Xiangyang Zhang

Learn More
1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.06.013 ⇑ Corresponding author. Tel.: +1 613 533 6052; fa E-mail addresses: xiang@cs.queensu.ca (X. queensu.ca (H. Hassanein). 1 Tel.: +1 613 533 6000x75103; fax: +1 613 533 6 Live video streaming applications have gained great popularity among users but exert great(More)
Several push-pull hybrid peer-to-peer (P2P) video live streaming schemes introduce data-driven push trees into the pull scheme and have a short playback delay while being robust against peer churn, but the substrate Internet utilization remains unaddressed. In this paper, we propose TreeClimber, a network-driven robust push-pull scheme for large-scale P2P(More)
Antilock braking system (ABS) is a highly nonlinear system including variation and uncertainties in the parameters due to changes in vehicle loadings, road condition, etc. It is a difficult task to design an ideal controller for ABS. In this paper, a novel robust controller named fractional order sliding mode controller (FOSMC) is proposed for ABS to(More)
The enormous popularity of peer-to-peer (P2P) applications and the increased use of mobile devices make running P2P applications on mobile ad hoc networks (MANETs) natural. However, simply applying existing P2P overlay techniques, which are designed for wired networks, to MANETs is undesirable due to the differences between the two types of networks. In P2P(More)
EQ-algebras were introduced by Novák and De Baets with the intent to develop an algebraic structure of truth values for fuzzy type theory. In this paper, the notions of implicative prefilters and positive implicative prefilters in EQ-algebras are introduced and several characterizations of them are obtained. The relationship between implicative prefilters(More)
Radio Frequency IDentification (RFID) is growing prominence as an automated identification technology able to turn everyday objects into an ad-hoc network of mobile nodes; which can track, trigger events and perform actions. Energy scavenging and backscattering techniques are the foundation of low-cost identification solutions for RFIDs. The performance of(More)
The effectiveness of 3D model recognition generally depends on the feature representations and classification methods. Previous algorithms have not shown good capacities to detect 3D model's feature, thus, they seem not to be competent to recognize 3D model. Meanwhile, recent efforts have illustrated that Deep Boltzmann Machines (DBM) have great power to(More)