Search For:

Displaying 1-50 out of 215 total
Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yong Wang, Nan Zhang, Yan-mei Wu, Bin-bin Su, Yong-jian Liao
Issue Date:July 2013
pp. 134-141
With the wide deployment of wireless networks, attackers may exploit Wi-Fi network vulnerabilities to transfer data secretly, or covert communication channels to spread malicious codes. The protocol formats reverse engineering technique can be used to dete...
 
An overview of advances in vacuum electronics in China
Found in: IEEE International Vacuum Electronics Conference
By Yaogen Ding, Pukun Liu, Zhaochuan Zhang, Yong Wang
Issue Date:February 2011
pp. 525-528
The research and development of vacuum electronics and microwave vacuum elecrron devices in China started from the 1950's. During the past 50 years, many types of microwave vacuum electron devices have bee developed and applied to practical microwave elect...
 
A High-Performance Scalable Computing System on the RapidIO Interconnect Architecture
Found in: Cyber-Enabled Distributed Computing and Knowledge Discovery, International Conference on
By Yong Zhang, Yong Wang, Ping Zhang
Issue Date:October 2010
pp. 288-292
In order to meet the demanding requirements of calability, adaptability and computational capability of next-generation signal-processing system, a flexible and high performance signal-processing odule based on Serial RapidIO (SRIO) interconnect and Advanc...
 
Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems
Found in: Cognitive Informatics, IEEE International Conference on
By Zheng-Tao Jiang,Yong-Bin Wang,Yong Wang,Yu-Min Wang
Issue Date:June 2009
pp. 538-541
Interactive TV is a promising technique to realize individualized services besides traditional video broadcasting, such as VOD (Video on Demand), Email on DTV (Digital TV), E-banking. Utilizing return channel (like Internet, mobile communication), many new...
 
QGWEngine: A QoS-Aware Grid Workflow Engine
Found in: Services, IEEE Congress on
By Yong Wang, Li Wang, Guiping Dai
Issue Date:July 2008
pp. 561-566
Grid workflow can be executed based on the parameters of some newly introduced non-functional properties such as QoS to satisfy the customer expectations better. Here we propose a QoS-aware grid workflow engine called QGWEngine. First, the supported QoS pa...
 
An S-box Construction Algorithm Based on Spatiotemporal Chaos
Found in: Communications and Mobile Computing, International Conference on
By Hao Yuan, Longyan Luo, Yong Wang
Issue Date:April 2010
pp. 61-65
S-box (Substitution box) is an important component in the block cipher. In this paper, a novel algorithm for generating S-box based on spatiotemporal chaos is proposed. Firstly, the performance indices of S-box are summarized. Then, the detailed method for...
 
Design and Analysis of an X-band Low Noise Amplifier
Found in: MultiMedia and Information Technology, International Conference on
By Wang Xiao-mei, Sun Zheng-wen, Chen Yong, Wang Si-xiu
Issue Date:April 2010
pp. 278-282
This paper reviews the procedure of designing an X-band Low Noise Amplifier (LNA). Design the LNA is difficult for the radio astronomical observations, especially the realization of the simultaneous about the noise matching and the power matching, as well ...
 
A Generalized Information System Model
Found in: Genetic and Evolutionary Computing, International Conference on
By Yong Wang, Huadeng Wang
Issue Date:October 2009
pp. 154-157
The limitations of Shannon’s communication system model are analyzed when the model is used to realistic information system, and the similarities between the Shannon’s communication system model and realistic information system are pointed out, especially ...
 
A note on conditional entropy
Found in: Computer Science and Information Technology, International Conference on
By Yong Wang,Jinxiang Huang,Huadeng Wang
Issue Date:August 2009
pp. 485-487
The problems of conditional entropy's definition and the formula to compute conditional entropy are analyzed from various perspectives. Examples are given to prove the conclusion that conditional entropy never be increased is not absolute, thus the represe...
 
AOBA: Recognizing Object Behavior in Pervasive Urban Management
Found in: IEEE Transactions on Knowledge and Data Engineering
By Yongli Wang,Xiaohua Hu
Issue Date:November 2014
pp. 1-1
Accurately recognizing the object’s behavior from the uncertain sensor data is a key issue of Internet of Things application. For example, in urban management monitoring system, it is necessary to have an autonomous analyzing module that can online monitor...
 
Three-Dimensional Flow Field in a Large-scale Gas Control Valve
Found in: Electrical and Control Engineering, International Conference on
By Fang Cao, Yong Wang, Yantao An, Yudong Xie
Issue Date:June 2010
pp. 2471-2474
Three-dimensional numerical simulation and analysis of the complicated unsteady compressible turbulence flow field in a large-scale gas control valve are performed, using computational fluid dynamics method. Flow visualization of three-dimensional flow fie...
 
Analyses on Limitations of Information Theory
Found in: Artificial Intelligence and Computational Intelligence, International Conference on
By Yong Wang
Issue Date:November 2009
pp. 85-88
The paper analyzes the limitations from the angles of conditional entropy and the expression of information. It is pointed out Shannon’s definition of information is not absolute and the probability in the expression of information maybe random variable in...
 
Evaluating Protein Similarity from Coarse Structures
Found in: IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
By Chen Luonan, Ji-Hong Zhang, Ji-Hong Zhang, Ji-Hong Zhang, Wu Ling-Yun, Wu Ling-Yun, Wu Ling-Yun, Yong Wang, Yong Wang, Yong Wang, Zhang Xiang-Sun, Zhang Xiang-Sun, Zhang Xiang-Sun, Zhong-Wei Zhan, Zhong-Wei Zhan, Zhong-Wei Zhan
Issue Date:October 2009
pp. 583-593
To unscramble the relationship between protein function and protein structure, it is essential to assess the protein similarity from different aspects. Although many methods have been proposed for protein structure alignment or comparison, alternative simi...
     
Characteristic Pattern Study of Coronary Heart Disease with Qi-yin Deficiency Syndrome Based on Decision Tree
Found in: Intelligent Computation Technology and Automation, International Conference on
By Huihui Zhao, Jianxin Chen, Na Hou, Qin Hou, Peng Zhang, Jing Han, Qige Qi, Yong Wang, Juan Wang, Wei Wang
Issue Date:October 2009
pp. 150-153
Unstable angina (UA) is now a severe burden on society and family in both industrialized and developing countries, but the traditional related factors can not explain the whole situations. The effect of treatment is very limited. Determination of treatment...
 
A Cryptosystem of Low Key Authentic Degree
Found in: Genetic and Evolutionary Computing, International Conference on
By Yong Wang
Issue Date:October 2009
pp. 841-843
This paper analyzes the meaning and significance of key authentic degree of cryptosystem under the threat of the rubber-hose attack and ciphertext only attack. A novel cryptosystem of low key authentic degree is designed. The inner encryption is an extensi...
 
Grey Decision on Oil Distillation Exchangers Rebuilding Project
Found in: Computer and Automation Engineering, International Conference on
By Zhengfang Wang, Weiqiang Wang, Yong Wang, Yiyuan Cheng, Dawei Qu
Issue Date:March 2009
pp. 66-69
The exchangers on the top of distillation tower exposed to wash erosion seriously when Shengli refinery processed Middle-east crude oil. Considered the heat transfer efficiency, manufacture fee, maintenance fee, manufacture difficulty and safety in exchang...
 
Grey Prediction of Elbow Corrosion on Refinery Equipment
Found in: Computer and Automation Engineering, International Conference on
By Zhengfang Wang, Yong Wang, Weiqiang Wang, Chuanyi Lu, Chaowen Li
Issue Date:March 2009
pp. 75-78
Shengli refinery plant process Middle-east crude oil, the equipment is exposed to wash erosion seriously. The elbow on the entrance of the atmospheric distillation tower top exchangers always leak for eroding. Measured the thickness of elbow by ultrasonic ...
 
Design and Realization of Dispatcher Training Simulator Based on Web
Found in: Education Technology and Computer Science, International Workshop on
By Huang Yong, Wang Jianping, Ma Lijuan
Issue Date:March 2009
pp. 229-232
Dispatcher Training Simulator (DTS) is a computer system of digital simulation to the power system by using computers.The design and realization of the interaction function of the DTS baseded on WEB is a very important part of the DTS system.Because using ...
 
Grey Predication of Corrosion on Oil Atmospheric Distillation Equipment
Found in: Electronic Computer Technology, International Conference on
By Zhengfang Wang, Yong Wang, Weiqiang Wang, Hui Qi, Jian Zhang, Qingkun He
Issue Date:February 2009
pp. 122-125
Shengli refinery plant process Middle-east crude oil, the equipment is exposed to wash erosion seriously. The elbow on the entrance of the atmospheric distillation tower top exchangers always leak for eroding. Measured the thickness of elbow by ultrasonic ...
 
Grey Decision on Oil Distillation Tower Top Exchangers Maintenance Overhaul
Found in: Electronic Computer Technology, International Conference on
By Zhengfang Wang, Yong Wang, Weiqiang Wang, Yiyuan Cheng, Hui Qi, Dawei Qu
Issue Date:February 2009
pp. 187-190
The exchangers on the top of tower exposed to wash erosion seriously when Shengli refinery processed Middle-east crude oil. Used grey system theory, aimed at general tube-shell exchangers and helix-baffled structure, tube of 20 carbon steel with TH847 coat...
 
Tuning of the Structure and Parameters of a Neural Network Using a Good Points Set Evolutionary Strategy
Found in: Young Computer Scientists, International Conference for
By Chixin Xiao, Zixing Cai, Yong Wang, Xingbao Liu
Issue Date:November 2008
pp. 1749-1754
In this paper, a Good Points Set-evolutionary strategy (GPSES) is applied to solve the problem of tuning both network structure and parameters of a feedforward neural network. Good Point Set(GPS) is a concept in number theory. To overcome the deficiency of...
 
Cutting on Triangle Mesh: Local Model-Based Haptic Display for Dental Preparation Surgery Simulation
Found in: IEEE Transactions on Visualization and Computer Graphics
By Daniel Wang, Yuru Zhang, Yuhui Wang, Yuan-Shin Lee, Peijun Lu, Yong Wang
Issue Date:November 2005
pp. 671-683
A new method to realize stable and realistic cutting simulation using an impedance display haptic device and microcomputer is presented in this paper. Material removal or cutting simulation is a critical task in dental preparation surgery simulation. In th...
 
Visual Simulation of Wheel-Terrain Interaction of Lunar Rover Based on Creator/Vega
Found in: Information Science and Engineering, International Conference on
By Yanpeng Meng, Yong Wang, Yuan Xie, Jianliang Zhou
Issue Date:December 2009
pp. 5291-5294
Visual simulation provides a new effective approach to study the lunar rover in all aspects. Accurate wheel-terrain interaction is very critical for visual simulation of lunar rover. A lunar rover 3D model was created by Multigen Creator. With Vega as the ...
 
iDental: A Haptic-Based Dental Simulator and Its Preliminary User Evaluation
Found in: IEEE Transactions on Haptics
By Dangxiao Wang,Yuru Zhang,Jianxia Hou,Yong Wang,Peijun Lv,Yonggang Chen,Hui Zhao
Issue Date:September 2012
pp. 332-343
Performance evaluation is indispensable for a surgical simulator to become acceptable. A haptics-based dental simulator (iDental) has been developed and preliminary user evaluation on its first-generation prototype has been carried out to gain the knowledg...
 
Development of the S-band high power klystron with bandwidth of 12%
Found in: IEEE International Vacuum Electronics Conference
By Yong Wang, Jian Zhang, Ying Wang, Zhi-qiang Zhang
Issue Date:February 2011
pp. 33-34
The development of broadband high power klystron has being done in the Institute of Electronics, Chinese Academy of Sciences (IECAS), and the breakthrough of the bandwidth of klystron has been obtained continuously. In S-band, after the achievement of 10% ...
 
Design and Simulate of Mixed-Signal System
Found in: Electrical and Control Engineering, International Conference on
By Zhu-ping Wang, Shun-an Zhong, Yong-wang Ma
Issue Date:June 2010
pp. 4661-4664
Detection of separation point on the surface of delta wing is of great interest for the unmanned aerial vehicles' design and application. To obtain such information, a mixed-signal system has to be implemented. In this paper, the digital blocks of the mixe...
 
A Data Fusion Algorithm Based on Weighted Least Square for Agile Projectile's Attitude Determination
Found in: Wireless Networks and Information Systems, International Conference on
By Yong Wang, Zhide Liu, Jiabin Chen, Chunlei Song, Jun Wang
Issue Date:December 2009
pp. 154-157
In this paper, a data fusion algorithm based on weighted least square is proposed to determine the attitude of low-rotary agile projectile. Three micro electro-mechanical system (MEMS) accelerometers are used as strapdown inertial measurement units (IMUs),...
 
Information Fusion Algorithm Enhancing Information Completeness
Found in: Genetic and Evolutionary Computing, International Conference on
By Yong Wang, Huadeng Wang, Jinxiang Huang
Issue Date:October 2009
pp. 407-409
Through some examples, a new problem of the incomplete information in probability is advanced and analyzed, and the distinctness of the problem and other problems is analyzed. The algorithm to enhance completeness of information is given. The algorithm is ...
 
An Ant Colony Clustering Routing Algorithm for Wireless Sensor Networks
Found in: Genetic and Evolutionary Computing, International Conference on
By Guifeng Wang, Yong Wang, Xiaoling Tao
Issue Date:October 2009
pp. 670-673
On the basis of analyzing the Low-Energy Adaptive Clustering Hierarchy (LEACH), a clustering routing algorithm for Wireless Sensor Network (WSN) based on ant colony algorithm (ACA) is proposed in this paper. We applied the ACA to inter-cluster routing mech...
 
Molecular Cloning and Expression of Ppdc-ldhL Fusion Gene in Zymomonas Mobilis ATCC 10988
Found in: Bioinformatics, Systems Biology and Intelligent Computing, International Joint Conference on
By Nian-Fa Gao,Yong Wang,Qiang Gao,Bin-Zhe Wang,Jian Zhang,Bo-Ya Liu
Issue Date:August 2009
pp. 143-146
In this study, the 5′ terminus of ldhL gene in Lactobacillus casei ATCC 334 was fused to the 3′ terminus of pdc gene promoter (Ppdc) part in Zymomonas mobilis ATCC 10988 by recombinant PCR. The fusion gene Ppdc-ldhL was integrated in broad-host-range plasm...
 
Man-in-the-middle attack on BB84 protocol and its defence
Found in: Computer Science and Information Technology, International Conference on
By Yong Wang,Huadeng Wang,Zhaohong Li,Jinxiang Huang
Issue Date:August 2009
pp. 438-439
Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key dis...
 
A new Hierarchical Application Layer Multicast algorithm for large-scale video broadcasting
Found in: Computer Science and Information Technology, International Conference on
By Wang Yong,Wang Seng,Huang Xianying
Issue Date:August 2009
pp. 610-613
This paper proposes a new Hierarchical Application Layer Multicast (HALM) algorithm based on physical topology information of network, which is specifically designed for large-scale Video-broadcast services in Internet. The algorithm can make full use the ...
 
A Quick Map-Matching Algorithm by Using Grid-Based Selecting
Found in: Education Technology and Training & Geoscience and Remote Sensing
By Wang Zuyun, Du Yong, Wang Gang, Wu Dongdong
Issue Date:December 2008
pp. 306-311
Floating Car Data (FCD) is an important material for a broad range of application such as traffic management and control, traffic conditions computation. The traditional map-matching algorithms were more focused on the accuracy of the positioning on the ro...
 
Distributed Spatial Data Mining Based on BPEL-Service-Chains
Found in: Computer Science and Computational Technology, International Symposium on
By Yong Wang, Ting Wang
Issue Date:December 2008
pp. 495-498
The continuous increase of spatial data volumes available from many sources raises new challenges for their effective understanding. We propose an intelligent distributed geographic information service platform, which is a profitable infrastructure and has...
 
Color Segmentation and Part Model Matching for Non-rigid Objects Tracking
Found in: Computer Science and Software Engineering, International Conference on
By Yong Wang, Dianhong Wang, Wu Fang
Issue Date:December 2008
pp. 911-914
Aiming at improving the performance of non-rigid object tracking in video sequences acquired by a stationary camera, an effective method based on the adaptive color segmentation and object part model was presented. In this work, we modeled background and o...
 
A Web Service Orchestration Model Based on Concurrent Transaction Logic
Found in: Grid and Cloud Computing, International Conference on
By Yong Wang, Li Wang, Guiping Dai
Issue Date:October 2008
pp. 475-482
Web services solve the problem of inter-organization business integration and are under a distributed, dynamic, autonomic and heterogeneous environment. The correctness and verification of web service orchestration is important. Formalization is a valid me...
 
Grey Correlation Analysis of Corrosion on Oil Atmospheric Distillation Equipment
Found in: Fuzzy Systems and Knowledge Discovery, Fourth International Conference on
By Zhengfang Wang, Yong Wang, Jan Zhang, Dawei Qu, Xiuhua Liu
Issue Date:October 2008
pp. 13-17
Corrosion exacerbated on atmospheric distillation unit when Shengli plant refined high-sulfur and high-acid crude oil imported from Middle-east. Measured the corrosion pate on the top of atmospheric distillation tower with electric resistance probe and mon...
 
Design and Implementation of Parallel Lamarckian Genetic Algorithm for Automated Docking of Molecules
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Li Wang, Zi-jun Weng, Yi Liang, Yong Wang, Zheng Zhang, Rui-hua Di
Issue Date:September 2008
pp. 689-694
Molecular docking is one of the most important methods in computer assisted drug design, with the dreg activity of flexible ligands verified during docking to macromolecular targets, its use value could be determined. Because of the large quantity of ligan...
 
Color Image Quality Assessment Based on Quaternion Singular Value Decomposition
Found in: Image and Signal Processing, Congress on
By Yuqing Wang, Weiya Liu, Yong Wang
Issue Date:May 2008
pp. 433-439
An effective assessment method for color image is proposed. It is based on the quaternion description for the structural information of color image. The local variance of the luminance layer of color image is taken as the real part of a quaternion, then th...
 
Temporal and Spatial Analysis on Labor Productivity of Radio and TV Industry in China
Found in: International Workshop on Knowledge Discovery and Data Mining
By Chun Dong, Hongmei Zhang, Tao Wang, Yong Wang, Agen Qiu
Issue Date:January 2008
pp. 301-304
In order to find out the industrial characteristics and development trend of radio and TV industry in China, the developing course of this industry has been analysis from labor productivity, based on contrastive analysis and diagrammatic analysis. By compa...
 
Laplacian Regularized Least Squares Regression and its Dynamic Parameter Optimization for Near Infrared Spectroscopy Modeling
Found in: International Conference on Natural Computation
By Hui-hua Yang, Feng Qin, Yong Wang, Qiong-lin Liang, Yi-ming Wang, Guo-an Luo
Issue Date:August 2007
pp. 591-595
Partial Least Square (PLS) is the most commonly used algorithm for Near Infrared (NIR) modeling. NIR modeling features that it?s cheap, easy and fast to measure the NIR spectroscopy, while expensive, difficult and time- consuming to measure the reference v...
 
A Novel Low-IF Topology for High Performance Integrated Receivers
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Lingjun Xu, Qiang Wang, Jiansong Gao, Yong Wang, Ping Zhang
Issue Date:December 2006
pp. 559-562
As conventional low-IF (intermediate frequency) receivers have the main drawback that they are more sensitive to good mirror signal suppression, a novel low-IF receiver topology that has the ability of mirror signal suppression was proposed, and analyzed. ...
 
A QoS Negotiation Protocol for Grid Workflow
Found in: Grid and Cloud Computing, International Conference on
By Yong Wang, Li Wang, Chunming Hu
Issue Date:October 2006
pp. 195-198
Grid workflow is an important technique to implement cooperation of services in a grid. QoS allows for the selection and execution of Grid workflow to better fulfill customer expectations. Before the execution of a workflow, users need to provide the QoS r...
 
A Rule Grouping Technique for Weight-Based TCAM Coprocessors
Found in: High-Performance Interconnects, Symposium on
By Hao Che, Yong Wang, Zhijun Wang
Issue Date:August 2003
pp. 32
A crucial issue associated with a TCAM coprocessor with weights is that no more rules can be enforced if the weights are exhausted. In this paper, the problem is identified and a rule grouping technique is proposed to solve the problem. The technique allow...
 
Establishment Shot Detection Using Qualitative Motion
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Loong Fah Cheong, Yong Wang, Hee Lin Wang
Issue Date:June 2003
pp. 85
In this paper, we developed a technique to detect a special kind of shot, namely establishment shot, which is used to introduce a new scene to the audience or remind the audience of a known environment. The detection of establishment shot aids in various m...
 
A Strategy of Resource Scheduling for Grid Computing Based on QoS
Found in: Information Science and Engineering, International Conference on
By Yong Wang, Shougeng Hu, Gaifang Wang
Issue Date:December 2009
pp. 82-85
In the computational grid we need effective schedulers to minimize the makespan that are spent for the execution of the jobs. Conventional scheduling algorithms do not concern over quality of service. In this work, a job scheduling heuristic based on quali...
 
Optimum Design for Suction Chambers of Pipeline Pumps Based on Uniform Design and CFD
Found in: Information Science and Engineering, International Conference on
By Kai Wang, Hou-lin Liu, Shou-qi Yuan, Ming-gao Tan, Yong Wang, Liang Dong
Issue Date:December 2009
pp. 291-294
Based on the maximal velocity distribution uniformity, the minimal velocity-weighed average bias angle of the outlet section and the minimal hydraulic loss of the suction chamber, three optimum object functions of suction chambers of pipeline pumps are est...
 
ActorGame: Game Semantics for Actors
Found in: 2013 Fourth Global Congress on Intelligent Systems (GCIS)
By Yong Wang,Guiping Dai
Issue Date:December 2013
pp. 5-10
Game semantics is suitable to model interactions between the environment (modeled as opponent role) and the system (modeled as player role), and has gained great successes in which the behaviors of the system and the environment are explicitly distinguishe...
 
Privacy Measurement for Social Network Actor Model
Found in: 2013 International Conference on Social Computing (SocialCom)
By Yong Wang,Raj Kumar Nepali
Issue Date:September 2013
pp. 659-664
Privacy measurement is critical to evaluate privacy risks for business, public policy and legislation. However, there is a lack of effective and practical way to quantify, measure, and evaluate privacy. In this paper, we propose three privacy indexes for p...
 
A Novel Somewhat Homomorphic Encryption over Integers
Found in: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)
By Ding Yong,Wang Zheng,Li Xinguo
Issue Date:September 2013
pp. 282-284
We prove the multiple messages semantically security of the somewhat homomorphic private-key scheme presented by van Dijk et al. And convert it into a public-key scheme by using Ron Rothblum's transformation. The initial noise in the scheme is more smaller...
 
 1  2 Next >>