Search For:

Displaying 1-14 out of 14 total
Modeling Customers Choice Behavior in a Competitive Service Supply Chain
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Yihong Hu, Jiantong Zhang
Issue Date:November 2010
pp. 175-178
This paper studies customer's behavior in choosing services in a competitive service supply chain characterized by service congestion phenomena. Heterogenous customers choose services based on the utility maximization principle taking congestion into accou...
 
Interference Avoidance Based on Forward Modification and Multi-step-ahead Prediction for Cognitive Radio
Found in: Communications and Intelligence Information Security, International Conference on
By Jianhua Liu, YiHong Hu, ZhiYong Feng
Issue Date:October 2010
pp. 204-210
The main objective of spectrum sensing is to provide more spectrum access opportunities to cognitive radio users without interfering with the operations of the primary network. Hence, recent research has been focused on the interference avoidance problem. ...
 
An Automated On-line Traffic Flow Classification Scheme
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Jian Zhang, Zongjue Qian, Guochu Shou, Yihong Hu
Issue Date:September 2009
pp. 1181-1184
Traffic classifications based on Statistics methods and Machine Learning techniques have attracted a great deal of interest. One challenging issue is that most of supervised algorithms need traffic application information and training data sets to generate...
 
Next-Generation Passive Optical Network Based on OFDM Transmission
Found in: Information Engineering, International Conference on
By Zhihua Zheng, Zongjue Qian, Guochu Shou, Yihong Hu
Issue Date:July 2009
pp. 329-332
We investigate passive optical network (PON) based on optical orthogonal frequency division multiplexing (OFDM) transmission as a solution for next-generation optical access network. Compared with other PONs, the system improves the bandwidth efficiency an...
 
A New Handoff Scheme under EPON-WiMAX Integration Networks
Found in: Information Technology and Computer Science, International Conference on
By Pengfei Li, Guochu Shou, Yihong Hu
Issue Date:July 2009
pp. 47-50
In this paper, a novel cross-layer handoff approach is proposed based on the emerging integration of Ethernet Passive Optical Networks (EPON) and WiMAX. Users suffer long handoff latency and great loss of packets caused by the frequently movement, which is...
 
High Throughput, Pipelined Implementation of AES on FPGA
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Shanxin Qu, Guochu Shou, Yihong Hu, Zhigang Guo, Zongjue Qian
Issue Date:May 2009
pp. 542-545
The FPGA-based high throughput 128 bits AES cipher processor is proposed in this paper. We present an equivalent pipelined AES architecture working on CTR mode to provide the highest throughput up to date through inserting some registers in appropriate poi...
 
Performance Analysis of Bandwidth Allocation of Convergence of WiMAX and EPON
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Tao Tang, Guochu Shou, Yihong Hu, Zhigang Guo
Issue Date:April 2009
pp. 662-665
EPON is a high-capacity, high-speed broadband wired access technology, while the Worldwide Interoperability for Microwave Access (WiMAX) which contains the characteristics of wide coverage, low-cost, is a promising wireless access technology counterpart. T...
 
The Design and FPGA Implementation of GF(2^128) Multiplier for Ghash
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Jia Huo, Guochu Shou, Yihong Hu, Zhigang Guo
Issue Date:April 2009
pp. 554-557
In this paper, we propose a high-speed parallel 128 bit multiplier for Ghash Function in conjunction with its FPGA implementation. Through the use of Verilog the designs are evaluated by using Xilinx Vertax5 with 65nm technic and 30,000 logic cells. The hi...
 
Multi-stage Dynamic Coordination Model for Large-Scale Crowd's Activities Based on Multi-agent
Found in: Computer Science and Information Engineering, World Congress on
By Jin Li, Qinmin Wu, Daoli Zhu, Yihong Hu
Issue Date:April 2009
pp. 487-491
In order to reduce the phenomena of long time queuing and congestion in large-scale crowds’ activities, improve the visitors’ satisfaction and increase social welfare, a multi-stage dynamic coordination model for large scale crowds’ activities based on mul...
 
Security Testing for Intrusion Provention System - The Security Evaluation Practice
Found in: Computer Science and Information Engineering, World Congress on
By Yun Bai, Guochu Shou, Yihong Hu, Zhigang Guo
Issue Date:April 2009
pp. 282-285
In recent years,government,enterprise and bank network have become highly dependent on Internet.The drawback of this situation is that the consequences of disturbances of the underlying Internet may be serious as cascading effects can occur.This raised a h...
 
OCDMA over WDM System Based on Chebyshev-Map Chaotic Spread Spectrum in Passive Optical Network
Found in: Computer Science and Information Engineering, World Congress on
By Zhihua Zheng, Zongjue Qian, Guochu Shou, Yihong Hu
Issue Date:April 2009
pp. 208-211
We propose optical code division multiple access (OCDMA) over wavelength division multiplexing (WDM) in passive optical network (PON) based on Chebyshev-map chaotic spread spectrum. The system avoids the limitation of available wavelength channels and opti...
 
Weighted Network Evolution with Transfer Behavior
Found in: International Conference on Information Management, Innovation Management and Industrial Engineering
By Yihong Hu, Daoli Zhu, Nianqu Zhu
Issue Date:December 2008
pp. 532-535
This paper presents a general model of weighted networks evolution in which the structural growth and weight dynamics are both induced by transfer behavior which is an obvious and important phenomenon in technological networks and social networks, e.g. pas...
 
Study on Preliminary Performance of Algorithms for Network Traffic Identification
Found in: Computer Science and Software Engineering, International Conference on
By Yongli Ma, Zongjue Qian, Guochu Shou, Yihong Hu
Issue Date:December 2008
pp. 629-633
At present, more and more scholars paid attention to accuracy rate of internet traffic identification, but not on construction model time, test time, CPU utilization, memory consumption, and concision of models description between different algorithms. How...
 
The Co-existing Interference Analysis between TD-SCDMA and WiMAX
Found in: Computer Science and Information Engineering, World Congress on
By Yihong Hu, Guochu Shou, Zongjue Qian, Yajie Xue
Issue Date:April 2009
pp. 329-333
TD-SCDMA and WiMAX systems will coexist in a specific band because of the sprectrum planning and operating principle. It will result in the coexisting interference between these two systems. We analyze the coexisting interference between TD-SCDMA and WiMAX...
 
 1