Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier (Englisch)
- Neue Suche nach: Gao, Baolu
- Neue Suche nach: Chen, Junjie
- Neue Suche nach: Xiong, Xiaoyan
- Neue Suche nach: Xiong, Shibo
- Neue Suche nach: Gao, Baolu
- Neue Suche nach: Chen, Junjie
- Neue Suche nach: Xiong, Xiaoyan
- Neue Suche nach: Xiong, Shibo
In:
Web Information Systems and Mining
7
;
419-425
;
2011
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent Classifier
-
Beteiligte:Gao, Baolu ( Autor:in ) / Chen, Junjie ( Autor:in ) / Xiong, Xiaoyan ( Autor:in ) / Xiong, Shibo ( Autor:in )
-
Erschienen in:Web Information Systems and Mining , 7 ; 419-425Lecture Notes in Computer Science ; 6987, 7 ; 419-425
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:7 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Research on Electromagnetic Wave Through-The-Earth Wireless Communication for Coal Mine DisasterTao, Jinyi et al. | 2011
- 11
-
The Investigation of WEB Software System Based on Domain-Driven DesignWang, Fei / Yan, LiHua / Zhou, Peng / Sun, Wei / Ding, Yuan et al. | 2011
- 19
-
MediaCRM: Enabling Customer Relationship Management in the BroadcastSutter, Robbie / Matton, Mike / Laukens, Niels / Rijsselbergen, Dieter / Walle, Rik et al. | 2011
- 27
-
Jordan Triple Multiplicative Maps on the Symmetric MatricesZhang, Haifeng / Li, Yuying et al. | 2011
- 35
-
International Collaborations in Brain-Computer Interface (BCI) ResearchHamadicharef, Brahim et al. | 2011
- 43
-
A Classification of Cluster Validity Indexes Based on Membership Degree and ApplicationsXie, Nannan / Hu, Liang / Luktarhan, Nurbol / Zhao, Kuo et al. | 2011
- 51
-
Several Methods of Calculating the Distribution of Linear Combinations of Two-Dimensional Random VariablesLi, Yuying / Zhang, Haifeng et al. | 2011
- 59
-
Propagation in LHM Slab Loaded Rectangular WaveguideLi, Rui-lian et al. | 2011
- 66
-
The Study of Images Emotion Based on fMRIQiao, Xiaoyan / Li, Haifang / Xiang, Jie / Deng, Hongxia et al. | 2011
- 73
-
The Communication Protocol Design of Electro-Hydraulic Control System for Hydraulic Supports at Coal MineWen, Jingguo / Lian, Zisheng et al. | 2011
- 79
-
Temperature Characteristics and Compensation Method of Capacitive Ice Layer Thickness SensorYinke, Dou / Xiaomin, Chang et al. | 2011
- 86
-
False Alarm Probability of the Digital Channelized Receiver Based CA-CFAR DetectorHe, Miao / Jia, Kexin / Cheng, Ting et al. | 2011
- 92
-
Strong Solution of Initial-Boundary Value Problem for a Class of Nonlinear Thermoelastic Couple Beam EquationsWang, Cai-xian / Zhang, Jian-wen et al. | 2011
- 98
-
Initial-Boundary Value Problem for Viscoelastic Rectangular Plate EquationWang, Dongbao / Wang, Yinzhu et al. | 2011
- 104
-
An Invariant Subspace Theorem for Sequentially Subdecomposable OperatorsLiu, Mingxue et al. | 2011
- 109
-
The Genetic Algorithm in the Test Paper GenerationHu, Jian-Jun / Sun, Yue-Hong / Xu, Qing-Zhen et al. | 2011
- 114
-
CDMA Mobile Internet User Behavior Analysis Based on RP InterfaceYu, Kai / He, Dazhong / Dou, Yinan / Lei, Zhenming et al. | 2011
- 124
-
Personalizing Group Recommendation to Social Network UsersEsmaeili, Leila / Nasiri, Mahdi / Minaei-Bidgoli, Behrouz et al. | 2011
- 134
-
A Novel Frequent Trajectory Mining Method Based on GSPLi, Junhuai / Wang, Jinqin / Yu, Lei / Zhang, Jing et al. | 2011
- 141
-
Study of a Fuzzy Clustering Algorithm Based on Interval ValueDu, HaiZhou et al. | 2011
- 148
-
The Influence of the Fourth-Order Dispersion Coefficient for the Information Transmission in FiberXingfang, Jiang / Kai, Shao et al. | 2011
- 155
-
A Research of Resource Scheduling Strategy with SLA Restriction for Cloud Computing Based on Pareto Optimality M×N Production ModelLi, Huixi / Li, Hao et al. | 2011
- 166
-
A Distributed Processing Method for Design Patent Retrieval SystemCao, Jiang-Zhong / Zhu, Jian-Wei / Wang, Xian-Wei / Dai, Qing-Yun et al. | 2011
- 175
-
An Adaptive Distribution Model for Multi-dimensional Data in Decentralized EnvironmentsHe, Wei / Cui, Lizhen et al. | 2011
- 184
-
Research on SOA Business Process Disaster Tolerance Recovery MethodZhang, Xinfeng / Sun, Junfeng / Guo, Pengyu et al. | 2011
- 192
-
Admission Control for WebServices in Enterprise Systems Using Expert SystemsSalimi, Arash Jodeiri / Isazadeh, Ayaz / Karimpour, Jaber et al. | 2011
- 200
-
An Improved Lookup Algorithm on Over-DHT Paradigm Based P2P NetworkFu, Youming / Hu, Ruimin / Chen, Jun / Wang, Zhongyuan / Tian, Gang et al. | 2011
- 208
-
Maximizing the Lifetime of Daley-Tolerant Wireless Sensor Networks Using Fuzzy SystemPorshokooh, Vahide Rafati / Haghighat, Abolfazl Toroghi / Tashtarian, Farzad et al. | 2011
- 216
-
Structural Equation Modeling for Evaluating the Public Value of Service Delivery through e-Government: A Case Study from Sri LankaKarunasena, Kanishka / Deng, Hepu / Karunasena, Anuradha et al. | 2011
- 226
-
W-entropy Index: The Impact of the Members on Social NetworksLi, Weigang / Zheng, Jianya / Li, Daniel LeZhi et al. | 2011
- 234
-
Improving Security of SET Protocol Based on ECCCao, Lai-Cheng et al. | 2011
- 242
-
The Constrained Computing and Application for Intelligent Generalization of SettlementsWang, Li / Zhang, Jin et al. | 2011
- 251
-
Integrating Landsat TM Imagery and See5 Decision-Tree Software for Identifying Croplands: A Case Study in Shunyi District, BeijingZhao, Jinling / Zhang, Dongyan / Wang, Dacheng / Huang, Wenjiang et al. | 2011
- 259
-
An Authenticated Key Exchange to Improve the Security of Shi et al. and Kim et al.’s ProtocolsKim, Mijin / Kwon, Changyoung / Won, Dongho et al. | 2011
- 271
-
A Fast and Tolerant Voting Mechanism in Wireless Sensor NetworksHuang, Jian-hua / Shi, Yong-hong et al. | 2011
- 283
-
The Strategy of Proactive-Reactive Intrusion Tolerance Recovery Based on Hierarchical ModelHuang, Jian-hua / Wang, Fei-fei et al. | 2011
- 294
-
A Network-Flow-Based Method for Embedding RectificationLi, Wanqi / Wang, Heng / He, Zhiwei et al. | 2011
- 304
-
An Approach of Authentication Base on Modified Digital Identity Metasystem in Service-Oriented ArchitectureLi, Peng / Wen, Junhao / Dong, Junping / Tang, Fangfang et al. | 2011
- 312
-
Defense against DNS Man-In-The-Middle SpoofingBai, Xiaolong / Hu, Liang / Song, Zixing / Chen, Feiyan / Zhao, Kuo et al. | 2011
- 320
-
Defensive Steganography: A Novel Way against SteganalysisLi, Wanqi / Wang, Heng / He, Zhiwei et al. | 2011
- 328
-
A New Privacy-Preserving Scheme DOSPA for SaaSLi, Lin / Li, Qingzhong / Shi, Yuliang / Zhang, Kun et al. | 2011
- 336
-
Performance Evaluation of Digital Audio Watermarking Algorithm under Low Bits RatesYu, Guilan / Zuo, Jinglong / Cui, Delong et al. | 2011
- 344
-
An Anti-collusion Trust Model in P2P NetworksTang, Xin / Wang, Ruchuan / Huang, Haiping et al. | 2011
- 352
-
An Alerts Correlation Technology for Large-Scale Network Intrusion DetectionYuan, Jingbo / Ding, Shunli et al. | 2011
- 360
-
Dynamic Authorization of Grid Based on Trust MechanismNiu, Rui-ping / Mu, Xiao-fang / Sun, Gao-feng et al. | 2011
- 368
-
Timestamp Based Authentication Protocol for Smart Card Using ECCChatterjee, Kakali / De, Asok / Gupta, Daya et al. | 2011
- 376
-
Data Privacy Preservation during Schema Evolution for Multi-tenancy Applications in Cloud ComputingZhang, Kun / Li, Qingzhong / Shi, Yuliang et al. | 2011
- 384
-
A Simple (v, t, n)-Fairness Secret Sharing Scheme with One Shadow for Each ParticipantLee, Yung-Cheng et al. | 2011
- 390
-
An Encrypted Data-Transportation Method for Distributed SystemChen, Hongqian / Chen, Yi / Cao, Jian / Sun, Yuehong et al. | 2011
- 397
-
Study on Grid Access Control Strategy Based on Trust and Security GradeLiu, Yihe et al. | 2011
- 402
-
Self-Adaptive QoS Control Mechanism in Cognitive Networks Based on Intelligent Service AwarenessGu, Chengjie / Zhang, Shunyi et al. | 2011
- 411
-
Robustness Promotion of High Speed Network Content Auditing Integrated System Based on Machine Learning MethodYang, Jie / Wu, Yuanhao / Dou, Yinan / Zhang, Kun et al. | 2011
- 419
-
Diagnosis Method of Combing Feature Extraction Based on Time-Frequency Analysis and Intelligent ClassifierGao, Baolu / Chen, Junjie / Xiong, Xiaoyan / Xiong, Shibo et al. | 2011
- 426
-
Performance Analysis of Sleep-Mode with Uplink/Downlink Traffics in IEEE 802.16mHuo, Zhanqiang / Liu, Xiaoke et al. | 2011
- 434
-
LMI Conditions for Stability of Impulsive Stochastic Neural Networks with Unbounded Time-Varying DelaysYin, Lizi / Yang, Dianwu et al. | 2011
- 441
-
Queuing System M/M/1/T with Priority Dropping Packets Mechanism Based on Living TimeWen, Wei / Wang, Yequn / Zhang, Henyang et al. | 2011