Xiaoli Li

Learn More
—Tool wear condition monitoring has the potential to play a critical role in ensuring the dimensional accuracy of the workpiece and prevention of damage to cutting equipment. It could also help in automating cutting processes. In this paper, the feed cutting force estimated with the aid of an inexpensive current sensor installed on the ac servomotor of a(More)
In manufacturing systems such as ¯exible manufacturing systems (FMS), one of the most important issues is accurate detection of the tool conditions under given cutting conditions. An investigation is presented of a tool condition monitoring system (TCMS), which consists of a wavelet transform preprocessor for generating features from acoustic emission (AE)(More)
—For pearls and other smooth alike lustrous jewels, the apparent shininess is one of the most important factors of beauty. This paper proposes an approach to automatic assessment of spherical surface quality in measure of shininess and smoothness using artificial vision. It traces a light ray emitted by a point source and images the resulting highlight(More)
In this paper, we formulate visual tracking as random walks on graph models with nodes representing superpixels and edges denoting relationships between superpixels. We integrate two novel graphs with the theory of Markov random walks, resulting in two Markov chains. First, an ergodic Markov chain is enforced to globally search for the candidate nodes with(More)
This paper employs wavelet spectral entropy and scale averaged wavelet power to indicate the epileptic seizures in extracranial EEG. However, we found wavelet spectral entropy and scale averaged power are the more efficiency by comparison with renorma l-ized entropy and Kullback_Leiler (K-L) relative entropy [9] to indicate the epileptic seizures based on(More)
In this paper, we propose a novel tracking framework based on discriminative supervised hashing algorithm. Different from previous methods, we treat tracking as a problem of object matching in a binary space. Using the hash functions, all target templates and candidates are mapped into compact binary codes, with which the target matching is conducted(More)