Search For:

Displaying 1-6 out of 6 total
An Effective Algorithm of News Topic Tracking
Found in: Intelligent Systems, WRI Global Congress on
By Xianfei Zhang, Zhigang Guo, Bicheng Li
Issue Date:May 2009
pp. 510-513
Topic tracking is to track trend of news topic, which people are interested in. It is a very pragmatic method in information retrieval. Compared with keywords retrieval, topic tracking excels in dynamic tracking based on text model and its content understa...
 
High Throughput, Pipelined Implementation of AES on FPGA
Found in: Information Engineering and Electronic Commerce, International Symposium on
By Shanxin Qu, Guochu Shou, Yihong Hu, Zhigang Guo, Zongjue Qian
Issue Date:May 2009
pp. 542-545
The FPGA-based high throughput 128 bits AES cipher processor is proposed in this paper. We present an equivalent pipelined AES architecture working on CTR mode to provide the highest throughput up to date through inserting some registers in appropriate poi...
 
Performance Analysis of Bandwidth Allocation of Convergence of WiMAX and EPON
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Tao Tang, Guochu Shou, Yihong Hu, Zhigang Guo
Issue Date:April 2009
pp. 662-665
EPON is a high-capacity, high-speed broadband wired access technology, while the Worldwide Interoperability for Microwave Access (WiMAX) which contains the characteristics of wide coverage, low-cost, is a promising wireless access technology counterpart. T...
 
The Design and FPGA Implementation of GF(2^128) Multiplier for Ghash
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Jia Huo, Guochu Shou, Yihong Hu, Zhigang Guo
Issue Date:April 2009
pp. 554-557
In this paper, we propose a high-speed parallel 128 bit multiplier for Ghash Function in conjunction with its FPGA implementation. Through the use of Verilog the designs are evaluated by using Xilinx Vertax5 with 65nm technic and 30,000 logic cells. The hi...
 
Security Testing for Intrusion Provention System - The Security Evaluation Practice
Found in: Computer Science and Information Engineering, World Congress on
By Yun Bai, Guochu Shou, Yihong Hu, Zhigang Guo
Issue Date:April 2009
pp. 282-285
In recent years,government,enterprise and bank network have become highly dependent on Internet.The drawback of this situation is that the consequences of disturbances of the underlying Internet may be serious as cascading effects can occur.This raised a h...
 
Malicious Code Detection by Taint Analysis
Found in: Multimedia Communications, International Conference on
By Zhang Zhigang,Guo Fan
Issue Date:August 2010
pp. 206-209
In general intrusion detection systems (IDS) malicious code for analyzing and processing in the network filters the data packets are in the kernel mode to capture and filter can only filter a general attack. In this paper, static blot analysis, the introdu...
 
 1