The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Guoqi LI(8hit)

1-8hit
  • Dynamically Constrained Vector Field Convolution for Active Contour Model

    Guoqi LIU  Zhiheng ZHOU  Shengli XIE  Dongcheng WU  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E96-D No:11
      Page(s):
    2500-2503

    Vector field convolution (VFC) provides a successful external force for an active contour model. However, it fails to extract the complex geometries, especially the deep concavity when the initial contour is set outside the object or the concave region. In this letter, dynamically constrained vector field convolution (DCVFC) external force is proposed to solve this problem. In DCVFC, the indicator function with respect to the evolving contour is introduced to restrain the correlation of external forces generated by different edges, and the forces dynamically generated by complex concave edges gradually make the contour move to the object. On the other hand, traditional vector field, a component of the proposed DCVFC, makes the evolving contour stop at the object boundary. The connections between VFC and DCVFC are also analyzed. DCVFC maintains desirable properties of VFC, such as robustness to initialization. Experimental results demonstrate that DCVFC snake provides a much better segmentation than VFC snake.

  • A Lightweight System to Achieve Proactive Risk Management for Household ASIC-Resistant Cryptocurrency Mining

    Guoqi LI  

     
    LETTER-Dependable Computing

      Pubricized:
    2019/03/20
      Vol:
    E102-D No:6
      Page(s):
    1215-1217

    Nowadays, many household computers are used to mine ASIC-resistant cryptocurrency, which brings serious safety risks. In this letter, a light weight system is put forward to achieve proactive risk management for the kind of mining. Based on the system requirement analysis, a brief system design is presented and furthermore, key techniques to implement it with open source hardware and software are given to show its feasibility.

  • An On-Demand QoS Service Composition Protocol for MANETs

    Songqiao HAN  Shensheng ZHANG  Guoqi LI  Yong ZHANG  

     
    LETTER-Networks

      Vol:
    E90-D No:11
      Page(s):
    1877-1880

    This paper presents an active quality of service (QoS) aware service composition protocol for mobile ad hoc networks (MANETs), with the goal of conserving resources subject to QoS requirements. A problem of QoS based service composition in MANETs is transformed into a problem of the service path discovery. We extend Dynamic Source Routing protocol to discover and compose elementary services across the network. Some message processing measures are taken to effectively reduce control overhead. Simulation results demonstrate the effectiveness of the proposed protocol.

  • A Modified FTA Approach to Achieve Runtime Safety Analysis of Critical Systems

    Guoqi LI  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E97-A No:10
      Page(s):
    2083-2085

    Runtime analysis is to enhance the safety of critical systems by monitoring the change of corresponding external environments. In this paper, a modified FTA approach, making full utilization of the existing safety analysis result, is put forward to achieve runtime safety analysis. The procedures of the approach are given in detail. This approach could be widely used in safety engineering of critical systems.

  • Software FMEA for Safety-Critical System Based on Co-analysis of System Model and Software Model

    Guoqi LI  

     
    LETTER-Dependable Computing

      Vol:
    E95-D No:12
      Page(s):
    3101-3105

    Software FMEA is valuable and practically used for embedded software of safety-critical systems. In this paper, a novel method for Software FMEA is presented based on co-analysis of system model and software model. The method is hopeful to detect quantitative and dynamic effects by a targeted software failure. A typical application of the method is provided to illustrate the procedure and the applicable scenarios. In addition, a pattern is refined from the application for further reuse.

  • Incorporating Metadata into Data Mining with Ontology

    Guoqi LI  Huanye SHENG  Xun FAN  

     
    LETTER-Data Mining

      Vol:
    E90-D No:6
      Page(s):
    983-985

    In this paper, we present a novel method to incorporate metadata into data mining. The method has many advantages. It can be completed automatically and is independent of a specific database. Firstly, we convert metadata into ontology. Then input a rule set to a reasoner, which supports rule-based inference over the ontology model. The outputs of the reasoner describe the prior knowledge in metadata. Finally, incorporate the prior knowledge into data mining.

  • Ontology-Based Reuse of Failure Modes in Existing Databases for FMEA: Methodology and Tool

    Guoqi LI  

     
    LETTER-Reliability, Maintainability and Safety Analysis

      Vol:
    E96-A No:7
      Page(s):
    1645-1648

    The wide application of FMEA in reliability engineering is generally appreciated, and how to identify the failure modes is the key to it. Failure modes, however, rely only on specific components rather than the system architecture, and therefore could be reused in different FMEAs. A novel ontology-based method, to recognize and reuse specific failure modes in existing databases, is provided here, and a light weight tool is developed for this method. The method and the tool can also be used in other fields with similar scenarios.

  • A Framework to Integrate Public Information into Runtime Safety Analysis for Critical Systems

    Guoqi LI  

     
    LETTER-Dependable Computing

      Vol:
    E97-D No:4
      Page(s):
    981-983

    The large and complicated safety-critical systems today need to keep changing to accommodate ever-changing objectives and environments. Accordingly, runtime analysis for safe reconfiguration or evaluation is currently a hot topic in the field, whereas information acquisition of external environment is crucial for runtime safety analysis. With the rapid development of web services, mobile networks and ubiquitous computing, abundant realtime information of environment is available on the Internet. To integrate these public information into runtime safety analysis of critical systems, this paper brings forward a framework, which could be implemented with open source and cross platform modules and encouragingly, applicable to various safety-critical systems.