Ronghua Liang
Zhejiang University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ronghua Liang.
international conference on network computing and information security | 2011
QingZang Huang; Lei Ye; Mingyuan Yu; FuLi Wu; Ronghua Liang
Current medical image processing applications require management of huge amounts of data and executive high-performance computing. How to manage and analysis this large amount of data effectively is a major challenge. This paper shows the initial formulation of medical information integration model, it is designed to help medical workers and medical departments to share data, integrate resources and analyses data. The model using the technology of cloud computing to provide huge storage resources and powerful computing capacity. The application level of this system is on the basis of service. Hadoop cluster is the main calculation module and storage unit. MapReduce as the distributed computing technology.
wase international conference on information engineering | 2010
Qing Tian; Jianfei Mao; Bo Zheng; Ronghua Liang; Peile Zhang
The classical Mean Shift algorithm has some limitations in target tracking of gray image sequences for it only adopts the simple gray color information. We present an improved Mean Shift tracking algorithm in this paper. Our approach employs the information of gray spatial texture which is used to characterize the object in matching models calculation. Thus, the proposed algorithm can recognize the real target from a complicated background. The experiments show that improved Mean Shift tracking algorithm has higher efficiency and reliability than previous method.
Transactions on edutainment V | 2011
Jianfei Mao; Ronghua Liang; Keji Mao; Qing Tian
Visual sensor is widely used in the robotics industry for its cheapness and acquiring information-rich. In this paper we study on vision-based robot programming system and represent the system architecture including the whole framework, the hardware and software components, the visual feedback control loop structure. The relative techniques include robot vision calibration, the building of 3D graphics simulation platform and the workstation-based open robot controller. At last we demonstrate a game of robot lighting candles based on the simulation platform and a game of robot locating in real experiment, separately.
asia-pacific services computing conference | 2010
Mingyuan Yu; Li Jiang; Lei Ye; Ronghua Liang
Constructing Web service workflow faces huge challenges in the volatile, heterogeneous, distributed environment: it is necessary to consider the dynamic changes in web services, but also take into account the rapid method of modeling workflow. Comparing workflow modeling and artificial intelligence planning process, if the Web service as a planned action (or activity), then the modern AI planning and workflow modeling to integrate, so we can use AI planning technology to solve the distributed workflow modeling. This paper presents a distributed service workflow model based on user demand (DSWMoUD), which is composed of the web services organizations model, the business concept model, business logic model, user demand model, business scheduling model and business enactment model. In order to improve the retrieval efficiency of distributed service, our proposed distributed service organizations model made up of web service registration system(WSRS) and web service spanning tree (WSST), and we give a building algorithm for WSST and a business logic spanning graph algorithm. Introducing the artificial intelligence planning techniques into the distributed workflow modeling, we implement the prototype system, which is Self-Adaptive Web Contractual Computing Management System (SAWCM). Property analysis of the new model is also made, which leads to the conclusion that the DSWMoUD may be applied as an optimized approach towards efficient and effective distributed service workflow modeling.
computer science and software engineering | 2008
Mingyuan Yu; Xianping Huang; Li Jiang; Ronghua Liang
In this paper, we propose a Combined Public Key Cryptosystem based on Conic Curves (CPK-CCC) over the residue class ring without trusted third parties, assume the existence of trusted Key Management Center (KMC). The security of this scheme relies on the problem of factorizing large integer and computing discrete logarithm on conic over the residue class ring. The implementation principles of CPK-CCC scheme and its designing structure are described in details. We employs seeded secret technique combine technique for generation of userpsilas Private/Secret Key (SK) and Public Key (PK) pairs for requested users. Moreover a precise definition of the CPK-CCC cryptosystem is given. Property analysis of the new scheme is also made in comparison with that of the other cryptosystems, which leads to the conclusion that CPK-CCC cryptosystem may be applied as an optimized approach towards efficient and effective network authentication.
Archive | 2010
Yan Hu; Yaolei Lin; Jianfei Mao; Delong Zhou; Ronghua Liang
Archive | 2012
Ronghua Liang; Guodao Sun; Xianguo He; Lei Ye; Mingyuan Yu
Archive | 2010
Tinan Huang; Yinyan Wang; Mao Chen; Xianping Huang; Jianfei Mao; Fuli Wu; Li Jiang; Ronghua Liang
Archive | 2010
Ronghua Liang; Jianfei Mao; Qing Tian; Yunxiao Wang; Peile Zhang; Bo Zheng; Delong Zhou
Archive | 2011
Ronghua Liang; Qing Tian; Xiangdong Liu; Xiangyin Ma; Jianfei Mao