Jie Lian

ORCID: 0000-0003-4964-7289
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • DNA and Biological Computing
  • Advanced Computational Techniques and Applications
  • Modular Robots and Swarm Intelligence
  • Opportunistic and Delay-Tolerant Networks
  • Distributed Control Multi-Agent Systems
  • Music and Audio Processing
  • Data Management and Algorithms
  • Speech and Audio Processing
  • Speech Recognition and Synthesis
  • Caching and Content Delivery
  • Text and Document Classification Technologies
  • Cooperative Communication and Network Coding
  • Video Surveillance and Tracking Methods
  • Energy Harvesting in Wireless Networks
  • Advanced biosensing and bioanalysis techniques
  • Vehicle License Plate Recognition
  • Advanced Text Analysis Techniques
  • Blockchain Technology Applications and Security
  • Face and Expression Recognition
  • Network Traffic and Congestion Control
  • Peer-to-Peer Network Technologies
  • Environmental Monitoring and Data Management
  • Brain Tumor Detection and Classification

Xiamen University
2021-2023

Ministry of Public Security of the People's Republic of China
2018

China Electronics Technology Group Corporation
2018

National University of Mongolia
2012-2014

Inner Mongolia University for Nationalities
2014

Inner Mongolia University
2014

Beijing Municipal Education Commission
2014

Beijing Jiaotong University
2014

University of Waterloo
2004-2008

University of Connecticut
2005

Energy conservation is an important design consideration for battery powered wireless sensor networks (WSNET). constraint in WSNETs limits the total amount of sensed data (data capacity) received by sinks. In commonly used static model with uniformly distributed homogenous sensors a stationary sink, close to sink drain their energy much faster than far away from due unevenly forwarding workloads among sensors. A major issue, which has not been adequately addressed so far, question how...

10.1080/15501320500201276 article EN International Journal of Distributed Sensor Networks 2006-03-01

Nowadays, wireless sensor networks have been widely used in many monitoring applications. Due to the low quality of sensors and random effects environments, however, it is well known that collected data are noisy. Therefore, very critical clean before using them answer queries or conduct analysis. Popular cleaning approaches, such as moving average, cannot meet requirements both energy efficiency quick response time related In this paper, we propose a hybrid approach with confidence....

10.1109/icdcs.2007.83 article EN 2007-06-01

Table-driven routing algorithms in flat networks have the scalability problem due to need for global topology updates. To reduce update cost, are hierarchically organized. Clustering organize into hierarchical networks. One important problem, which has not been adequately addressed so far, is evaluate how good a clustering algorithm is. In other words, it useful know what desired properties of are. this paper, we address issue by considering can be measured total table size and variance...

10.1109/tnet.2007.896499 article EN IEEE/ACM Transactions on Networking 2007-12-01

In many applications of sensor networks, the sink needs to keep track history sensed data a monitored region for scientific analysis or supporting historical queries. We call these time series value distributions snapshots. Obviously, build snapshots by requiring all sensors transmit their periodically is not energy efficient. this paper, we introduce idea gradient boundary and propose detection (GBD) algorithm construct region. GBD, partitioned into set subregions in one subregion are...

10.1109/tpds.2007.1057 article EN IEEE Transactions on Parallel and Distributed Systems 2007-09-17

The support vector machine (SVM) is one of the most widely used approaches for data classification and regression. SVM achieves largest distance between positive negative vectors, which neglects remote instances away from interface. In order to avoid a position change interface as result an error system outlier, C-SVM was implemented decrease influences system's outliers. Traditional holds uniform parameter C both instances; however, according different number proportions distribution,...

10.1155/2014/851814 article EN cc-by The Scientific World JOURNAL 2014-01-01

Vehicle type classification based on images is widely applied in traffic surveillance and monitoring system. It has been used billing at toll collection stations preventing heavy trucks from entering city viaducts. A hierarchical vehicle detection system proposed this paper. cascade ensemble classifier, accepting Multiple Layer Perceptron (MLP) K-Nearest Neighbor (K-NN) as base classifiers, for the classification. The experiments are conducted, classifier with two layers offers a reliability...

10.1088/1742-6596/1069/1/012099 article EN Journal of Physics Conference Series 2018-08-01

In this paper, we propose a novel energy-efficient approach, localized routing tree (LRT) coupled with route redirection (RR) strategy, to support various types of queries. LRTs take care the sensors near sink and reduce energy consumption these sensors, RR reduces cost data receptions. Compared existing approaches, simulation studies show that LRT together has significant improvement on query capacity.

10.1145/1099554.1099616 article EN 2005-10-31

Hierarchical routing is used to reduce update costs, and clustering algorithms partition networks into multilevel cluster structures. In hierarchical networks, performance greatly affected by the sizes structures of partitioned clusters. Two existing are based on concepts lowest ID maximum degree nodes. this paper, we present a new algorithm concept variable Our produces clusters with low variance in size, number close optimal value that leads smallest total table size. The evaluated using...

10.1109/icccn.2003.1284210 article EN 2004-06-03

Hierarchical routing is an effective way to solve the scalability problem in flat networks. The optimal total table (RT) size affected by four parameters: number of nodes a network hierarchy levels, clusters at each level, and cluster distribution. An solution RT was given L. Kleinrock et al. (1977). However, based on major assumption: all have equal RTs. It not clear whether results stated (1977) still hold without this assumption. We provide general integer sizes In addition, we will show...

10.1109/iscc.2004.1358644 article EN 2004-01-01

A wireless sensor network (WSNET) can support various types of queries. The energy resource sensors constrains the total number query responses, called capacity, received by sink. There are four problems in existing approaches for energy-efficient processing WSNETs: fact that near sink drain their much faster than distant has been overlooked, routing trees (RT) rooted at sink, and therefore, aggregative queries less energy-efficient, data reception cost ignored, flooding is used distribution...

10.1080/15501320500330711 article EN International Journal of Distributed Sensor Networks 2006-02-01

Peer-to-peer architectures become popular in modern massively distributed systems, which are often very large scale and contain a huge volume of heterogeneous data. To facilitate the information retrieval process P2P networks, we consider semantic search approach, where syntax-based queries shipped to peers based on correlations. Motivated by an interesting experience Web retrieval, propose novel ontology-based scheme measure similarity peer interests accurately consistently decentralized...

10.1145/1458082.1458269 article EN 2008-10-26

Relative radiometric normalization (RRN) of different satellite images the same terrain is essential for change detection, object classification/segmentation, and mapmaking tasks. However, identifying increasingly comprehensive no-change points better generalization crucial. Traditional RRN models struggle to robustly derive complete set points, often being disrupted by changes. Additionally, that account changes precisely may require human involvement instructions. This paper proposes...

10.1109/tgrs.2024.3391175 article EN IEEE Transactions on Geoscience and Remote Sensing 2024-01-01

In wireless mobile ad hoc networks (MANETs), energy is a crucial resource. Topology control technology allows network nodes to reduce their transmission power while preserving the connectivity. A MANET non-cooperative system so that only when node earns its payment, which can cover cost, cooperation be stimulated. We design truthful topology mechanism (TRUECON) for MANETs induce selfish, but rational, collaborate. Truth-telling dominant strategy in TRUECON. needs reveal true value order...

10.1109/icpp.2006.71 article EN 2006-10-24

Text mining is a process with rich semantics of the text were analyzed to understand content and meaning it contains.Its in-depth research bound greatly improve people's ability extract information from vast amounts textual data, there high commercial value.This paper introduces case data mining, then gives framework for technology related technical used in assessment method so made detailed introduction.Many techniques based on technology-based, can be seen name, purpose same, are trying...

10.2991/meic-14.2014.203 article EN cc-by-nc Advances in engineering research/Advances in Engineering Research 2014-01-01

In this paper we present a survey of techniques and strategies that can be utilized to process high-volumes data in support counter-terrorism. Data reduction is critical problem for counter-terrorism; there are large collections documents must analyzed processed, raising issues related performance, lossless reduction, polysemy (i.e., the meaning individual words being influenced by their surrounding words), synonymy possibility same term described different ways). Our main objective provide...

10.1109/aero.2005.1559622 article EN IEEE Aerospace Conference 2005-01-01

Relative radiometric normalization (RRN) mosaicking among multiple remote sensing images is crucial for the downstream tasks, including map-making, image recognition, semantic segmentation, and change detection. However, there are often seam lines on mosaic boundary contrast left, especially in complex scenarios, making appearance of unsightly reducing accuracy latter classification/recognition algorithms. This paper renders a novel automatical approach to eliminate RRN scenarios. It...

10.48550/arxiv.2106.07441 preprint EN other-oa arXiv (Cornell University) 2021-01-01

Feature extraction technology is a major factor in determining good classification results, the traditional feature method has many deficiencies, such as when high degree of imbalance distribution categories and characteristics, it can not effectively deal with low-frequency words; single for improper handling, leading to local optima generating solution.For methods fully examine shortcomings candidate words, proposed text based on genetic algorithm.In this method, variety heuristics word...

10.2991/meic-14.2014.202 article EN cc-by-nc Advances in engineering research/Advances in Engineering Research 2014-01-01

The emergency of a new computing pattern must be supported by powerful mathematical theory, weak theoretical ideology does not have strong vitality, and which will become vulnerable. As being the DNA treated as computational also need lot basic research system. This article describes nature computing, given equivalence with traditional computer under support automata theory system, further analysis understanding pattern.

10.4028/www.scientific.net/amm.556-562.3800 article EN Applied Mechanics and Materials 2014-05-01

There are two major drawbacks in traditional software development process, to follow the database as core of pattern, it is difficult achieve a high degree flexibility system and meet changing requirements reconstruction.And domain with complex business, there no reasonable means understand needs system, build good business avoid risk change upgrade reconstruction software, can not be fully respected practice.In process development, facing requirements, due complexity repentant make failure...

10.2991/meic-14.2014.53 article EN cc-by-nc Advances in engineering research/Advances in Engineering Research 2014-01-01
Coming Soon ...