Author image not provided
 Chunhua Ju

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.79
Citation Count23
Publication count29
Publication years2001-2017
Available for download2
Average downloads per article404.50
Downloads (cumulative)809
Downloads (12 Months)26
Downloads (6 Weeks)2
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


29 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 29
Result page: 1 2

Sort by:

1
August 2017 Neurocomputing: Volume 253 Issue C, August 2017
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Wechat has become a popular way in China for users to connect and share information with their friends. In particular, Wechat Friends Circle is a popular platform for users to express themselves. It is useful in many real applications, such as personalized recommendations, to calculate the relationship strength between Friends ...
Keywords: Wechat Friends Circle, Relationship circle, Interaction frequency, Relationship strength, Semantic similarity

2
August 2017 Multimedia Tools and Applications: Volume 76 Issue 16, August 2017
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

One of the key foundations of personalized recommendation in a social network is the relationship strength between social network users. The improvement for recommendation accuracy is mostly tied to the precise evaluation of the relationship strengths. With most of the selected factors affecting the relationship strength between users are too ...
Keywords: ABC algorithm, K-means clustering method, Indirect relationship, Topic classification, Online social networks, Sentiment classification

3
September 2016 IEEE Transactions on Information Forensics and Security: Volume 11 Issue 9, September 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Wireless body area networks (WBANs), as a promising health-care system, can provide tremendous benefits for timely and continuous patient care and remote health monitoring. Owing to the restriction of communication, computation and power in WBANs, cloud-assisted WBANs, which offer more reliable, intelligent, and timely health-care services for mobile users and ...

4
July 2016 World Wide Web: Volume 19 Issue 4, July 2016
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1

In this paper, we identify and solve a multi-join optimization problem for Arbitrary Feature-based social image Similarity JOINs(AFS-JOIN). Given two collections(i.e., R and S) of social images that carry both visual, spatial and textual(i.e., tag) information, the multiple joins based on arbitrary features retrieves the pairs of images that are ...
Keywords: Batch similarity join, Social image, High-dimensional indexing, Join box

5
December 2015 International Journal of Computing Science and Mathematics: Volume 6 Issue 6, December 2015
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 3

Multi-project management is very complex task, which often involves the integration of varieties of resources and schedules. In recent years, many researchers have proposed many techniques for project scheduling problems. However, due to its complexity, it is difficult to find out the best scheduling scheme using heuristics or non-traditional techniques. ...

6 published by ACM
August 2015 ACM Transactions on Internet Technology (TOIT): Volume 15 Issue 3, September 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 23,   Downloads (Overall): 181

Full text available: PDFPDF
This article addresses a multi-query optimization problem for distributed medical image retrieval in mobile wireless networks by exploiting the dependencies in the derivation of a retrieval evaluation plan. To the best of our knowledge, this is the first work investigating batch medical image retrieval (BMIR) processing in a mobile wireless ...
Keywords: mobile wireless network, multi-resolution, Medical image

7
January 2015 International Journal of Distributed Sensor Networks - Special issue on Cognitive Radio Enabled Wireless Sensor Networks and Survivability Challenges: Volume 2015, January 2015
Publisher: Taylor & Francis, Inc.
Bibliometrics:
Citation Count: 0

This paper studies the distributed energy efficient access point (AP) selection for cognitive sensors in the Internet of Things (IoT). The energy consumption is critical for the wireless sensor network (WSN), and central control would cause extremely high complexity due to the dense and dynamic deployment of sensors in the ...

8
June 2013 International Journal of Computer Applications in Technology: Volume 47 Issue 2/3, June 2013
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 3

Today, many supply chain design decisions, such as facility location, are strategic in nature and very expensive to change. However, facilities in real world are always vulnerable to partial or complete disruptions. Owing to this reason, we firstly formulate the supply chain network design problem under disruption scenarios as a ...

9
April 2013 Revised Selected Papers of PAKDD 2013 International Workshops on Trends and Applications in Knowledge Discovery and Data Mining - Volume 7867
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Dirty data is recognized as a top challenge for data mining. Textual data is one type of data that should be explored more on the topic of data quality, to ensure the discovered knowledge is of quality. In this paper, we focus on the topic of textual data quality (TDQ) ...
Keywords: Textual Data Quality, Data Mining, Data Quality, Traditional Chinese Medicine

10
September 2009 WiCOM'09: Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

The most obvious benefit from networked sensors in distributed control system is the reduction of cables, which means savings in cost and easiness in deployment and maintenance. Some current available sensor standards and protocols are complicate and cost for most industrial applications and low performance for real-time control systems. In ...
Keywords: network protocol, distributed control system, event/action model, sensor

11
May 2009 SNPD '09: Proceedings of the 2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Frequent itemsets (or frequent pattern) mining, which is the basic step during data stream mining, has been paid more and more attention by researchers. Because of the uncertainties and continuities of data stream, the time-efficiency and space-efficiency of many mining algorithms are unaccepted. In this paper, hashed table is introduced ...
Keywords: data stream, frequent itemset, D-HT, MFS-HT

12
May 2009 ISECS '09: Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security - Volume 02
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper we address the problem of mining frequent closed itemsets in a highly distributed setting. At present, many sequential algorithms have been proposed for mining frequent closed itemsets. However, very little work has been done in discovering frequent closed itemsets in distributed environment. In this paper , an ...
Keywords: frequent closed itemsets, distributed environment, global

13
April 2009 JCAI '09: Proceedings of the 2009 International Joint Conference on Artificial Intelligence
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In order to improve the supplier selection and matching supply with demand for third party logistics integrated platform, this paper proposes a three-layer evaluation index system for supply and demand matching considering factors of service areas and cooperation experiences, establishes a supply and demand matching model based on neural network. ...
Keywords: fuzzy neural network, third party logistics, integrated model, supply and demand matching

14
March 2009 ETCS '09: Proceedings of the 2009 First International Workshop on Education Technology and Computer Science - Volume 02
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Classification basing on Privacy-preserving is one of the hottest spots in the field of data mining in recent years. This paper studies how to identify suspicious financial transactions under the privacy-preserving of classification algorithm. The research is studied on multi-data that from several parts by using Scalar Product Protocol under ...
Keywords: -Money- laundering, Scalar Product Protocol, Privacy-Preserving, Decision tree

15
December 2008 The Knowledge Engineering Review: Volume 23 Issue 4, December 2008
Publisher: Cambridge University Press
Bibliometrics:
Citation Count: 4

Emotion is an important aspect of human intelligence and has been shown to play a significant role in the human decision-making process. This paper proposes a comprehensive computational model of emotions that can be incorporated into the physiological and social components of the emotions. Since interaction between characters can have ...

16
October 2008 ISCID '08: Proceedings of the 2008 International Symposium on Computational Intelligence and Design - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper we address the problem of mining frequent closed itemsets in a highly distributed setting. The extraction of distributed frequent (close) itemsets is an important task in data mining. The paper shows how frequent closed itemsets, mined independently in each site, can be merged in order to derive ...
Keywords: distributed mining, frequent closed itemsets, distributed setting

17
September 2008 CW '08: Proceedings of the 2008 International Conference on Cyberworlds
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper, a Distributed Customer Tagmeme Evaluation Model based on the multi-attributes tree Bayesian network was proposed to solve a distributed customer tagmeme evaluation problem. First, using mobile agents which could visit distributed data-sets, the multi-attributes tree and the Bayesian network were built. Then, all the distributed data-sets were ...
Keywords: Multi-attributes tree, Bayesian network, Customer tagmeme, Mobile Agent, Iteration

18
September 2008 CW '08: Proceedings of the 2008 International Conference on Cyberworlds
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The paper presents an algorithm CRMMS of classification rule mining with multi-support demand, which adopts the frequent classification item-set tree FCIST to organize the frequent pattern sets, and builds the array-based threaded transaction forest ATTF, and applies multiple supports for classification rules mining. The CRMMS uses the breath first strategy ...
Keywords: frequent pattern, rules mining, Classification rule, FCIST, ATTF

19
August 2008 ISECS '08: Proceedings of the 2008 International Symposium on Electronic Commerce and Security
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

The technology of Data Warehouse is being widely used in decision making and data analysis. Data Warehouse generalizes and consolidates multidimensional (MD) data. Hence, Data Warehouse has become an important platform for OLAP which is based on a MD data model. Therefore, dimensional modeling is a key factor in OLAP ...
Keywords: Data Warehouse, OLAP, Dimensional Modeling, farm product examination

20
August 2008 CCCM '08: Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Since the agent has characteristics of distributed, autonomous and cooperative, we present an intelligent security system based on multi-agent technology. This paper firstly describes the architecture of the system, then introduces the different tasks and duties of different type of Agents, and finally explains the system workflow. Some enterprises which ...
Keywords: Multi-Agent, Security System, Intelligence



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us