He Dongjian
Northwest A&F University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by He Dongjian.
international forum on information technology and applications | 2010
Lu Yong; He Dongjian
Aiming at the problems of partial occlusion and background clutter in the examination room, we propose a method for behavior detection using spatial-temporal shape and flow correlation. The method first extracted training templates using interactive video cutout technique, and automatically segmented the video into 3D spatial-temporal volumes using improved Mean Shift algorithm. Then we slide the template across the video and compute the matching distance. We complement our shape-based features with flow, and efficiently match the volumetric representation of an action against over-segmented spatial-temporal video volumes. Thresholding the correlation distance and finding the peaks give us locations of potential matches. The experiment results indicate that this method achieves human’s action detection robustly in crowded, dynamic environment.
ieee international conference on information management and engineering | 2010
Jing Xu; Tang Jinglei; He Dongjian; Zan Lin-sen; Chen Lin; Niu Fang
In the paper, we analyze the features of access control of management-type SaaS. Based on the traditional RBAC, we put forward the access control model based on both tenant and role, in which the tenant is as the minimum unit of administrative domain. To be sure user identity with physical security, we put forward the hierarchical authentication and management of user in the management-type SaaS. In order to ensure the access control model of management-type SaaS in line with the reality, we abolish the inheritance right of role in the traditional RBAC. Based on the timing diagram of UML, analyzing the access control model of the cattle public administration platform based on the SaaS, we present its dynamic modeling of access control. Test and analysis is shown that the access control model based on both tenant and role can ensure the accessibility, security and privacy to access cross-domain in the management-type SaaS, and promote the popularization and application of the management-type SaaS.
information management, innovation management and industrial engineering | 2009
Jing Xu; Tang Jinglei; He Dongjian; Zhang Yang
In this paper, we proposed the potential security problem of sensitive data in management-type SaaS which have no valid evidence when service provider embezzling or responsibility confirmation in service level agreement dispute, and proposed a scheme to ensure sensitive data safety by taking advantage of encryption and signature technique. Non-credible PKG of identity-based signature mechanism is used as signature mechanism for sensitive data in the scheme. Based on non-credible PKG of identity-based signature, a double-layer PKG framework is built by using the sub-PKG of service provider and tenants according to characteristic of the security responsibility of sensitive data is supervised by both service provider and tenants which have ownership and use right of the software respectively. The symmetric cryptography which ensures confidentiality of sensitive data is employed based on balance efficiency and safety. The related questions are also discussed. Security and the feasibility analysis show that this scheme ensures the confidentiality, integrity and non-repudiation of sensitive data. It can also provide valid evidence for service level agreement dispute and impel the application and the development of management-type SaaS. The proposed scheme can be widely applied to interactive distributed system of sensitive data.
New Zealand Journal of Agricultural Research | 2007
He Dongjian; Shao Junming; Gen Nan; Yang Qinli
Abstract For integrating a visual attention mechanism and object recognition in the visual cortex we propose a novel biologically‐motivated computational model for image categorisation. We first extract the focus of attention using an image‐driven, bottom‐up attention model and then adjust it according to the principles of whole effect and centre preference. After that, we obtain the region of interest, depending on the characteristics of object spatial proximity and object similarity. Based on this we compute a set of position‐ and scale‐invariant C2 features and finally pool them into the standard classifier to achieve image categorisation. We test our model on an image database used in SIMPLIcity. The results suggest that our model can not only classify images effectively under various complex “clutters” but also that it needs only a few training samples.
Transactions of the Chinese Society of Agricultural Engineering | 2011
Pang Chao; He Dongjian; Li Changyue; Huang Chao; Zheng Lipeng
International Journal of Agricultural and Biological Engineering | 2015
Zhao Kaixuan; He Dongjian
Transactions of the Chinese Society of Agricultural Engineering | 2007
Long Mansheng; He Dongjian
Archive | 2014
Zhang Zhiyi; Geng Nan; Hu Shaojun; He Dongjian
Archive | 2013
He Dongjian; Qiao Yongliang; Tang Jinglei; Zhao Chuanyuan; Gao Zhan; Yang Kuo; Du Shuzeng
Transactions of the Chinese Society of Agricultural Engineering | 2007
Hu Shaojun; He Dongjian; Geng Nan; Guo Yahong