Entity

Time filter

Source Type


Wang Y.,University of Science and Technology Beijing | Ban X.J.,University of Science and Technology Beijing | Yang X.,State Key Laboratory of Pulsed Power Laser Technology | Guo Y.F.,Northern Electronic Instrument Institute
Applied Mechanics and Materials | Year: 2014

Skin color segmentation and AdaBoost algorithm always play important roles in various face detection methods. To combine the two smoothly, this paper investigates face detection methods based on skin color feature and AdaBoost algorithm. Experimental results show that the proposed methods can effectively reduce the false alarms. © (2014) Trans Tech Publications, Switzerland. Source


Wang Y.,University of Science and Technology Beijing | Wang Y.,Northern Electronic Instrument Institute | Ban X.,University of Science and Technology Beijing | Chen J.,Anhui University | And 2 more authors.
Optik | Year: 2015

Although license plate recognition (LPR) system is widely applied in practice, its some key techniques that cannot meet application requirements in natural scenes still need more attention, such as Chinese character recognition, candidate filtration, tilt correction, and character segmentation. In this paper, a novel method based on SIFT feature is devised to solve the four problems simultaneously. Promising experimental results demonstrate that the proposed is robust to various adverse factors, such as complex background, scaling variation, rather large tilting angle, contamination, illumination variation, partial occlusion, and defective character. The success rates of Chinese character recognition and candidate filtration reaches to 96%; the tilt correction accuracies reach to 0.177° and 0.238° in horizontal and vertical directions respectively; and the success rate of character segmentation approaches 100%. Remarkably, the average execution time for these four processes is lower than 268. ms, which may favor real-time processing. © 2015 Elsevier GmbH. Source


Li Y.,Science and Technology on Communication Information Security Control Laboratory | Li Y.,Northern Electronic Instrument Institute | Yang H.,Science and Technology on Communication Information Security Control Laboratory | Xie K.,Northern Electronic Instrument Institute
Lecture Notes in Electrical Engineering | Year: 2015

As to select the important nodes from network, the key problems are to determine the basis and quantitative standard of evaluating node importance. This chapter proposes the measurement method of network node importance from the aspect of vulnerability, including topological structure vulnerability evaluation standard based on degree distribution, betweenness centrality, round-robin betweenness centrality, and extension degree distribution; and application vulnerability evaluation standard based on maximum load link and information value. The experiment results show that the measure standard of network node importance based on extension degree distribution not only reflects the value of the node itself, but comprehensively considers indirect effect of node to network; it can well describe the differences among nodes in a network, and time complexity of the algorithm is smaller. © Springer International Publishing Switzerland 2015. Source


Li Y.,Science and Technology on Communication Information Security Control Laboratory | Li Y.,Northern Electronic Instrument Institute | Yang H.,Science and Technology on Communication Information Security Control Laboratory | Xie F.,Northern Electronic Instrument Institute
IET Conference Publications | Year: 2014

The routing protocol is the core of the Ad Hoc network protocols, which largely determines the performance and features of an Ad Hoc network. Aiming at the characteristics of the Mobile Radio Ad Hoc network, this paper is to design a low-rate mobile Ad Hoc network routing protocols WLRP (Wireless Low-Rate Ad Hoc Security Routing Protocol), using the trust evaluation mechanism between neighbour nodes which can effectively prevent attacks from inside the network, to greatly enhance the Ad Hoc Network security. Simulation results show that in low-Rate link environment, the WLRP protocol performs better than AODV. Source


Zhang Y.,Northern Electronic Instrument Institute | Guo S.,Northern Electronic Instrument Institute | Niu W.,Northern Electronic Instrument Institute | Kong R.,Peking University
Proceedings - 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control, IMCCC 2011 | Year: 2011

In order to improve the search efficiency of unstructured P2P network, the paper presents a routing algorithm based on multi-information integrated decision-making guidance. In the algorithm, indexing mechanism of neighbors' resource information is used to improve search probability and dynamic TTL adjustment mechanism is used to improve search efficiency. Meanwhile, indexing mechanism of routing information based on variable probability and management mechanism of index credibility are designed to improve the effectiveness of routing index. Simulation results show the algorithm can greatly enhance the efficiency of resource search. © 2011 IEEE. Source

Discover hidden collaborations