few years. This article presents a comprehensive review on the recent advances of cotton genomics research. The reviewed areas include DNA markers, genetic maps, mapped genes and QTLs, ESTs, microarrays, gene expression profiling, BAC and BIBAC libraries, physical mapping, genome sequencing, and applications of genomic tools in cotton breeding. Analysis of the current status of each of the genome research areas suggests that the areas of physical mapping, QTL fine mapping, genome sequencing, nonfiber and nonovule EST development, gene expression profiling, and association studies between gene expression and fiber trait performance should be emphasized currently and in near future to accelerate utilization of the genomics research achievements for enhancing cotton genetic improvement.
- Published
- 2008
- Full Text
- View/download PDF
315. Boundary Constrained Manifold Unfolding
- Author
-
Chen Wenan, Liu Bo, and Zhang Hong-bin
- Subjects
Manifold alignment ,Mathematical optimization ,Closed manifold ,Computer science ,Nonlinear dimensionality reduction ,Boundary (topology) ,Covariance ,Manifold ,Graph ,Statistical classification ,Local tangent space alignment ,Embedding ,Boundary value problem ,Algorithm - Abstract
A new manifold learning algorithm is proposed in this paper. Our method is motivated by the unit covariance constraint problem of spectral embedding methods, where a unit covariance constraint is imposed to avoid degenerate solutions that map all manifold samples to one point. This constraint distorts the aspect ratio and introduces unwanted correlation between different components of embedding coordinates. Instead, our method uses boundary conditions to pull apart mapped points, and obtains the embedding by solving linear systems under boundary conditions. The mapping of boundary samples is decided by that of a coarse version of manifold, obtained by a graph simplification algorithm designed by us. Comparisons between our method and several other representative manifold learning methods are made, and the results demonstrate the effectiveness of the proposed method.
- Published
- 2008
- Full Text
- View/download PDF
316. Vortex pattern in three-dimensional mesoscopic superconducting rings
- Author
-
Shi Liang-Ma, Zhang Hong-Bin, Zhou Ming-Jian, and Zhang Qing-Qing
- Subjects
Physics ,Superconductivity ,Mesoscopic physics ,Condensed matter physics ,Condensed Matter::Superconductivity ,General Physics and Astronomy ,Vortex - Abstract
Vortex structures in a mesoscopic a superconducting ring, which is in the magnetic field generated by a circular electric current, are investigated based on the phenomenological Ginzburg-Landau (G-L) theory. Due to the axial symmetry of the system, the three-dimensional problem is reduced to a two-dimensional problem. We can mesh a two-dimensional sample into grids, and discretize the first G-L equation by using the finite-difference method. Then the eigenvalues and eigenfunctions will be evaluated numerically by solving the discrete equations. With the eigenvalues and eigenfunctions we further obtain the minimum free energy of the system and the corresponding superconducting wave function. We discuss the influences of the ring size and magnetic field distribution on two kinds of the vortex structures: giant vortex state (GVS) and multivortex state (MVS). Calculations show: 1) the GVS with axial symmetric wave function exists only in a small size superconducting ring, as the GVS is a state of single vortex line that only goes through the hole at the center of the superconducting ring and carries several magnetic flux quanta with it; 2) with the increase of the ring size, the diamagnetism of superconducting ring becomes stronger, and the critical magnetic field value of a giant vortex state increases, and the maximal number of giant vortexes that the superconducting ring can accommodate is also growing; furthermore, the entrance of a flux line will cause fluctuations of critical field values; 3) when the superconducting ring size is large enough, a GVS splits into a number of MVS. The MVS is an excited state and the GVS is mostly a ground state; 4) the free energy of the system changes with the magnetic field distribution, the magnetic field provided by a central small current loop can pass through the superconducting ring easily, and produce multivortices whose formations are diverse; if the magnetic field runs parallel to the plane of the superconducting ring, it is difficult to pass through the superconducting ring and form multivortices; 5) the vortex lines are naturally bent with the magnetic field lines and can pass through the same horizontal plane twice, so that one of the two vortex states seems to be an antivortex state; generally, the magnetic field lines can go through the hole of a superconducting ring easily but can hardly penetrate through the body of a superconducting ring, the structure of multivortices is similar to that of the magnetic field distribution in a superconducting ring. We also obtain a vortex structure with coexistences of giant vortex and multivortices. This study is of significance for the application of superconducting nanomaterials.
- Published
- 2016
- Full Text
- View/download PDF
317. Image Texture Energy-Entropy-Based Blind Steganalysis
- Author
-
Zhan Shuanghuan and Zhang Hong-bin
- Subjects
Steganalysis ,Texture compression ,Steganography ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Image segmentation ,Support vector machine ,Image texture ,Texture filtering ,Entropy (information theory) ,Segmentation ,Computer vision ,Artificial intelligence ,business ,Feature detection (computer vision) - Abstract
A novel approach of blind steganalysis is proposed, which is based on image texture energy-entropy features. Image complexity describes the difference of image's content and texture. Steg-image's texture is ordinarily more complicated than that of cover image. For analyzing image complexity, using image texture features to measure the statistical differences between cover image and steg-image. In the paper, we analyze image complexity based on image texture segmentation technique, and use Laws' image texture energy-entropy features to measure the statistical differences between cover image and steg-image. Applying these texture features, blind steganalysis is implemented. Support Vector Machine (SVM) is used as classifier to distinguish whether a given image is embedded into the convert message. Experiment results show that the proposed approach is greatly valuable and our blind steganalysis method attains a good testing accurate rate.
- Published
- 2007
- Full Text
- View/download PDF
318. Empirical Research on the Strategic Alignment in SMEs
- Author
-
Zhang Hong-bin
- Subjects
Strategic planning ,Knowledge management ,Strategic alignment ,business.industry ,Service (economics) ,media_common.quotation_subject ,Technology strategy ,Information technology management ,Strategic management ,Business ,Profit impact of marketing strategy ,Business model ,media_common - Abstract
IT plays a strategic role in modern organizations, and IT strategy works as a guideline for IT investment, IT project selection and implementation, IT management and IT service. The alignment of business strategy and IT strategy is even more important than IT strategy itself. This study measured business strategy, IT strategy, strategic alignment, IT performance, and business performance. Analysis of data gathered in a mail survey of China's manufacturing SMEs indicated that: 1) IT strategy itself does not influence business performance and IT performance; 2) strategic alignment strongly correlated with business performance and the impacts are positive; 3) strategic alignment has no impact on IT performance; 4) There is positive relationship between IT performance and business performance; 5) The relationship between business strategy and business performance is not strong. The contribution of different IT systems to IT performance is also examined.
- Published
- 2007
- Full Text
- View/download PDF
319. Mesh Editing in ROI with Dual Laplacian
- Author
-
Zhang Hong-bin, Ma Zhan-guo, Luo Qiong, and Liu Bo
- Subjects
Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,MathematicsofComputing_NUMERICALANALYSIS ,T-vertices ,Computer graphics ,Computer Science::Graphics ,Quadratic equation ,Region of interest ,Computer graphics (images) ,User interface ,Laplacian smoothing ,Laplace operator ,Gradient method ,Algorithm ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
In this paper, we propose a new mesh editing method worked in the dual domain for ROI (region of interest). This method has intuitive user interface and efficient reconstruction process. The mesh detail is represented by dual Laplacian, and the reconstructed mesh is obtained by solving a quadratic minimization problem which preserves the mesh detail in least square sense. Preconditioned bi-conjugate gradient method (PBCG) is adopted to iteratively update the positions of the dual vertices and the dual Laplacian coordinates. The experiments demonstrate that our method can work effectively and give visually pleasing results.
- Published
- 2007
- Full Text
- View/download PDF
320. Multi-resolution Meshes Deformation Based on Pyramid Coordinates
- Author
-
Liu Bo, Zhang Hong-bin, Ma Zhan-guo, and Sha Chen-min
- Subjects
business.industry ,Multiresolution analysis ,Linear system ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Volume mesh ,Iterative reconstruction ,Nonlinear system ,Nonlinear distortion ,Polygon mesh ,Computer vision ,Artificial intelligence ,Invariant (mathematics) ,business ,Algorithm ,ComputingMethodologies_COMPUTERGRAPHICS ,Mathematics - Abstract
In this paper, we present a technique for multi-resolution meshes deformation based on pyramid coordinates. Pyramid coordinates are rotation invariant, and can achieve low distortion editing for large deformations. Their drawback is that the reconstruction process is nonlinear and time consuming especially for large meshes. In order to decrease the computational cost, the proposed method reduces the number of vertices involved in the deformation. We first construct a simplified mesh using a modified CPM algorithm; then edit the simplified meshes by pyramid coordinates based mesh detail presentation; finally, series of details are added to the deformed simplified mesh. Our algorithm can generate natural looking deformations more efficiently than the original pyramid coordinates method.
- Published
- 2007
- Full Text
- View/download PDF
321. An Energy-Minimizing Mesh Parameterization
- Author
-
Liu Bo, Li Yong, and Zhang Hong-bin
- Subjects
Mathematical optimization ,Low distortion ,Mesh generation ,Mesh parameterization ,Applied mathematics ,Conformal map ,Polygon mesh ,Convex combination ,T-vertices ,Mathematics - Abstract
In this paper, we propose a new energy-minimizing mesh parameterization method, which linearly combines two new energies EQ and EM. It not only avoids triangles overlap in the parameter domain, but also is invariant under rotation, translation and scale transformations. We first parameterize the original 3D mesh to the parameter plane by using the energy-minimizing parameterization, and get the optimal effect by optimizing the weights wij gradually. Experimental results indicate that this optimized energy-minimizing method has low distortion and good stability.
- Published
- 2007
- Full Text
- View/download PDF
322. Skeleton based 3D mesh deformation
- Author
-
Zhang Hong-bin, Ma Zhan-guo, and Liu Bo
- Subjects
Distortion (mathematics) ,Position (vector) ,Mesh generation ,Polygon mesh ,Geometry ,Deformation (meteorology) ,Skeleton (category theory) ,Invariant (mathematics) ,Rotation (mathematics) ,Mathematics - Abstract
In this paper a novel and intuitive method for the interactive deformation of 3D meshes is proposed. This method is based on skeleton. After a region of the model to be deformed is selected and several reference points are specified, a skeleton is created implicitly and automatically through the reference points and the screen. Then the vertices in the region to be deformed are mapped onto the skeleton. Deformation of the region can be achieved by deforming the skeleton to the desired position constrained by the target points, which are specified by the user. To uniformly distributing the distortion brought by the deformation and preserving the details of the deformed region, the points on the skeleton are represented by the linear rotation- invariant coordinates. The deformed skeleton is reconstructed in the least-squares sense. At last, the mesh deformation is carried out by reverse mapping from points on the skeleton to the corresponding vertices in the region to be deformed. The skeleton are also can be used to twist the region of the mesh. We demonstrate the effectiveness and interactivity of our method by the detail-preserving editing of several models using little time.
- Published
- 2007
- Full Text
- View/download PDF
323. Residual Nuclides Induced in Cu Target by a 250 MeV Proton Beam
- Author
-
Wei Ji-Fang, Zhang Xue-Ying, Wang Jian-guo, XU Xiao-Wei, Luo Peng, Ge Honglin, Chen Liang, Zhang Yanbin, Zhang Hong-Bin, Wan Bo, Zhou Bin, JU Yong-Qin, Li Yanyan, and Ma Fei
- Subjects
Nuclear physics ,Physics ,Proton ,Physics::Medical Physics ,Nuclear Theory ,General Physics and Astronomy ,Nuclide ,Nuclear Experiment ,Proton energy ,Residual ,Beam (structure) - Abstract
Residual nuclide production is studied experimentally by bombarding a Cu target with a 250 MeV proton beam. The data are measured by the off-line gamma-spectroscopy method. Six nuclides are identified and their cross sections are determined. The corresponding calculated results by the MCNPX and GEANT4 codes are compared with the experimental data to check the validity of the codes. A comparison shows that the MCNPX simulation has a better agreement with the experiment. The energy dependence of residual nuclide production is studied with the aid of MCNPX simulation, and it is found that the mass yields for the nuclides in the light mass region increase significantly with the proton energy.
- Published
- 2015
- Full Text
- View/download PDF
324. A New Data Hiding Method in Binary Images
- Author
-
Zhang Hong-bin and Li Zongqing
- Subjects
Block code ,Image coding ,Pixel ,business.industry ,Binary image ,Pattern recognition ,Watermark ,Information hiding ,Computer Science::Multimedia ,Embedding ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Mathematics - Abstract
This paper proposes a new method to embed watermark in binary images. The given binary image is partitioned into two level blocks, and the watermark will be embedded into the sub-blocks based on the parity of characteristic values. The method is very efficient especially when applied to those binary images whose black and white pixels are distributed approximately uniformly. The experimental results show that the method only requires fewer operations and it can embed more watermarks. Embedding two bits information in a 4times4 block needs to change only one and a half pixels on average
- Published
- 2006
- Full Text
- View/download PDF
325. Rate-Distortion Optimized Progressive Geometry Compression
- Author
-
Zhang Hong-bin, Liu Bo, and Zhang Wenbo
- Subjects
Rate–distortion theory ,Mathematical optimization ,Rate–distortion optimization ,Mesh generation ,Region of interest ,Polygon mesh ,Algorithm ,Data compression ,Mathematics ,Coding (social sciences) ,Geometry compression - Abstract
During progressive transmission of 3D geometry models, the transmission order of details at different region has great effects on the quality of reconstructed models at low bit-rate. This work presents a ratedistortion (R-D) optimized progressive geometry compression scheme to improve the quality of reconstructed models by adjusting the transmission order of details. In this scheme, the input mesh is partitioned into parts, then each part is encoded into bit-stream independently, and the encoded bit-streams are truncated into segments while getting the R-D characteristics of every segment, at last all segments are assembled into a codestream based on R-D optimization, which ensure the region with rich detail will be transmitted early and make the reconstructed mesh achieve better quality as soon as possible. Experimental results show that, as compared with the well-known PGC method, the proposed one provides better R-D performance. Moreover, it provides a novel way to realize the region of interest (ROI) coding of 3D meshes.
- Published
- 2006
- Full Text
- View/download PDF
326. Exposing Digital Forgeries by Detecting Traces of Image Splicing
- Author
-
Wang Jing and Zhang Hong-bin
- Subjects
Trace (semiology) ,Image splicing ,ComputingMethodologies_PATTERNRECOGNITION ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Computer vision ,Image processing ,Artificial intelligence ,business ,Image (mathematics) - Abstract
In this paper, we investigate the trace of seamless splicing for blind image splicing. Image splicing is an essential operation for digital photomontage, which in turn is a technique for creating image forgery. Although good forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alter the underlying statistics of an image. Through investigating the observation of the photomontages, we find the specific correlations in the image, which can be detected and used as evidence of digital tampering. The features derived from the proposal are useful and are proved by experimentation
- Published
- 2006
- Full Text
- View/download PDF
327. Noether's theorem of fractional Birkhoffian systems.
- Author
-
Zhang, Hong-Bin and Chen, Hai-Bo
- Subjects
- *
NOETHER'S theorem , *FRACTIONAL calculus , *RIEMANN surfaces , *LIOUVILLE'S theorem , *ALGORITHMS - Abstract
In this paper, we study Noether type symmetry theorem to fractional Birkhoffian systems with Riemann–Liouville derivatives. This theorem provides an explicit algorithmic way to compute a constant for any Birkhoffian systems admitting a symmetry. Finally, we extend our Noether's theorem to fractional Birkhoffian systems base on Caputo or Riesz derivatives. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
328. Image Annotation by Sentences Based on Word Sequence Blocks Building Model.
- Author
-
ZHANG Hong-bin, YIN Yi, JI Dong-hong, and REN Ya-feng
- Abstract
Based on image annotation by sentences, the cross-media correlations between the images and the texts were constructed to improve the information retrieval accuracy and users' retrieval experiences ultimately. The KDES model was applied to extract image features effectively and the MK-KDES features were obtained in turn by fusing the extracted features in the multiple kernel learning model to interpret the key visual characteristics of the images. A new natural language generation model named word sequence blocks building (WSBB) was designed to evaluate the semantic correlations between the words and the images. And several key words were summarized for generating sentences. According to the semantic correlations and syntactic mode constraints between words, many N gram word sequences were made up of those summarized words to better interpret the images. Finally, sentences were generated by inputting the N gram word sequences into the templates. Experimental results show that, the MK-KDES- 1 feature can focus on describing the key texture and shape characteristics of the images, which helps to improve the BLEU-- scores. Moreover, semantic correlation between the words Is an important premise of improving the BLEU-2 scores as well as the syntactic mode constraints. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
329. Functional analysis of truncated and site-directed mutagenesis dextransucrases to produce different type dextrans.
- Author
-
Wang, Chao, Zhang, Hong-bin, Li, Meng-qi, Hu, Xue-qin, and Li, Yao
- Subjects
- *
DEXTRAN , *DEXTRANSUCRASE , *SITE-specific mutagenesis , *PROTEIN engineering , *PHARMACEUTICAL industry - Abstract
Dextrans with distinct molecular size and structure are increasingly being used in the food and pharmaceutical industries. Dextran is produced by dextransucrase (DSR, EC2.4.5.1), which is produced by Leuconostoc mesenteroides. DSR belongs to glycosyl hydrolase family (GH70) and synthesizes branched α-glucan (dextran) with both 5% α(1–3) and 95% α(1–6) glycosidic linkages. The DSR gene dex-YG (Genebank, Accession No. DQ345760 ) was cloned from the wild strain Leuconostoc mesenteroides 0326. This study generated a series of C-terminally truncated variants of dextransucrase and substituting the amino-acid residues in the active site of DSR. With shorter length of DSR, its polysaccharide-synthesizing capability was impaired heavily, whereas oligosaccharide (acting as prebiotics)-synthesizing capability increased significantly, efficiently producing special sizes of dextran. All truncated mutant enzymes were active. Results demonstrated that the catalytic domain dextransucrase was likely in 800 aa or less. Based on the three-dimensional structure model of dextransucrase built through homology modeling methods, the DSR and its mutants with the acceptor substrate of maltose and donor substrate of sucrose were studied by molecular-docking method. Substituting these amino-acid residues significantly affected enzyme activities. Compared with the wild-type dextran, mutant enzymes catalyzed the synthesis of a-glucan with 1–9% α(1–3) and 90–98% α(1–6) branching linkages. Some mutants introduced a small amount of α(1–4) linkages and α(1–2) linkages. This strategy can be effectively used for the rational protein design of dextransucrase. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
330. Isocoumarins from the Leaves of Nicotiana tabacum and Their Anti-Tobacco Mosaic Virus Activities.
- Author
-
Wang, Yun, Liu, Chun-Bo, Shen, Qin-Peng, Zhang, Feng-Mei, He, Pei, Liu, Zhi-Hua, Zhang, Hong-Bin, Miao, Ming-Ming, Yang, Xiao-Dong, and Yang, Guang-Yu
- Subjects
LEAVES ,TOBACCO mosaic virus ,PLANTS ,MOSAIC viruses ,TOBACCO - Abstract
Two new isocoumarins, tabaisocoumarins D and E ( 1 and 2), together with four known isocoumarins ( 3-6) were isolated from the leaves of Nicotiana tabacum. Their structures were determined by means of HR-ESI-MS and extensive 1D and 2D NMR spectroscopic studies. Compounds 1, 2, 5, and 6 were tested for their anti-tobacco mosaic virus (anti-TMV) activities. The results revealed that compounds 1, 2, 5, and 6 showed potential anti-TMV activities with inhibition rate of 26.8, 25.4, 22.6, and 23.5%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
331. A method for registering range images based on matching triangle meshes
- Author
-
Xie Feng and Zhang Hong-bin
- Subjects
Matching (graph theory) ,Estimation theory ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image registration ,Range (mathematics) ,Mesh generation ,Point (geometry) ,Computer vision ,Polygon mesh ,Artificial intelligence ,business ,Distance transform ,Mathematics - Abstract
Most-conventional registration algorithms use the distance sum between point pairs to estimate pose parameters. These algorithms have the problem of inexact point correspondences. This paper proposes a novel registration algorithm based on a distance metric of surface-to-surface. The integration calculation of the mean distance between surfaces is derived and reduced to a simple formula.
- Published
- 2005
- Full Text
- View/download PDF
332. Scalable mesh coding based on wavelet transform
- Author
-
Zhang Hong-bin and Liu Bo
- Subjects
Discrete wavelet transform ,Lifting scheme ,Computer science ,business.industry ,Stationary wavelet transform ,Second-generation wavelet transform ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Wavelet transform ,Data_CODINGANDINFORMATIONTHEORY ,Wavelet packet decomposition ,Wavelet ,Computer vision ,Artificial intelligence ,business ,Algorithm ,Transform coding ,Data compression - Abstract
In order to describe mesh bit-streams which can be adapted to the heterogeneity of network bandwidth and terminals graphics capabilities, the concepts of quality scalability and resolution scalability are introduced. A triangle mesh compression scheme based on wavelet transform is proposed to generate bit-streams with both scalabilities. Each subband corresponds to a resolution level. Wavelet coefficients of each subband are bitplane encoded to enable quality refinement within this subband. The experimental results show the proposed coder has achieved better compression performance than that of PGC (progressive geometry compression).
- Published
- 2005
- Full Text
- View/download PDF
333. Synthesis and antitumor activity of novel 2-substituted indoline imidazolium salt derivatives
- Author
-
Xu, Xiao-Liang, primary, Yu, Chun-Lei, additional, Chen, Wen, additional, Li, Ying-Chao, additional, Yang, Li-Juan, additional, Li, Yan, additional, Zhang, Hong-Bin, additional, and Yang, Xiao-Dong, additional
- Published
- 2015
- Full Text
- View/download PDF
334. Flavonoids from the Leaves of Sun Cured Tobacco and their Anti-Tobacco Mosaic Virus Activity
- Author
-
Yang, Guang-Yu, primary, Miao, Ming-Ming, primary, Wang, Yun, additional, Liu, Chun-Bo, additional, Shen, Qin-Peng, additional, Zhang, Feng-Mei, additional, He, Pei, additional, Liu, Zhi-Hua, additional, Zhang, Hong-Bin, additional, and Yang, Xiao-Dong, additional
- Published
- 2015
- Full Text
- View/download PDF
335. Novel 3-substituted fluorine imidazolium/triazolium salt derivatives: synthesis and antitumor activity
- Author
-
Liu, Jin-Mei, primary, Wang, Min, additional, Zhou, Yun-Jing, additional, Yan, Ju-Ming, additional, Yang, Li-Juan, additional, Li, Yan, additional, Zhang, Hong-Bin, additional, and Yang, Xiao-Dong, additional
- Published
- 2015
- Full Text
- View/download PDF
336. Capacity and reliability of digital watermarking
- Author
-
Zhang Hong-bin and Zhang Fan
- Subjects
business.industry ,Computer science ,Digital Watermarking Alliance ,Data_MISCELLANEOUS ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,Electronic mail ,Watermarking attack ,Digital image ,Robustness (computer science) ,Data_GENERAL ,Bit error rate ,Computer vision ,Artificial intelligence ,business ,Digital watermarking - Abstract
In watermarking schemes an image is considered as a communication channel for transmitting messages. But because of the requirements of watermarking robustness and visibility, watermarking schemes have different characteristics from traditional communication. Watermarking capacity should be associated with the content of an image. A different image has a different watermarking capacity. In this paper, we present a content adaptive watermarking algorithm to embed the strongest watermark while maintaining the watermark's invisibility, and discuss watermarking capacity for this scenario. We also derive the relation between watermarking capacity and detection bit error rate (BER) for the first time.
- Published
- 2004
- Full Text
- View/download PDF
337. Digital watermarking capacity analysis in wavelet domain
- Author
-
Zhang Hong-bin and Zhang Fan
- Subjects
business.industry ,Data_MISCELLANEOUS ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Wavelet transform ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Watermark ,Data_CODINGANDINFORMATIONTHEORY ,Image (mathematics) ,Domain (software engineering) ,Wavelet ,Data_GENERAL ,Embedding ,Computer vision ,Noise (video) ,Artificial intelligence ,business ,Digital watermarking ,Mathematics - Abstract
Capacity is an important character of digital watermarking. Research of image watermarking capacity is to study how much information can be hidden in an image. Recently, wavelet transform has been applied widely in watermarking research as its excellent multi-resolution analysis property. According to watermarking methods in wavelet domain, watermark's embedding and extracting realized in wavelet domain, we think that watermarking capacity should be analyzed in wavelet domain also. This paper presents a watermarking capacity analysis method based on content of wavelet subbands by using Watson quantization matrix and Noise Visibility Function (NVF), and discusses watermarking capacity of blind watermarking and non-blind watermarking in this scenario.
- Published
- 2004
- Full Text
- View/download PDF
338. Cassava genome from a wild ancestor to cultivated varieties
- Author
-
Wang, Wenquan, Feng, Binxiao, Xiao, Jingfa, Xia, Zhiqiang, Zhou, Xincheng, Li, Pinghua, Zhang, Weixiong, Wang, Ying, Møller, Birger Lindberg, Zhang, Peng, Luo, Ming-Cheng, Xiao, Gong, Liu, Jingxing, Yang, Jun, Chen, Songbi, Rabinowicz, Pablo D., Chen, Xin, Zhang, Hong-Bin, Ceballos, Henan, Lou, Qunfeng, Zou, Meiling, Carvalho, Luiz J. C. B., Zeng, Changying, Xia, Jing, Sun, Shixiang, Fu, Yuhua, Wang, Haiyan, Lu, Cheng, Ruan, Mengbin, Zhou, Shuigeng, Wu, Zhicheng, Liu, Hui, Kannangara, Rubini Maya, Jørgensen, Kirsten, Neale, Rebecca Louise, Bonde, Maya, Heinz, Nanna, Zhu, Wenli, Wang, Shujuan, Zhang, Yang, Pan, Kun, Wen, Mingfu, Ma, Ping-An, Li, Zhengxu, Hu, Meizhen, Liao, Wenbin, Hu, Wenbin, Zhang, Shengkui, Pei, Jinli, Guo, Anping, Guo, Jianchun, Zhang, Jiaming, Zhang, Zhengwen, Ye, Jianqiu, Ou, Wenjun, Ma, Yaqin, Liu, Xinyue, Tallon, Luke J., Galens, Kevin, Ott, Sandra, Huang, Jie, Xue, Jingjing, An, Feifei, Yao, Qingqun, Lu, Xiaojing, Fregene, Martin, Augusto Becerra Lopez-Lavalle, L., Wu, Jiajie, You, Frank M., Chen, Meili, Hu, Songnian, Wu, Guojiang, Zhong, Silin, Ling, Peng, Chen, Yeyuan, Wang, Qinghuang, Liu, Guodao, Liu, Bin, Li, Kaimian, Peng, Ming, Wang, Wenquan, Feng, Binxiao, Xiao, Jingfa, Xia, Zhiqiang, Zhou, Xincheng, Li, Pinghua, Zhang, Weixiong, Wang, Ying, Møller, Birger Lindberg, Zhang, Peng, Luo, Ming-Cheng, Xiao, Gong, Liu, Jingxing, Yang, Jun, Chen, Songbi, Rabinowicz, Pablo D., Chen, Xin, Zhang, Hong-Bin, Ceballos, Henan, Lou, Qunfeng, Zou, Meiling, Carvalho, Luiz J. C. B., Zeng, Changying, Xia, Jing, Sun, Shixiang, Fu, Yuhua, Wang, Haiyan, Lu, Cheng, Ruan, Mengbin, Zhou, Shuigeng, Wu, Zhicheng, Liu, Hui, Kannangara, Rubini Maya, Jørgensen, Kirsten, Neale, Rebecca Louise, Bonde, Maya, Heinz, Nanna, Zhu, Wenli, Wang, Shujuan, Zhang, Yang, Pan, Kun, Wen, Mingfu, Ma, Ping-An, Li, Zhengxu, Hu, Meizhen, Liao, Wenbin, Hu, Wenbin, Zhang, Shengkui, Pei, Jinli, Guo, Anping, Guo, Jianchun, Zhang, Jiaming, Zhang, Zhengwen, Ye, Jianqiu, Ou, Wenjun, Ma, Yaqin, Liu, Xinyue, Tallon, Luke J., Galens, Kevin, Ott, Sandra, Huang, Jie, Xue, Jingjing, An, Feifei, Yao, Qingqun, Lu, Xiaojing, Fregene, Martin, Augusto Becerra Lopez-Lavalle, L., Wu, Jiajie, You, Frank M., Chen, Meili, Hu, Songnian, Wu, Guojiang, Zhong, Silin, Ling, Peng, Chen, Yeyuan, Wang, Qinghuang, Liu, Guodao, Liu, Bin, Li, Kaimian, and Peng, Ming
- Published
- 2014
339. Two Properties of SVD and Its Application in Data Hiding
- Author
-
Li, Yun-xia, primary and Zhang, Hong-bin, additional
- Full Text
- View/download PDF
340. Construction of Large-Insert Bacterial Clone Libraries and their Applications
- Author
-
He, Limei, primary, Du, Chunguang, additional, Li, Yaning, additional, Scheuring, Chantel, additional, and Zhang, Hong-Bin, additional
- Full Text
- View/download PDF
341. Three New Phthalides fromGnaphalium adnatum
- Author
-
Zheng, Xing-Ping, primary, Cui, Qiong-Fang, additional, Zhao, Jing-Feng, additional, Yang, Li-Juan, additional, Zhang, Hong-Bin, additional, Yang, Xiao-Dong, additional, and Li, Liang, additional
- Published
- 2014
- Full Text
- View/download PDF
342. ChemInform Abstract: Design, Synthesis and Antitumor Activity of Novel 8-Substituted 2,3,5,6-Tetrahydrobenzo[1,2-b:4,5-b′]difuran Imidazolium Salt Derivatives.
- Author
-
Sun, Cheng-Jun, primary, Chen, Wen, additional, Li, Yan, additional, Liu, Lan-Xiang, additional, Wang, Xue-Quan, additional, Li, Li-Juan, additional, Zhang, Hong-Bin, additional, and Yang, Xiao-Dong, additional
- Published
- 2014
- Full Text
- View/download PDF
343. Group preferential selection promotes cooperation in spatial public goods game
- Author
-
Zhang, Hong-Bin, primary and Wang, Hong, additional
- Published
- 2014
- Full Text
- View/download PDF
344. Cassava genome from a wild ancestor to cultivated varieties
- Author
-
Wang, Wenquan, primary, Feng, Binxiao, additional, Xiao, Jingfa, additional, Xia, Zhiqiang, additional, Zhou, Xincheng, additional, Li, Pinghua, additional, Zhang, Weixiong, additional, Wang, Ying, additional, Møller, Birger Lindberg, additional, Zhang, Peng, additional, Luo, Ming-Cheng, additional, Xiao, Gong, additional, Liu, Jingxing, additional, Yang, Jun, additional, Chen, Songbi, additional, Rabinowicz, Pablo D., additional, Chen, Xin, additional, Zhang, Hong-Bin, additional, Ceballos, Henan, additional, Lou, Qunfeng, additional, Zou, Meiling, additional, Carvalho, Luiz J.C.B., additional, Zeng, Changying, additional, Xia, Jing, additional, Sun, Shixiang, additional, Fu, Yuhua, additional, Wang, Haiyan, additional, Lu, Cheng, additional, Ruan, Mengbin, additional, Zhou, Shuigeng, additional, Wu, Zhicheng, additional, Liu, Hui, additional, Kannangara, Rubini Maya, additional, Jørgensen, Kirsten, additional, Neale, Rebecca Louise, additional, Bonde, Maya, additional, Heinz, Nanna, additional, Zhu, Wenli, additional, Wang, Shujuan, additional, Zhang, Yang, additional, Pan, Kun, additional, Wen, Mingfu, additional, Ma, Ping-An, additional, Li, Zhengxu, additional, Hu, Meizhen, additional, Liao, Wenbin, additional, Hu, Wenbin, additional, Zhang, Shengkui, additional, Pei, Jinli, additional, Guo, Anping, additional, Guo, Jianchun, additional, Zhang, Jiaming, additional, Zhang, Zhengwen, additional, Ye, Jianqiu, additional, Ou, Wenjun, additional, Ma, Yaqin, additional, Liu, Xinyue, additional, Tallon, Luke J., additional, Galens, Kevin, additional, Ott, Sandra, additional, Huang, Jie, additional, Xue, Jingjing, additional, An, Feifei, additional, Yao, Qingqun, additional, Lu, Xiaojing, additional, Fregene, Martin, additional, López-Lavalle, L. Augusto Becerra, additional, Wu, Jiajie, additional, You, Frank M., additional, Chen, Meili, additional, Hu, Songnian, additional, Wu, Guojiang, additional, Zhong, Silin, additional, Ling, Peng, additional, Chen, Yeyuan, additional, Wang, Qinghuang, additional, Liu, Guodao, additional, Liu, Bin, additional, Li, Kaimian, additional, and Peng, Ming, additional
- Published
- 2014
- Full Text
- View/download PDF
345. Inclusion complex of GA-13316 with β-cyclodextrin: Preparation, characterization, molecular modeling, and in vitro evaluation
- Author
-
Yang, Rui, primary, Chen, Jing-Bo, additional, Xiao, Chuan-Fan, additional, Liu, Zhi-Cheng, additional, Gao, Zhan-Yong, additional, Yan, Sheng-Jiao, additional, Zhang, Ji-Hong, additional, Zhang, Hong-Bin, additional, and Lin, Jun, additional
- Published
- 2014
- Full Text
- View/download PDF
346. Application of ANFIS in Engine Fault Prediction
- Author
-
Zhang, Hong Bin, primary, Huang, Yan Fang, additional, Sun, Shi Xia, additional, and Zhao, Yang, additional
- Published
- 2014
- Full Text
- View/download PDF
347. Helicopter Reliability Researching Based on Neural Networks
- Author
-
Zhang, Hong Bin, primary, Ju, Yan Qiu, additional, Cao, Xue Feng, additional, and Qi, Chi, additional
- Published
- 2014
- Full Text
- View/download PDF
348. Networking Agglomeration Effect of E-Commerce Platform in Industry Clusters
- Author
-
Ren, Zong Qiang, primary and Zhang, Hong Bin, additional
- Published
- 2014
- Full Text
- View/download PDF
349. ChemInform Abstract: Catalytic Enantioselective and Divergent Total Synthesis of (+)‐10‐Oxocylindrocarpidine, (+)‐Cylindrocarpidine, (‐)‐N‐Acetylcylindrocarpinol, and (+)‐Aspidospermine.
- Author
-
Shen, Xiao‐Lei, primary, Zhao, Rui‐Rui, additional, Mo, Ming‐Jie, additional, Peng, Fang‐Zhi, additional, Zhang, Hong‐Bin, additional, and Shao, Zhi‐Hui, additional
- Published
- 2014
- Full Text
- View/download PDF
350. Synthesis and Biological Activity of Novel 1-((benzofuran-2-yl)methyl)-1Htriazole Derivatives
- Author
-
Shi, Yi-Min, primary, Yang, Li-Juan, additional, Chen, Wen, additional, Sun, Cheng-Jun, additional, Xu, Xiao-Liang, additional, Zhou, Shu-Ya, additional, Zhang, Hong- Bin, additional, and Yang, Xiao-Dong, additional
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.