Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 161 )

2018 ( 1362 )

2017 ( 1232 )

2016 ( 1240 )

Custom range...

Search Results: 1 - 10 of 95183 matches for " CHEN Guang-xi "
All listed articles are free for downloading (OA Articles)
Page 1 /95183
Display every page Item
The progress of research into interleukin gene polymorphism associated with stroke
Chen CHEN,Xiao-Yuan QIAO,Guang-xi SHANG,Jin-Tao WANG
Medical Journal of Chinese People's Liberation Army , 2013,
Abstract: As a common disease, stroke seriously impairs human health. Interleukin (IL) is an important type of inflammatory mediators, which is involved in the pathogenesis of stroke. With the study of genomics, we discovered that some gene loci of IL were associated with stroke, such as IL-1α-889 C/T, IL-1RN rs380092 and IL-10-1082 G/G. Meanwhile, some gene loci of IL might become independent risk factors of stroke, such as IL-4 C582T and IL4-589C>T. Therefore, the IL gene polymorphism had become a research focus in pathogenesis of stroke. Our paper describes the relationship between IL subtype and its gene polymorphism with stroke. We look forward to provide a useful information for further research.
Microcomputer Image Processing System and FFT Algorithm

CHEN Xiao-wei,MA Guang-xi,

中国图象图形学报 , 2000,
Abstract: In this paper, a microcomputer image processing system using a PCVISIONplus Frame Grabber is built, and the principle for writing the programs is explained. Because it takes much time to exchange the data with hard disk, so an algorithm based on the properties of DFT is described in order to resolve this problem. The FFT and the image frequency domain processing can be carried out in the conventional memory of a microcomputer using the algorithm without exchanging the data with hard disk. The speed of the image processing was speeded up. A lot of X radiology have been processed with the algorithm in the microcomputer image processing system. The result shows that the proposed algorithm is efficient and fast.
Image watermarking algorithm against geometrical attacks inContourlet domain based on chaos

LI Feng,CHEN Guang-xi,DING Yong,
李 峰
,陈光喜,丁 勇

计算机应用研究 , 2012,
Abstract: In order to improve the robustness against geometrical attacks and self-adaptability, this paper proposed an adaptive image watermarking algorithm in Contourlet domain based on chaos. Firstly, it applied a Contourlet transform to the cover image, and divided the low frequency sub-band into many blocks which were decomposed with singular value decompositionSVD. Secondly, it adaptively embedded the watermark information with chaotic encryption into the largest singular value of every block based on human visual system HVS. Finally, it extracted the feature points by the improved Harris-Laplace operator. During detection, restored the attacked imageby using feature points of it and those of the watermarked image. Experimental results show the proposed algorithm is robust to common image processing and geometric attacks such as JPEG compression, filtering, noise addition, rotation, scaling and translation.
Hybrid streaming media distribution model based on P2P and CDN

ZANG Yun-gang,CHEN Guang-xi,

计算机应用研究 , 2010,
Abstract: Based on CDN and P2P, this paper provided a new HSDM. According to the relation of peers and streaming capacity in the system, realized and then simulated the hybrid model. The result shows that compared with traditional CDN and P2P, this new hybrid model obviously reduces the flow of backbone network. And also, with this new method can effectively reduce the pressure of CDN severs and the response time of system without compromising the media quality delivered, and increases the network utilization.
Cluster Method of Support Vector Machine to Solve Large-scale Data Set Classification

CHEN Guang-xi,XU Jian,CHENG Yan,

计算机科学 , 2009,
Abstract: A cluster Support Vector Machines (C-SVM) method for large-scale data set classification was presented to accelerate speed.Firstly,using function of centre distance calculated radius ratio.Then,data set was scanned by cluster mirror.By remaining representative data for cluster and installing deleted matrix sample set was remarkably reduced.It is proved that the new method has lower time complexity.Experiments with random data and UCI databases verify the efficiency of the C-SVM.Moreover,classification accur...
Improvement of Hierarchical Failure Detection Algorithm in Distributed Systems

XU Guang-xi,CHEN Shu-yu,

计算机科学 , 2011,
Abstract: Aiming at the problem of the accuracy and efficiency of hierarchical failure detection method in distributed systems,this paper proposed an improved algorithm of hierarchical failure detection in distributed systems based on Chen prediction algorithm,which is on guidance of hierarchical failure detection mechanism of the object level,process level and host level.In distributed systems,the traditional hierarchical failure detection method always encounters problems such as single point failure,detection dela...
Robust Adaptive Video Watermarking Algorithm Based on HVS

CHEN Guang-xi,CHENG Yan,

计算机科学 , 2008,
Abstract: A robust adaptive Video Watermarking algorithm based on Human Visual System(HVS)was proposed.By comparing the direct current DCT coefficients of the I frame and its neighbor frame of the video,a fast moving image block set was chosen.The new algorithm embedded watermarking bits adaptively in proper place for some image block,which was decided based on HVS.Experiments show that the proposed algorithm is robust against MPEG compression,also the attacks of RST.
Subject Trust Model Based on Twice Fuzzy Comprehensive Evaluation

ZUO Shuang-Yong,CHEN Guang-Xi,

计算机系统应用 , 2011,
Abstract: This article presented a subject trust model based on fuzzy comprehensive evaluation, and gave the concrete method of realizing the model to evaluate the trust degree of a subject in the network. The article could confirm the weights of evaluation factors dynamically by means of Analytical Hierarchy Process(AHP), and drew into the weights that expert had made for evaluation functions, to make a twice comprehensively evaluation for the first consequence. Example analysis showed the correct, novel and practical value of the method.
Trust model based on recommended in P2P network environment

LEI Yue-ju,CHEN Guang-xi,

计算机应用研究 , 2012,
Abstract: The nodes in network are not only confined the trust relationship which established by trading directly, but also including the third party's recommended trust. This paper presented a trust model based on recommended in P2P environment. It used the proportion of success and failure in the trade total number as direct trust value, the model distinguish between transaction reputation and recommendation reputation definitely. Besides it introduced the credibility of the recommended node with offset factor to calculate, and had got the integrated trust value of target node by the directly trust of dynamic equilibrium node with the punishment factors and the risk factors, and recommended trust other nodes. Finally, it gare the simulation experiments. The experimental results show that the integrated trust value is more close to real value, and can resist threats such as slandered by malicious node, collaborative cheating and so on.
Spectrum-Efficient Differential Space-Time Coded CDMA Systems

Chen Zhong-lin,Zhu Guang-xi,Cai Wei,

电子与信息学报 , 2005,
Abstract: In this paper, a spectrum-efficient differential space-time transmission scheme is presented for Code-Division Multiple-Access (CDMA) systems. Consider a multiuser environment with M synchronous co-channel users, each is equipped with 2 transmit antennas. Assuming the receiver uses N>2 receive antennas, this scheme will exploit decorrelating detectors and receive antenna diversity to separate M users. Then a noncoherent decoder is derived for flat Rayieigh fading channels, which can provide a minimum diversity order of 2x(jV-1) to each co-channel user. Compared with the existing differential space-time coded CDMA systems, the proposed scheme has two main advantages: Firstly, only by deploying an additional receive antenna, it can effectively improve the system performance under the condition that the spectrum efficiency is increased by 1/3; secondly, it has only linear decoding complexity.
Page 1 /95183
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.