2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Wuhan, China April 2009

Size: px
Start display at page:

Download "2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Wuhan, China April 2009"

Transcription

1 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC) Wuhan, China April 2009 Volume 1 Pages IEEE Catalog Number: ISBN: CFP0989G-PRT

2 TABLE OF CONTENTS Modeling the Effects of Ionospheric Scintillation on Satellite to Earth Links...1 Shengbo Hu GBSB Model for MIMO Channel and Its Space-Time Correlataion Analysis in Tunnel...6 Hong-dang Zheng, Xiao-yan Nie MIMO MRT-MRC Systems with Rate Adaptive Modulation...10 Junkai Huang, Liang Yang POSTBC-OFDM with Sectorized Antenna Reception over Rapidly Time-Varying Channels...15 Liu Kewen, He Ting, Li Ping'an, Ma Zherui The Application of Wireless Sensor Network in the Irrigation Area Automatic System...19 Yan Xijun, Lu Limei, Xu Lizhong Rough Set Weighted Naïve Bayesian Classifier in Intrusion Prevention System...23 Kefei Cheng, Jianghua Luo, Cong Zhang Efficient Provably Secure Designated Verifier Signature Scheme without Random Oracle...27 Zhang Jianhong, Geng Qin Effectiveness of Preamble Based Channel Estimation for OFDM/OQAM System...32 Su Hu, Gang Wu, Gang Yang, Shaoqian Li, Bo Gao Throughput Analysis and Frame Length Adaptive for AOS Packet Service...36 Bi Mingxue, Pan Chengsheng, Zhao Yuntao Image Self-Embedding Technology Research Based on Discrete Cosine Transform...40 Che Shengbing, Che Zuguo, Huang Qiangbo, Yu Shaojun Joint Subcarrier and Power Allocation in Uplink OFDMA Systems with Incomplete Channel State Information...45 Dan Wu, Yueming Cai, Chengkang Pan Random Edge Deletion in Directed Scale-Free Graphs...50 Yun-Zhi Yan, Han-Xing Wang SPTM: A Security Protocol for Protecting the P2P Trust Information Management...54 Jianli Hu, Quanyuan Wu, Bin Zhou Energy Balancing Clustering Algorithm for Wireless Sensor Network...59 Lan-ying Li, Xiu-li Jiang, Shenghai Zhong, Lei Hu A Wireless Sensor Network for Cropland Environmental Monitoring...63 Hui Liu, Zhijun Meng, Maohua Wang On/Off Threshold Group Signature Scheme...67 Wang Xiaoming An Improved Mobile IP Scheme Based on MobiCast...72 Ming Tao, Hewei Yu Research of P-code Direct Acquisition Technology...76 Qin Yong, Zhang Bang-ning, Guo Dao-sheng, Ye Zhan The Positioning Algorithm of Two Satellites and Its Performance Analysis...81 Jizhong Li, Muqing Wu

3 An Energy-Related Routing Protocol of Minimum-Hop Layer in Wireless Sensor Networks...85 Zhang Jizan A Novel Scheme for Secure Network Coding Using One-Time Pad...90 Yan Zhang, Chengqi Xu, Feng Wang A Robust Acquisition Scheme for FH Signal in Adverse Environments...97 Chen Yading, Cheng Yufan, Li Shaoqian Research on the Link Topology Lifetime of Mobility Model in Ad Hoc Network Yao Ye, Cai Wandong, Tian Guangli CL-PKC-Based Security for Trust Data Sharing in Hybrid P2P Network Huaiqing Lin, Zhitang Li, Yejiang Zhang, Chuiwei Lu An Enhanced Multi-antenna Solution through Beamforming to 3G Long-Term Evolution Ken Long, Wei-ling Wu A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks Li Xu, Yihui Zhang The Effects of Antenna Properties on Read Distance in Passive Backscatter RFID Systems Zhijun Tang, Yigang He, Zhouguo Hou, Bing Li Invalidation Control for Scheduling of Data Broadcasting in Mobile Computing Environments Wen-bin Hu, Li Wen-jie, Fan Cun-lian, Wang Lei, Song Jia-xin, Yang Fu-qiang MSR: A Novel MPLS-Like Secure Routing Protocol for Mobile Ad Hoc Networks Qiaolin Hu, Qingyuan Huang, Biao Han, Baokang Zhao, Jinshu Su An Equalization Method for TDS-OFDM Systems over Fast Fading Channels Gong Guoqiang, Ge Wancheng A New Mobile Web Presentation with Better User Experience Yunpeng Xiao, Yang Tao, Qian Li An Iterative Multilateral Localization Algorithm Based on Time Rounds for Wireless Sensor Networks Guohui Li, Shaoping Zhang, Wei Wei, Bing Yang Analyses of MIMO UWB-IR Transceiver in Statistical Models Xu Huang Behaviors of Antenna Polarization for RSSI Location Identification Xu Huang, Mark Barralet, Dharmendra Sharma An Object Packaging Based Cache Scheme for GPRS Network Xiaohui Chen, Weidong Wang, Xiaowei Qin, Guo Wei EM-Based Channel Estimation for MIMO OFDM System Gaoping Hu, Dong Li A Novel Space-Borne Antenna Nulling Method Based on Multi-target Direction Finding Algorithm Juan Zhang, Haihong Tao, Hailang Sun A Novel Node Information Update Multicast Algorithm in Wireless Sensor Networks Zhu Yonghua, Dong Zhiling, Pan ShunHong, Wang Lu, Zhang Qian, Wu Junjie Immunity-Based Method for Anti-spam Model Jin Yang, Yi Liu, Qin Li

4 Availability Analysis Method of Multilevel Security Models with Credibility Characteristics Zhiyong Tan, Duo Liu, Jie Lin, Yiqi Dai Dependability Research of Standby System Based on Stochastic Petri Net Shixi Liu, Zhicai Xu, Guilin Chen Multi-secret Images Sharing Based on Matrix Multiplication Zhengfeng Hou, Hanjun Gao Research of Spectrum Detection Technology in Cognitive Radio Zhao Bing, Guo Lili Data Aware Clustering for Data Gathering in Wireless Sensor Networks Jie Zheng, Yugui Qu, Baohua Zhao Generalized Multicarrier Modulation with Pseudo Nonuniform Carrier Spaces Shichang Xie, Fangjiong Chen, Sam Kwong, Fei Ji The Application Research of Face Recognition in Network Certification Liying Lang, Yue Hong Research on Remediation Model and Its Realization Based on Trusted Network Jing Zhang, Yanheng Liu, Jian Wang, Xiaomin Liu More Robust Price-Based Resource Allocation Scheme on Dynamic Estimation Liu JiCheng, Guan AiHong, Xu ZhenQian, Wang ZhiXue United-of-Channel-Contention Management in IEEE e Networks Anbao Wang, Wenrong Jiang, Jian Chen Lagrange Multiplier Based Fair Resource Allocation for MIMO-OFDMA Systems Dou Ni, Fangjiong Chen, Cunmei Ji Gaussian MIMO Relay MAC Channels: Inner Bound and Power Allocation Wei Xie, ChengKang Pan Performance Analysis of IEEE DCF in Multi-hop Ad Hoc Networks Liying Xie, Hongjiang Wang, Gang Wei, Zaijin Xie Protecting Data Aggregation from Compromised Nodes in Wireless Sensor Network Fulin Hu, Jing Chen Research on Distributed and Dynamic Trust Transfer and Measurement Libo Liu, Jian Peng Steganalysis of Spread Spectrum Hiding Based on DWT and GMM Cairong Li, Wei Zeng, Haojun Ai, Ruimin Hu Design and Implementation of Hardware Fusion Technology for Super Sink Node Xianjian Xiao,Tanghuai Fan, Huibin Wang, Lizhong Xu A Classical Conditioning Model for Policy-Based Management Suping Liu, Yongsheng Ding The Effect of Execution-Time/Delay Ratio on Stability of Load Balancing Control Qingyang Meng, Su Ge, Jianzhong Qiao, Shukuan Lin The Multi-beam Transmitting Characteristic of Smart Antennas in CDMA System Xiangdong Jia, Yongqian Deng TSALS - A Centralized Scheduling and Channel Assignment Scheme in Third Generation Router Based WiMAX Mesh Network Jun Xiao, Wei Zhang, Neng Wang

5 A Spectral Method for Period Detection of PN Sequence for Weak DS-SS Signals in Dynamic Environments Tianqi Zhang, Wei Zhang, Shaosheng Dai, Guoning Ma, Qingping Jiang A Group PAKE Protocol Using Different Passwords Gang Yao, Hongji Wang, Dengguo Feng Design of N-way Dual-Frequency Power Divider Base on Genetic Algorithm Wei Wang, Wencheng Li, Dan Chen Threshold Certificate-Based Encryption: Definition and Concrete Construction Yang Lu, Jiguo Li, Junmo Xiao A New Timing Offset Estimation Method for SC-FDE Systems Lijun Sun, Lixun Huang Queuing Analysis of Self-Similar Traffic in Rayleigh Fading Channel Liu Chang, Qin Xiaowei, Zhang Sihai, Zhou Wuyang Spectral Analysis of UWB Signal Based on Combined Modulation Scheme with Time- Hopping Code Lin Zhang, Shu Wang, Taoping Zou, Zhen Qin An Architecture for Energy Efficient Image Transmission in WSNs Qin Lu, Xiangbin Ye, Liebo Du Low-Power JPEG2000 Implementation on DSP-Based Camera Node in Wireless Multimedia Sensor Networks Qin Lu, Liebo Du, Bing Hu A Traffic-Aware Adaptive Sleep Mode Operation for IEEE e Based WiMAX Jianbin Xue, Zhanting Yuan, Heiyan Chen, Aihua Zhang, Weitao Xu An Access Control Model for Trustworthy Network Fujun Feng, Chuang Lin, Junshan Li Mobility Prediction Algorithm with Differential Accuracy Requirements in Target Tracking Sensor Network Guangcheng Qin, Zemin, Wu, Chang Tian, Panlong Yang A Hybrid Method for Dynamic Local Path Planning Li Peng, Huang Xinhang, Wang Min A New High-Speed Architecture for Reed-Solomon Decoder Xun Zhou, Xu He, Liang Zhou Study of Rough Set and Clustering Algorithm in Network Security Management Zhiming Qu, Xiaoli Wang Improved Whitening Method of Linear AR Colored Noise in Stable Distribution Environments Meiying Xiong, Daifeng Zha, Jinlong Jiang An Energy Enfficiengy Cooperative Transmission Scheme in Wireless Sensor Networks Yu Zhang, Wendong Yang, Qiongli Liu, Yueming Cai Agent-Based Timing-Sync Algorithm for Sensor Networks Yingchun Shen, Hai Jin A Fast VLSI Design of SMS4 Cipher Based on Twisted BDD S-box Architecture Xuefei Bai, Li Guo, Lu Huang, Yanhua Xu Power Saving Routing Protocol with Power Sieving in Wireless Ad Hoc Networks Yi-Chao Wu, Chiu-Ching Tuan

6 Fault-Tolerant Algorithm for Distributed Primary Detection in Cognitive Radio Networks Hang Qin, Youfu Du, Jun Su A Low Noise VCO with Quadrature Prescaler for UHF RFID Reader Chunqi Shi, Runxi Zhang, Lei Chen, Ziyan Chen, Zongsheng Lai Optimization of Broadband Patch Antenna Based on Mind Evolutionary Algorithm Jianxia Liu, Yongqing Yang, Nan Li, Keming Xie An Improved Colour Image Encryption Based on Chaotic Map and OCML Model Jun He, Jun Zheng, Zhi-bin Li, Haifeng Qian An Adjustable Fine-Grain Cache Assignment Scheduling Algorithm Based on Multi-core Architecture Benhai Zhou, Jianzhong Qiao, Shukuan Lin, Jun Liu, Bo Liu An Independent Component Analysis Based Multiuser MIMO Downlink Transmission Scheme Zhao Li, Jiawei Yang, Junliang Yao, Ting Chen An Investigation of Maximizing System Performance in Wireless Sensor Networks Rui Yang, Tiande Guo, Ge Chen Research and Realization on Real-Time Interaction in m-learning Liu Sanya, Qiu Xiangkai Robust Adaptive Beamforming for Cyclostationary Signals in Spectrum Detection of Cognitive Radios Xiaolong Ma, Guican Chen Location-Based Skyline Queries in Wireless Sensor Networks Hailan Shen, Zhigang Chen, Xiaoheng Deng Research on Behavior Trust Based on Trustworthy Distributed System Ming He, Aiqun Hu, Hangping Qiu Fuzzy Comprehensive Evaluation of Software Dependability with Rough Set Theory Based Combinational Weight Cao Yang, Li Bo Performance of Secondary Access in the Spectrum Sharing System with Call Admission Control Strategy Xueyuan Jiang, Zhiyuan Shi, Wumei Wang, Lianfen Huang A Novel Approach to Detect IRC-Based Botnets Wei Wang, Binxing Fang, Zhaoxin Zhang, Chao Li The Reciprocity Characteristic of Smart Antennas in CDMA System Xiangdong Jia, Haibao Ding A Novel Positioning Algorithm with Pseudo Range and Carrier Phase Based on Kalman Filter Wenfei Gong, Jiaqi Li, Jianxi Yang A Virtual Collision Solution Scheme Based on Optimal Window for WLAN Junming Guan, Yang Lu, Kai Xie, Feng Sheng, Fei Yang Performance Bound Analysis of Variable Gain Relaying over Non-identical Nakagami-m Fading Channel Fang Liu, Dacheng Yang, Zhe Chen, Xin Zhang, Yafeng Wang A Novel Time Interval Routing Protocol in Delay Tolerant Networks Hui-mei Lu, Lei Yin, Wei He, Yuan-da Cao

7 NetViewer: A Visualization Tool for Network Security Events Zhang Jiawan, Yang Peng, Lu Liangfu, Chen Lei Dynamic Service Negotiation for Ensuring the Quality of Experience in Next Wireless Communication Network Yu Du, Wenan Zhou, Jun-de Sonf Utility-Based Resource Dynamic Allocation for Mixed Traffic in Wireless Networks Jincheng Nie, Xiaohui Chen, Weidong Wang Energy Minimization for Broadcasting Message in Wireless Sensor Networks Min Xiang, Xiaohui Zhang, Zhiyong Luo, Yang Xu Quasi-orthogonal Space-Time Block Codes for Four Antenna Lei Liu, Hongzhi Zhang, Kuanquan Wang, Wangmeng Zuo A Fair Multi-priority MAC Protocol Design of Wireless Sensor Networks Hongjun Li, Xun Li, Shen Jie, Hongxu Ma A New Multi-metric QoS Routing Protocol in Wireless Mesh Network Hao Zhou, Chuanhe Huang, Yong Cheng, Gang Wang Dynamic Behavior Measurement Based on Interactive Markov Chain Xing Zhang, Chen Li, Ruihua Li Session Hijack in the Great Firewall of China Sheng Pang, Changjia Chen, Jinkang Jia Joint Source-Channel Decoding of Variable-Length Encoded Markov Multiple Sources Weiwei Xiang, Yan Zou, Peizhong Lu Topology Optimization for Target Localization in Wireless Sensor Networks Chao Yang, Lijun Chen, Daoxu Chen, Li Xie Memory Efficient Parallel Bloom Filters for String Matching Yun-Zhao Li A Comparison of SCR and Active-Set Methods for PAPR Reduction in OFDM Systems Qihui Liang, Qingsong Wen, Yue Xiao, Shaoqian Li Performance Analysis of a Scheme Combined STBC with Beamforming in Spatial Correlated Channel Jianxin Guan, Xiaohui Ye, Bijun Zhang Realization of Electronic Official Seal System Based on WORD Guo Li, Jinmei Zang A Distributed Localization System Based on Phase Measurement for Wireless Sensor Networks Chen Wang, Wei Han, Qinye Yin, Wenjie Wang, Jie Chen Blind Detection and Parameter Estimation Algorithm Based on Atomic Decomposition and Information Theoretic Criterion Haining Fan, Ying Guo, Qingwei Meng A Novel Low-Complexity Weight Based Power Allocation Scheme for Distributed OSTBC System Xingzai Lv, Jinkang Zhu Design of a Quadrature Differential Chaotic Phase Shift Keying Communication System Songsheng Zhu, Yinlin Xu, Kuixi Yin User Oriented Modeling and Simulation in LEO Satellite Networks Shaodong Feng, Jiafu He, Yongqiang Li, Guangxia Li

8 A Network Misuse Detection Mechanism Based on Traffic Log Yahui Yang, Chunfang Huang, Zhijing Qin Propagation Character of Electromagnetic Wave of the Different Transmitter Position in Mine Tunnel Xiaobing Han, Shuqi Wang, Tao Fang, Zhitong Guo A RFID Network Planning Method Based on Genetic Algorithm Yahui Yang, Yujie Wu, Min Xia, Zhijing Qin Clustering Approach for Wireless Sensor Networks Using Spatial Data Correlation and Ant-Colony Optimization Chongqing Zhang, Qiang Xu Feature Optimization Based on Artificial Fish-Swarm Algorithm in Intrusion Detections Tao Liu, Ai-ling Qi, Yuan-bin Hou, Xin-tan Chang Investigating the Optimum Carrier Sensing Range in Wireless Ad Hoc Networks Chongqing Zhang, Qiang Xu Tree-Based RFID Yoking Proof Hung-Yu Chien, Shih-Bin Liu The Design and FPGA Implementation of GF(2 128 ) Multiplier for Ghash Jia Huo, Guochu Shou, Yihong Hu, Zhigang Guo The Research on Routing Protocol of Sense Wireless Network Based on the Greedy Algorithm Yuan Xin, Xu Guang-hua, Chen Xiao-jun High-Dimensional Packet Classification Algorithm Research and Application in MAC QoS System of Access Network Lihua Song, Peiya Li The Research and Design of High Reliability Routing Protocol of Wireless Sensor Network in Coal Mine Dong Jiang, Qianping Wang, Yan Zhao, Ke Wang A Wireless Design of Low-Cost Irrigation System Using ZigBee Technology Yiming Zhou, Xianglong Yang, Liren Wang, Yibin Ying Joint Source Channel Soft Decoding Using Dynamic Redundancy Detection Weiwei Xiang, Peizhong Lu MSTG: A Multi-service Traffic Generator for Testing Next Generation Wireless Broadband Communication Systems Liyang Yu, Xinli Huang, Fenghua You, Wei Zhang Against Code Injection with System Call Randomization Zhaohui Liang, Bin Liang, Luping Li, Wei Chen, Qingqing Kang, Yingqin Gu An Improved Hierarchical AODV Routing Protocol for Hybrid Wireless Mesh Network Pei Tingrui, Zeng Wenli, Zhang Zhaoxiao, Peng Tao An Intra-cluster Routing Protocol IHMDA Cheng Li, Chen Bing Locating Internet Congestion: Model and Algorithm Ye-kui Qian, Ming Chen, Yu-ming Zhou Actively Measuring Bots in Peer-to-Peer Networks Binbin Wang, Zhitang Li, Hao Tu, Zhengbing Hu, Jun Hu A Fuzzy Logic-Based Trust Model in Grid Hongmei Liao, Qianping Wang, Guoxin Li

9 Formally Analyzing Software Vulnerability Based on Model Checking Wang Chunlei, Huang Minhuan, He Ronghui Application of Boolean Kernel Function SVM in Face Recognition Kebin Cui, Yingshuag Du A Digital Adaptive Predistortion Method of OFDM Power Amplifier Wei Jian, Chongxiu Yu, Jianxin Wang, Jianguo Yu, Lin Wang Two Scalable Analyses of Compact Attack Graphs for Defending Network Security Feng Chen, Ri Tu, Yi Zhang, Jinshu Su Study of Fast Clustering Algorithm Based on Foregone Samples in Intrusion Detections Tao Liu, Yuan-bin Hou, Ai-ling Qi, Xin-tan Chang Application of Bridge Function Sequences in Passive Beamformer Sheng Hong, Huagang Xiong, Kefei Liu, Qing Chang, Qishan Zhang, Yongqiang Liu, Xiaoxiang He, Manos M. Tentzeris A Sequence Encoding Scheme for Multi-match Packet Classification Xia Deng, Zhiping Huang, Shaojing Su, Chunwu Liu, Guilin Tang, Yimeng Zhang Network Performance Analysis of VPN Protocols: An Empirical Comparison on Different Operating Systems Shaneel Narayan, Kris Brooking, Simon de_vere An Novel Energy-Efficient Dynamic Target Tracking Protocol for Wireless Sensor Networks Ming Zhang, Cheng Long Gong, Yuan Feng, Yanhong Lu Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu Shaneel Narayan, Peng Shang, Na Fan Energy Consumption & Lifetime Analysis in Cluster-Based Wireless Sensor Networks for Periodic Monitoring Applications Abdul Sattar Malik, Jingming Kuang, Jiakang Liu, Wang Chong Performance Analysis of Bandwidth Allocation of Convergence of WiMAX and EPON Tao Tang, Guochu Shou, Yihong Hu, Zhigang Guo A Dynamic Adaptive Routing Protocol for Heterogeneous Wireless Sensor Network Luqun Li, Minle Zuo A Range Query Model Based on DHT in P2P System Wang Dan, Li Maozeng A Novel Call Admission Control Routing Mechanism Using Bloom Filter in MANET Ding Yi Impact of HTTP Compression on Web Response Time in Asymmetrical Wireless Network Xiaohui Chen, Weidong Wang, Guo Wei Modeling for Mobile Communication Fading Channel Based on Regression Support Vector Machine Jingwen Tian, Meijuan Gao, Shiru Zhou Detecting New P2P Botnet with Multi-chart CUSUM Jian Kang, Jun-Yao Zhang, Qiang Li, Zhuo Li A Stable Hierarchical Peer-to-Peer Overlay for Scale Free Networks Wen-xiang Li, Cheng-cheng Guo The Upper and Lower Bound of Distributed Cooperative Communication Changsong Xia, Weijun Cheng, Bocheng Zhu

10 A Role-Based Access Control Architecture for P2P File-Sharing Systems Using Primary/Backup Strategy Jianfeng Lu, Ruixuan Li, Zhengding Lu, Xiaopu Ma An Identity Privacy Enhanced Trust Model in Fully Distributed Virtual Computing Environments Yunzhao Wei, Yanxiang He, Liming Hao Adaptive-Frame-Based Dynamic Slot Assignment Protocol for Tactical Data Link System Wang Wen-Zheng, Luo Peng-Cheng, Ren Pei, Zhou Jing-Lun A New Method to Reduce the PAPR in the IRA-OFDM System Xiaosong Wang, Guiran Chang Improvement on APIT Localization Algorithms for Wireless Sensor Networks Ji zeng Wang, Hongxu Jin A Simple Iterative Carrier Frequency Estimation Algorithm Hua Xu, Dongmei Zhang C-MAC: A TDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks Yutao Ma, Zhongwen Guo, Yuan Feng, Mingxing Jiang, Guanglei Feng A Probabilistic Drop Scheme for Mitigating SYN Flooding Attacks Yu Ming An Improved LS Time Domain Channel Estimation Algorithm Based on MIMO-OFDM System Qian Zhao, Zhaohua Zeng Design of Node Power Management in WSN Based on Ant Colony Algorithm Li Hongsheng, Liu Sumin, Hu Bing Analyzing on Impact Factors of Safety Stock under Random Requirement Zhang Lianfu, Zhao Shuzhi, Wang Min, Zhang Zhihui, Zhu Yonggang The Variances of VaR for the Poisson-Gumbel Compound Extreme Value Distribution and for the Poisson-Generalized Pareto Compound Peaks over Threshold Distribution Yueli Han, Daoji Shi The Frequency Offset Estimation and Tracking in MIMO-OFDM BASED n System Yi Yong, Jian Haifang, Fang Zhi, Shi Yin Information Exchange in the Process of Establishing on Base Station Cooperation Jiang Weilin, Zhang Zhongzhao, Sha Xuejun, Sun Linan Containing Proactive P2P Worm Based on its Multicast Characteristic Zhitang Li, Yejiang Zhang, Zhengbing Hu, Huaiqing Lin, Chuiwei Lu The Research of Bluetooth Wireless Communication Network in NC System Kunqi Wang, Peng Wang, Yanan Wang Location-Aware and Secret Share Based Dynamic Key Management Scheme for Wireless Sensor Networks Chunguang Ma, Guining Geng, Huiqiang Wang, Guang Yang Measuring and Modeling Message-Level Characteristics of BitTorrent Feng Liu, Zhitang Li, Lihui Huang Research on Auto Extraction of Interested Region in Fire Image Compression Yongchun Zhang, Yudong Guan, Xiao Xu, Yan Li, Ti Han Application of the Fuzzy Semantic Distance Model and Algorithms for Transporter Selection Problem Lin Qiang, Xu Wenting

11 Design and Analysis of VCO in PLL System Wu Xiu-long, Chen Jun-ning, Meng Jian Design of CMOS Variable Gain Amplifier for DTV Tuners Shuping Yu, Yunfei Ye A DNA Algorithm of a Kind of Circular Forbidden Permutation Problem Lei Wang, Yu-xing Yang, Ai-min Wang, Ji-lan Ma The Impact of B2C Website Design Features on Consumers Purchase Intention Chang Yaping, Han Dan, Yan Jun Coordinate Control Modeling among Enterprises in B2B EC Based on CBR ShiBin Su, ZhenYu Liu, ZhengBing Hu A Modified MRSVP Scheme Based on Motion Prediction Fu Lin, DengYi Zhang, WenBin Hu, WenHai Li Design and Application of Wirless Sensor Network Web Server Based on S3C2410 and Zigbee Protocol Jiang Yongping, Feng Zehao, Xu Du A Novel DOA Algorithm for CDMA System Zhenzhe Peng, Fangjie Wan DOA Estimation Algorithm Based on Cumulant for CDMA System Zhenzhe Peng, Youquan Mo, Maoliang Chen Impact of Security on QoS in Communication Network Jianyong Chen, Cunying Hu, Huawang Zeng, Jun Zhang Distributed Guarding and Alarming System Based on Telephone Automatical Dialing and Remote Communication Technology Yu Chen A Hybrid QR and PIC Detection Scheme Based on MIMO-OFDM Systems Zhongpeng Wang A New Algorithm to Testing Departure from Gaussianity of Stationary Process Based on Trispectrum Yongpeng Wu Semantic Access Control for Web Services Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang An Empirical Analysis of Online Consumer Initial Trust Building Based on ELM Tao Zhou, Yanjun Sun Impossible Differential Cryptanalysis of SNAKE Bing Sun, Longjiang Qu, Chao Li An Information Security Model Based on Reputation and Integrality of P2P Network Yihe Liu Study the Logic Invariability in Subroutine's Junk Code Fuzzy Transformation Guo-Zi Sun, Bao-Bing Wang, Dan-Wei Chen, Qiang Cai A Spanning Subtree Based Event-Triggered Time Synchronization Algorithm for Sensor Networks Nuo Wei, Qiang Guo, Ruixia Liu, Jialiang Lv A Distributed Energy-Efficient and Delay-Aware Data Gathering Protocol for Wireless Sensor Networks Zuzhi Fan

12 The Research on Access Control for Bi-directional Multicast Routing Zhikuan Sun, Shiwei Lin An Adaptive Load Balanced on Demand Routing Protocol Hao Jutao, Chen Qingkui, Huo Huan, Zhao JingJing Ad Hoc Wireless Network to Support QoS in an Industrial Work Environment: Power Management Long Zhao-Hua, Luo Jiang Hidden Markov Model Based Real Time Network Security Quantification Method Weiming Li, Zhengbiao Guo Minimum Mutual Information Criteria for Convolutive Blind Source Separation Zhang Yan-liang, Li Bao-ping, Guo Hui Shortest Path Routing Protocol for Multi-layer Mobile Wireless Sensor Networks Zhi-feng Duan, Fan Guo, Ming-xing Deng, Min Yu An Encryption Algorithm Based on Transformed Logistic Map Jianquan Xie, Chunhua Yang, Qing Xie, Lijun Tian Improved Block Soft Feedback Equalization Based on Sequence Detection Xiaotao Deng, Jun Gao, Gaoqi Dou Hybrid Protocol for Password-Based Key Exchange in Three-party Setting He Xinzheng, Ru Bei, Fei Jinlong, Xun Baocheng Implementation of QKD in Networks Xu Huang, Shirantha Wijesekera, Dharmendra Sharma Analysis of Packet Interference and Aggregated Throughput of Bluetooth Piconets Niu Yufeng, Zhuang Yiqi, Chen Naikuo The Maneuverable Single Based Station Position Method in the Non-Line-of-Sight Cellular Environment Yang Tianchi, Jin Liang A MIH Based Architecture for WiMAX and TD-SCDMA Interworking Yuan Jinsha, Bo Cui A New Method for Constructing Families of Perfect Periodic Complementary Binary Sequences Pairs Jin Hui-long, Xu Cheng-qian, Zhang Jin-bo, Chen Jia-xing An Energy-Aware Relay Selection Algorithm Based on Fuzzy Comprehensive Evaluation Wendong Yang, Yueming Cai, Youyun Xu Tamper Discrimination in RFID Tags Using Chaotic Fragile Watermark Ming-Quan Fan, Hong-Xia Wang An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure Runhua Shi, Liusheng Huang, Wei Yang, Hong Zhong A New Handover Arithmetic of Air-to-Ground Data Communication Over-section Networking Jing-bo Xia, Ming-hui Li, Lu-jun Wan, Huan-bin Wang Research on Mandatory Access Control Model for Application System Lu Xu, Hongqi Zhang, Xuehui Du, Chao Wang Research on Policy-based Access Control Model Lin Zhi, Wang Jing, Chen Xiao-su, Jia Lian-xing

13 A Novel Method of Breadth-first Searches with AI-Properties of VCN Qiu-Sun Ye A State-Adaptive Access Control Model for Web-Based IDRS System Xinsong Wu, Yeping He, Zhouyi Zhou Environment Monitoring System of Household Security Robot Based on Wireless Mesh Network WenJieTian, Yu Geng Study on Fraud Risk Prevention of Online Banks Qinghua Zhang A Dynamic Scheduling Model for Real-Time Tasks in Reliable System Zhang Jie, Yang Fumin, Tu Gang Research and FPGA Implementation of MUSIC DOA of Smart Antenna Array Song Wen-miao, Zhang Jing-ying Fault Tolerance and Transmission Delay in Wireless Mesh Networks Zhang Lili, Wang Huibin, Xu Lizhong, Xu Zhuoming, Li Chenming MANET Routing Protocol for Improving Routing Discovery Based on AODV Zhang Jianwu, Zou Jingyuan, Zhao Qi Security Difference between DSA and Schnorr's Signature Zhengjun Cao, Olivier Markowitch The CDMA/TDMA Reform Scheme of WCDMA HSDPA Xiangdong Jia, Haiyang Fu Application of Comprehensive Fuzzy Evaluation in LAN Security Zhiming Qu, Xiaoli Wang Application Research on Primary Components Analysis in Assessing Influential Factors of Campus Network Security Zhiming Qu, Xiaoli Wang The Design of Retrodirective Array in Wireless Sensor Networks Ling Chen, Shu Yan Medical Image Testing Based on Fractal Spectrum Theory Shuxia Han, Dawei Qi, Lei Yu A Flow Control Mechanism in Video-on-demand Based on Client Buffer State Hongguang Suo,Yatao Duan A Strong Key Pre-distribution Scheme for Wireless Sensor Networks Jianmin Zhang, Jian Li, Xiande Liu A Time-decay Based P2P Trust Model Yong Zhang, Kewen Wang, Keqiu Li, Wenyu Qu, Yang Xiang Automatic Identification Method of Link4A Bin-gang Zhu, Shi-rui Peng, Yuan-wei Su, Tang Tang The Square Attack of Reduced-Round Camellia Xiaoli Yu, Hongru Wei The Research of Intrusion Detection Technology Based on Genetic Algorithms Chen Zhongmin, Xu Sheng, Feng Jianyuan, Xu Renzuo How Trade Partners Make Their Decision in Cyberspace: A Research Based on Stochastic Games Shouming Chen, Bin Zhang

14 An Interference-Aware Power Control Scheme in Wireless Mesh Networks Shuqiang Huang, Qi-lun Zheng Flexible Authorizations with Logic Program Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP Zhe Chen, Shize Guo, Kangfeng Zheng, Haitao Li The Research of One Self-Adapt Wireless Sensor Network Rate Flow Control Wenguang Song, Qiongqin Jiang, Tianyan Li The Impact of Customer-Based E-tail Brand Equity on Web-market Outcomes Hui Guan, Jing Ma A Novel Mobile IP Protocol Supporting Roaming Subnet Hongyan Qian, Bing Chen, Xiao-lin Qin Distributed Intelligent City Street Lamp Monitoring and Control System Based on Wireless Communication chip nrf Yu Chen, Zhaoyu Liu Vulnerability Analysis of Intelligent Network System Danfeng Yan, Fangchun Yang A Multiuser Detection Based on Multi-Objectives Optimization-Genetic Algorithm Hongwu Liu, Gaojun Song The Research of Cross-layer Design between the PHY and MAC Layer for OFDM-Based Cognitive Radio Network Yi Peng, Zengli Liu, Hua Long, Jie Peng Initialization Method of Gene Library Based on Teiresias Algorithm Duan You-xiang, Huang Min, Xu Jiuyun An Adaptive Transmit Antenna Selection and Power Allocation Scheme for V-BLAST System under Imperfect Channel State Information Xiao-min Chen, Da-zhuan Xu, Xiang-bin Yu, Qiu-ming Zhu Verifying a Secure Session Protocol for Web Services Ye Xiaolie, Liao Lejian Static Vulnerabilities Detection Based on Extended Vulnerability State Machine Model Bin Liang Node Placement in Wireless Sensor Network to Achieve Biconnectivity Yinghua Zhou, Xuemei Cai The Study of Trustworthy Software Process Improvement Model Benhai Yu, Qing Wang, Ye Yang A New Efficient Hierarchical Key Agreement Scheme Xia Jingbo, Yu Rongwei, Ai Xiaochuan The STBC Technology of Tiny Area and Slight Small Area Applies in Ad Hoc Networks Guojin Liu, Zhenyu Hu, Yanfang Zha, Kuixi Yin Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology Qinghua Xu, Jinyu Jiang, Xianbiao Wang A New Security Mechanism for SIP-Based VoIP over WMNs Hui Lin, Li Xu, Jianliang Gao

15 Design of Data Transmission System with Coded 8CPFSK Modulation Wen Ma Qualitative and Quantitative Analysis of Information Leakage in Java Source Code Bo Chen, Da-wei Xu, Ling Yu Cognitive Radio: Methods for the Detection of Free Bands Jian Zheng, Chao-hui Chen, Jun-yong Cheng, Lei Shi The Measurement of the Search Charts of Music Yue Yang, Changjia Chen, Yishuai Chen A Verifier-Based Key Exchange Protocol in Cross-Realm Setting Lui Xiumei, Zhou Fu-cai, Chang Gui-ran Efficient Secure Message Routing for Structured Peer-to-Peer Systems Xu Xiang, Tan Jin Linking Generation Rate Based on Gauss-Markov Mobility Model for Mobile Ad Hoc Networks Demin Li, Jie Zhou, Jiacun Wang, Peng Yu A Fair Revenue-Weighted CAC Scheme Based on Ant Colony Algorithm under WiMAX Environment Yang Hongbin, Li Chen, Wu Yue Optimization Design of Coal Mine Wireless Body Sensor Network Based on Genetic Algorithm Ma Yong, Yan Yu, Wang Yan, Liaoning Huludao, Li Gang, Lin Ling A Service Selection Method Based on Constraints in a Lighting Control System Pan Deng, Feng Chen, Xiaohui Rong, Peng Jiang, Wen Jin Remote Attestation for Custom-built Software Ce Meng, Yeping He, Qian Zhang Channel Calibration of Amplitude-Phase Errors of DBF Transmitter Based on Maximum Likelihood Estimation Gu Jinghua, Liang Guang, Gong Wenbin, Yu Jinpei Detection of Programs Behaviors on Context Dependency Pang Jianjing, Peng Xinguang Research on Information Security in Modern Network Ning Zhang, Hong Bao TAGPP: A Tiny Aggregation Algorithm with Preprocessing in Local Cluster Yang Xiao-fei, Wu Xiao-bei, Huang Jin-an An Energy-Efficient AES-CCM Implementation for IEEE Wireless Sensor Networks Lian Huai, Xuecheng Zou, Zhenglin Liu, Yu Han An Aspectual Connector Model and Its ADL Duan Wang, Furong Li, Zhigang Jia Efficient Pairing Computation Based on Comb Method Bao-hua Zhang, Xin-chun Yin Self-Honesty in Strand Spaces Model Zhao Huawei, Liu Lizheng Fast Restoration Algorithm for Generatrix Voltage Loss of Distribution Network in the Malfunction State Zhen-hong Yang, Chuang-ye Yang

16 Hierarchical Routing for Large Scale Bluetooth Network Xiang Li, Chaoguang Men, Mantian Li, Lining Sun Research on the Digital Carrier Tracking Technique for High Dynamic Spread Spectrum Receiver Wenmiao Song, Jingying Zhang, Hanbai Fan Evaluation Method for the Network Reliability Based on the Entropy Measures Yu Jiang, Aiqun Hu, Ming He Windows Platform Based Research and Implement Data Variation Monitor Youqing Xu, Yongming Xu, Tao Xia The Key and IV Setup of the Stream Ciphers HC-256 and HC Yunyi Liu, Tuanfa Qin The Risks of Network Virtual Assets and its Measurements Hui Peng, Linyu Niu Solving the Discrete Logarithm Problem Using P Systems Ma Xiaojing, Li Zhitang, Tu Hao A Timesaving Recursive Flow Packet Classification Algorithm Yuke Pan, Bing Chen,Tao Xu Privacy Preserving C4.5 Algorithm over Vertically Distributed Datasets Yanguang Shen, Hui Shao, Li Yang Transmit Antenna Selection for the Distributed MIMO Systems Peng Shang, Guangxi Zhu, Li Tan, Gang Su, Tan Li The Mobile ECG Telemonitoring System Based on GPRS and GPS Jun Zhang, ZhenGrong Lu A QoS Mechanism for CM in HFC Network Lihua Song, Peiya Li, Yan Zhang Research on Network Attack-Defense Simulation Training Platform Zhi Wei Lin, Gang Chen Energy-aware AODV Routing for Ad Hoc Networks Cao Jianglian, Zhang Zhaoxiao, Zeng Wenli, Pei Tingrui Energy-Efficient Multi-hop Hierarchical Routing Protocol for Wireless Sensor Networks Wen-Wen Huang, Ya-Li Peng, Jian Wen, Min Yu A Trustworthy Next Generation Internet Protocol Model Yong-Min Liu, Xin-Hua Jiang, Xiao-Hong Nian, Wu-Yi Lu, Sheng-Yue Yang A Security Protocol for Mobile E-service Oriented Architecture (MSOA): Design and Implementation Mingjun Xin, Zhangwei Huang, Quan Qian P2P-based E-commerce Trust Model and Strategies Chen Xin Modeling Distributed Multi-Granularity P2P Traffic Identifying and Controlling System Wang Jinsong, Wang Zhengxu, Liu Tao, Liu Fan Research on Immune Based Adaptive Intrusion Detection System Model Lei Deng, De-yuan Gao A Novel Design of Mobile IM System with Network Management Yunxiang Gao, Chuangbai Xiao, Chaoqin Gao, Huiguang Chen

17 Design of Sight Spot Ticket Management System Based on RFID Bo Yan, Danyu Lee Spray and Wait Routing Based on Average Delivery Probability in Delay Tolerant Network Jingfeng Xue, Xiumei Fan, Yuanda Cao, Ji Fang, Jiansheng Li Study on Security Management Architecture for Sensor Network Based on Intrusion Detection Xi Peng, Zheng Wu, Debao Xiao, Yang Yu Adaptively Secure On-line/Off-line Threshold Signatures Chong-zhi Gao, Chunming Tang, Zheng-an Yao, Dongqing Xie A New Anonymous Conference Authentication Scheme Based on Knapsack Problem Bin Wang, Yun-fei Guo, Jia Zhou, Jian-hui Zhang An Organization-Structure Oriented Access Control Policy and its Formal Description Xiaolong Zhao, Yusen Zhang, Yingxun Zhu An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks Hua Sun, Xuefeng Zheng, Zhongjun Deng QoS-Guaranteed Algorithm for Composed Service Path Selection in the SON Yan-mei Zhang, Zhen-wei Yu, Huai-hu Cao Short-Term Load Forecasting Based on the BKF-SVM Kebin Cui,Yingshuang Du Design and Implementation of an E-card System Based on a Variety of Network Access Ning Li, Lingyan Bi, Zewei Feng, Haobin Zhong A Study of Anti-phishing Strategies Based on TRIZ Ming Qi, Chang-Yi Zou A Trust Model for Heterogeneous Trusted Computing Architectures Lu Zhu, Sheng Yu, Xing Zhang Binary Zero Correlation Zone Sequence Pair Set Constructed from Difference Set Pairs Kai Liu, Chengqian Xu, Gang Li A Solution for Whitewashing in P2P Systems Based on Observation Preorder Jianguo Chen, Huijuan Lu, Stefan D. Bruda Model Checking Needham-Schroeder Security Protocol Based on Temporal Logic of Knowledge Xiangyu Luo, Yan Chen, Ming Gu, Lijun Wu On-Demand Multimedia Broadcast for Asymmetric Wireless Communication Tengyue Zou, Huiyou Chang, Qing Wang Research of Secure Multicast Key Management Protocol Based on Fault-Tolerant Mechanism Guangwei Liu, Jian Xu, Mengmeng Cao, Fucai Zhou, Bin Zhang Topology and Routing Schemes for Fault-Tolerant Clos Network Xinming Duan, Dakun Zhang, Xuemei Sun Immune Mechanism Based Intrusion Detection Systems Lu Hong Routing Schemes of an Irregular Mesh-Based NoC Xinming Duan, Dakun Zhang, Xuemei Sun

18 Modeling and Performance Analysis on a Delay Tolerant Differentiated Wireless Sensor Web Service Framework Luqun Li, Jian Sun The Influence of Knowledge Sharing in Virtual Communities on Consumers' Brand Trust: An Empirical Study Dong-hong Zhu, Ya-ping Chang Design of Wireless Video Communication System Used to Monitor and Control Plant Disease Xiuqing Wang, Chunxia Zhang, Shifeng Yang A Protocol Model for Wireless Sensor Network Yong-Min Liu, Xin-Hua Jiang Artificial Intelligent Information Retrieval Using Assigning Context of Documents Yong-Min Liu, Shu Cheng Application of Wavelet Packet in Defect Recognition of Optical Fiber Fusion Based on ISO Zhen Zhang, Jun-jie Xi An Intrusion Detection Method Based on Outlier Ensemble Detection Bin Huang, Wen-fang Li, De-li Chen, Liang Shi Security Management System for Oilfield Based on Embedded Wireless Communication Jiang Wei, Tian Jingwen, Cao Liting Two-Stage Blind Multiuser Detection for Ultra Wideband in a Realistic Indoor Channel Zhengqiang Wang, Ling-yuan Li, Lixin Song Pattern Recognition System of Optical Fiber Fusion Defect Based on Fuzzy Neural Network in EPON Zhen Zhang, Rong-xing Guo Credit Status in China's E-commerce Market Hui Peng, Yan Zhao Network Intrusion Detection Method Based on High Speed and Precise Genetic Algorithm Neural Network Jingwen Tian, Meijuan Gao A Routing Method of Ad Hoc Networks Based on A-star Algorithm Zhanqi Dong, Mingxia Li Research and Design of Intelligent Wireless Electric Power Parameter Detection Algorithm Combining FFT with Wavelet Analysis Xinling Wen, Yao Li A Novel Energy-Efficient Dynamic Voting Cluster Algorithm for Wireless Sensor Networks Ming Zhang, Chenglong Gong, Yuan Feng, Chao Liu, Huibin Feng Wireless Network Technology and its Applications Ning Zhang, Hong Bao Intrusion Detection Based on Fuzzy Support Vector Machines Du Hongle, Teng Shaohua, Zhu Qingfang A Formal Verification Model for Trustworthiness of Component Interface Wang Dan, Zhao Jing An Efficient Electronic Voting Scheme Based on Quadratic Residue Wen Chen, Yun Wu, Feng Pan, Feiyu Lei

19 Traffic Grooming in WDM Ring Networks with Grooming Ratio Zhihe Liang, Yulian Miao, Yanfang Zhang Research of Web Mining Technology Based on XML Lan Li, Qiao-mei Rong Impact of Antenna Array on Performance of Parallel Interference Cancellation for WCDMA Systems Cheng-hua Hu, Shao-qian Li, You-xi Tang Comprehensive Evaluation of Shooting Goals Based on Rough Sets Xiaoquan Li, Qunsong Zhu, Jianbo Ren Data Query Protocol with Restriction Flooding in Wireless Sensor Networks Yan-rong Cui Traffic-Energy Balanced Routing Protocol with Two-direction Routing Liang Ye, Xue-jun Sha, Yu-bin Xu A Combination Scheme for Fuzzy Partitions Based on Fuzzy Majority Voting Rule Chunsheng Li Research and Design for Stateful Firewall on Multi-core Network Processors Lei Shang, Hanping Jiang A Topic Detection Method Based on Bicharacteristic Vectors Wang Zhiming, Zhou Xusheng Application of Markov Chain in IP Traffic Classification Xusheng Zhou, Zhiming Wang Stochastic Optimization Problem through Particle Swarm Optimization Algorithm Fangguo He, Wenlue Chen Improved Real-coding Genetic Algorithm Jian-cheng An, Hai-juan Jin, Chaohun Liu An ID-based Broadcast Encryption Scheme for Collaborative Design Ya-ling Zhang, Jing Zhang, Yi-kun Zhang A Privacy-Enhanced Access Control Model Fei Xu, Jingsha He, Xu Wu, Jing Xu Fuzzy Multi-criteria Decision-making TOPSIS for Distribution Center Location Selection Yaodong Hu, Shuyan Wu, Liya Cai An Image Encryption Algorithm Based on Discrete Wavelet Transform and Two Dimension Cat Mapping Chun-jiang Pang An Incentive Mechanism Using Game Theory for P2P Networks Jing-cheng Ouyang, Yue-bin Wang, Xu-huai Hu, Ya-ping Lin, Protocol-Based Hidden Key Recovery: IBE Approach and IPSec Case Rui-dan Su, Xiang-quan Che, Shao-feng Fu, Long-hai Li, Li-hua Zhou Structured Proxy Multi-signature Scheme with Fingerprint Zhang Jianhong, Ji Cheng Research on the Innovation Mechanism of Digital Brand in Enterprise Mei Wang A Dynamic E-commerce System Based on Middleware Technology Mengjian Chen

20 A TCM-MC-CDMA System with Multiple Reception Antennas Liguo Jiang, Yewen Cao Design of 2.1GHz RF CMOS Power Amplifier for 3G Fada Yu, Enling Li, Ying Xue, Xue Wang, Yongxia Yuan Study on Mine Equipment Systems Combined with a Reliability Assessment Model Dai Jingxia Channel Estimation for PRP-OFDM in Underwater Acoustic Communication System Jinlong Xian, Zhonglei Zhang Reduction of Peak-to-Average Power Ratio in MIMO-OFDM System Based on the Copy Theory Xian Jinlong, Gong Yuehong A New Multi-parameter Monitoring System Based on Wireless Sensor Network Xingqiao Liu, Yiying Liu, Chengchun Li, Guohai Liu A Detection Method of DS-CDMA Signal Based on the Quadratic Fourth-order Moment Chip Zhao Zhijin, Pu Junjie An Effective Binary Image Watermarking Algorithm Based on Stochastic Tree Division Chaoyang Zhang, Zhilua Hu A New Collision Attack on MD Wang Yu, Chen Jianhua, He Debiao Study on JPEG2000 Optimized Compression Algorithm for Remote Sensing Image Lu Liang, Deng Shujun Application Research for Fault Diagnosis of Machine Unit Based on Immunology Principle Jian Cen, Qing-hua Zhang, Bu-gong Xu, Ting-yu Gao, Hong-fang Li The Application of Data Mining Techniques to Programme Decision Making and Information Management Zhan-fan Liang, Lang Liu A New Logging in Protocol with Mobile Telephone Ding Yi The Research of Hybrid Network Communication System in NC System Kun-qi Wang, Peng Wang, Ya-nan Wang Analysis and Design of the Classification Management on the Information Content Security Based on the Label JunHua He, ShengLi Mao A Hybrid Metaheuristic Algorithm for the Multi-depot Vehicle Routing Problem with Time Windows Tong Zhen, Qiuwen Zhang The Tire Burst of Automotive Early-Warning System Design Xulina, Xuejianfeng, Sunjinhao Research on Temperature and Humidity Monitoring under Mine Based on Optical Fiber Communication System Wang Xiaolei, Wu Bingxin, Fu Bangsheng, Peng Sheng Robust Stability Analysis for Uncertain Delayed Neural Networks with Markoian Jump Parameters Zhiwei Lin, Jun Kan

21 Expand Study of Protocol Based on NS-2 No Need for Packet Header Methods Huali Wang A New Method for SORTING Radiating-Source Haihong Li, Bolin Chen, Jun Han, Wenfeng Dong A Novel Method for Sorting Radar Radiating-Source Signal Based on Ambiguity Function Jun Han, Ming-hao He, Yuan-qing Zhu, Bin-gang Zhu A Study of Convergence of the Majority Genetic Algorithm with Infinite Size Population Jun Su, Hang Qin Spatial Range Query on Group P2P Networks Dan Liu, Wenjun Xie Effective Learning Activities Design with LAMS Wu Junqi, Hu Zhengbing, Yang Zongkai, Liu Yumei A Fuzzy Comprehensive Appraisement Model Based on Markov Chain of Teaching Quality Evaluation on Physical Education Liu Min-hang, Fu Yu-kun Cheating Resistance for Secret Sharing Chao-Wen Chan, Chin-Chen Chang, Zhi-Hui Wang Modified Method of Noise-Immune Data Transmission in Wireless Sensors Networks Anatoly Sachenko, Vasyl Yatskiv, Roman Krepych Video Multipoint Processor Based on H.264 and DM Yuan Yao, Zhengbing Hu, Jinsheng Xiao, Benshun Yi, Honggang Xie Issues on Integrating Information Technology into Education Domain Liming Zhang Structural Robustness in Peer to Peer Botnets Junfeng Yu, Zhitang Li, Jun Hu, Feng Liu, Lingyun Zhou An Identity-Based One-Time Password Scheme with Anonymous Authentication Song Luo, Jianbin Hu, Zhong Chen Author Index

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008

2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008 2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 1 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 1 of 4 TECHNISCHE INFORMATIONSBIBLiOTHEK UNIVERSITATSBiBLIOTHEK HANNOVCR November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

In the City Part 6 MANDARIN. ENGLISH Ni hao wo jiao zhou zhou. Hello. My name is Jojo Ni hao lu lu. Hello Lulu. Ni hao zhou zhou. Ni hao ma?

In the City Part 6 MANDARIN. ENGLISH Ni hao wo jiao zhou zhou. Hello. My name is Jojo Ni hao lu lu. Hello Lulu. Ni hao zhou zhou. Ni hao ma? Ni hao wo jiao zhou zhou. _ Hello. My name is Jojo Ni hao lu lu. _ Hello Lulu. Ni hao zhou zhou. Ni hao ma? _ Hello Jojo. How are you? Wo lei le. _ I'm tired. Wo men xiao shui yi xia ba. _ Let's take a

More information

A query-driven TOA-Based Indoor Geolocation System using Smart phone... 1 Jie He, Yanwei Yu, Fei Liu, Cheng Xu and Qin Wang

A query-driven TOA-Based Indoor Geolocation System using Smart phone... 1 Jie He, Yanwei Yu, Fei Liu, Cheng Xu and Qin Wang Contents: JCIT : Editorial Board... i JCIT : Call for Papers & Special issue... x < PART 1 > A query-driven TOA-Based Indoor Geolocation System using Smart phone... 1 Jie He, Yanwei Yu, Fei Liu, Cheng

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 3 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 3 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 3 of 4 TECHNISCHE INFORMATIO.NSBIBLIOTHEK UNIVERS1TATSBIBLIOTHEK HANNOVER November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China July IEEE Catalog Number: ISBN:

2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China July IEEE Catalog Number: ISBN: 2009 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR 2009) Baoding, China 12-15 July 2009 IEEE Catalog Number: ISBN: CFP0919C-PRT 978-1-4244-3728-3 Copyright 2009 by the Institute

More information

Qingdao, , China. China. Keywords: Deep sea Ultrahigh pressure, Water sound acquisition, LabVIEW, NI PXle hardware.

Qingdao, , China. China. Keywords: Deep sea Ultrahigh pressure, Water sound acquisition, LabVIEW, NI PXle hardware. 2016 International Conference on Control and Automation (ICCA 2016) ISBN: 978-1-60595-329-8 Research and Design on Water Sound Acquisition System of Deep Sea Ultrahigh Pressure Environment Gang TONG 1,

More information

Proceedings of 2005 International Conference On Machine Learning and Cybernetics. Volume 9 of 9

Proceedings of 2005 International Conference On Machine Learning and Cybernetics. Volume 9 of 9 t»f JT A If I Otemational Viz I iversify in Girminy Proceedings of 2005 International Conference On Machine Learning and Cybernetics Volume 9 of 9 August 18-21, 2005 Ramada Hotel Guangzhou, China IEEE

More information

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,*

Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer Hao ZHANG 1, Jun-yu LIU 2, Yi-ying ZHANG 3 and Kun LIANG 3,* 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 Research on Hybrid Network Technologies of Power Line Carrier and Wireless MAC Layer

More information

ICNDS International Conference on Networking and Digital Society. Volume - 2. Table of Contents. ICNDS 2009 Volume 2

ICNDS International Conference on Networking and Digital Society. Volume - 2. Table of Contents. ICNDS 2009 Volume 2 2009 International Conference on Networking and Digital Society ICNDS 2009 Table of Contents Volume - 2 Preface - Volume 2...x Organization - Volume 2...xi Reviewers - Volume 2...xii ICNDS 2009 Volume

More information

Contents Part I: Mathematics and Fuzziness Bipolar Fuzzy BRK-ideals in BRK-algebras... 3 Khizar Hayat, Xiao-Chu Liu, and Bing-Yuan Cao A New Approach for Solving Fuzzy Supplier Selection Problems Under

More information

BigCom 2016 Program July 30 Saturday

BigCom 2016 Program July 30 Saturday July 29 Friday BigCom 2016 Program July 30 Saturday July 31 Sunday 8:30-9:00 Opening 8:30-9:30 8:30-9:30 Session 8 9:00-10:00 Keynote 3 9:30-10:30 Keynote 1 Session 9 10:00-10:15 Break 9:30-9:45 Break

More information

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015)

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) ARINC - 429 airborne communications transceiver system based on FPGA implementation Liu Hao 1,Gu Cao 2,MA

More information

ROUTING PROJECT LIST

ROUTING PROJECT LIST ROUTING PROJECT LIST Branches {Computer Science (CS), Information Science(IS), Software Engineering(SE),Electronics & Communication(EC), Telecommunication (TE),Information Technology(IT),Digital Communication(DCE),Digital

More information

An efficient face recognition algorithm based on multi-kernel regularization learning

An efficient face recognition algorithm based on multi-kernel regularization learning Acta Technica 61, No. 4A/2016, 75 84 c 2017 Institute of Thermomechanics CAS, v.v.i. An efficient face recognition algorithm based on multi-kernel regularization learning Bi Rongrong 1 Abstract. A novel

More information

Remote Monitoring System of Ship Running State under Wireless Network

Remote Monitoring System of Ship Running State under Wireless Network Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department

More information

Modeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML

Modeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML 2018 International Conference on Modeling, Simulation and Optimization (MSO 2018) ISBN: 978-1-60595-542-1 Modeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 4 of 4

2002 International Conference on Machine Learning and Cybernetics. Proceedings Volume 4 of 4 2002 International Conference on Machine Learning and Cybernetics Proceedings Volume 4 of 4 TECHNISCHE INFORMAT1ONSBIDLIGTHEK UNIVERSITATSBIBLIOTHEK HANNOVER November 4-5, 2002 Prime Hotel Beijing, CHINA

More information

IJACT: Editorial Board... i. IJACT: Call For Paper & Special Issue... v

IJACT: Editorial Board... i. IJACT: Call For Paper & Special Issue... v Contents: IJACT: Editorial Board... i IJACT: Call For Paper & Special Issue... v < PART 1 > Publicly Verifiable Rational Secret Sharing....... 1 Cai Yongquan, Luo Zhanhai, Yang Yi Multi-Copy Privacy-Preserving

More information

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a

Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1,

More information

Zhi-Quan Luo Electrical and Computer Engineering

Zhi-Quan Luo Electrical and Computer Engineering Sun, Ruoyu, and Zhi-Quan Luo. 2015. Interference alignment using finite and dependent channel extensions: The single beam case. IEEE Transactions on Information Theory 61 (1) (JAN 01): 239-55. Baligh,

More information

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle.

Qiqihar University, China *Corresponding author. Keywords: Highway tunnel, Variant monitoring, Circle fit, Digital speckle. 2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 Research on Tunnel Support Deformation Based on Camera and Digital Speckle Improvement

More information

Open Access Research on the Key Technology of Seismic Observation Equipment Cluster

Open Access Research on the Key Technology of Seismic Observation Equipment Cluster Send Orders for Reprints to reprints@benthamscience.ae 1848 The Open Automation and Control Systems Journal, 2015, 7, 1848-1854 Open Access Research on the Key Technology of Seismic Observation Equipment

More information

2011 International Conference on Virtual Reality and Visualization (ICVRV 2011) Beijing, China 4-5 November IEEE Catalog Number: ISBN:

2011 International Conference on Virtual Reality and Visualization (ICVRV 2011) Beijing, China 4-5 November IEEE Catalog Number: ISBN: 2011 International Conference on Virtual Reality and Visualization (ICVRV 2011) Beijing, China 4-5 November 2011 IEEE Catalog Number: ISBN: CFP1154R-PRT 978-1-4577-2156-4 2011 International Conference

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

The Research of Internet of Things in Operation and Maintenance for Distribution Grid

The Research of Internet of Things in Operation and Maintenance for Distribution Grid 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 The Research of Internet of Things in Operation and Maintenance for Distribution Grid Hengbo

More information

An Improved Fusion Method of Fuzzy Logic Based on k-mean Clustering in WSN

An Improved Fusion Method of Fuzzy Logic Based on k-mean Clustering in WSN Sensors & Transducers Vol. 57 Issue 0 October 203 pp. 20-25 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com An Improved Fusion Method of Fuzzy Logic Based on k-mean Clustering in WSN 2 Feng

More information

Validation of a Real-time AVS Encoder on FPGA

Validation of a Real-time AVS Encoder on FPGA Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Validation of a Real-time AVS Encoder on FPGA 1 Qun Fang Yuan, 2 Xin Liu, 3 Yao Li Wang 1 Student Recruitment and Work

More information

2012 Sixth International Conference on Internet Computing for Science and Engineering

2012 Sixth International Conference on Internet Computing for Science and Engineering 2012 Sixth International Conference on Internet Computing for Science and Engineering (ICICSE 2012) Zhengzhou, China 21 23 April 2012 IEEE Catalog Number: ISBN: CFP1288D-PRT 978-1-4673-1683-5 2012 Sixth

More information

Distribution Network Reconfiguration Based on Relevance Vector Machine

Distribution Network Reconfiguration Based on Relevance Vector Machine 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Distribution Network Reconfiguration Based on Relevance Vector Machine Sheng ZHOU

More information

result, it is very important to design a simulation system for dynamic laser scanning

result, it is very important to design a simulation system for dynamic laser scanning 3rd International Conference on Multimedia Technology(ICMT 2013) Accurate and Fast Simulation of Laser Scanning Imaging Luyao Zhou 1 and Huimin Ma Abstract. In order to design a more accurate simulation

More information

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li

Study on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Keywords: Cloud computing, ZigBee, Smart home, Security cloud

Keywords: Cloud computing, ZigBee, Smart home, Security cloud 2016 International Conference on Information Engineering and Communications Technology (IECT 2016) ISBN: 978-1-60595-375-5 Design of the Smart-home Security System based on Cloud Computing Yan Wang 1,a,

More information

A Compatible Public Service Platform for Multi-Electronic Certification Authority

A Compatible Public Service Platform for Multi-Electronic Certification Authority Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,

More information

Publications for He Chen

Publications for He Chen Publications for He Chen 2018 Gao, M., Li, J., Jayakody, D., Chen, H., Li, Y., Shi, J. (2018). A Super Base Station Architecture for Future Ultra-Dense Cellular Networks: Toward Low Latency and High Energy

More information

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI *

Research of Traffic Flow Based on SVM Method. Deng-hong YIN, Jian WANG and Bo LI * 2017 2nd International onference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Research of Traffic Flow Based on SVM Method Deng-hong YIN, Jian WANG and Bo

More information

A Few Things to Know about Machine Learning for Web Search

A Few Things to Know about Machine Learning for Web Search AIRS 2012 Tianjin, China Dec. 19, 2012 A Few Things to Know about Machine Learning for Web Search Hang Li Noah s Ark Lab Huawei Technologies Talk Outline My projects at MSRA Some conclusions from our research

More information

Research on Software Scheduling Technology Based on Multi-Buffered Parallel Encryption

Research on Software Scheduling Technology Based on Multi-Buffered Parallel Encryption International Conference on Manufacturing Science and Engineering (ICMSE 2015) Research on Software Scheduling Technology Based on Multi-Buffered Parallel Encryption Zeng Rong 1, a, Xia Wei 2, Wang Hongkai

More information

The Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1 and Hou-An DING 1

The Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1 and Hou-An DING 1 2016 International Conference on Control and Automation (ICCA 2016) ISBN: 978-1-60595-329-8 The Parameters Optimization of Fusion Winglet Based on Orthogonal Experiment Yue LUO 1, *, Qi WANG 1, Qi DU 1

More information

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology 2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power

More information

A Design of Remote Monitoring System based on 3G and Internet Technology

A Design of Remote Monitoring System based on 3G and Internet Technology National Conference on Information Technology and Computer Science (CITCS 2012) A Design of Remote Monitoring System based on 3G and Internet Technology Shouxian WEN Lei XU Xingguo SUN Xiaohui LI* Abstract

More information

JDCTA: Call For Paper & Special Issue... vi. Risk Assessment of NPD Project Based on ANP...1 Jiayu Chi, Ling Sun, Hai Xu, Xiaohua Yang

JDCTA: Call For Paper & Special Issue... vi. Risk Assessment of NPD Project Based on ANP...1 Jiayu Chi, Ling Sun, Hai Xu, Xiaohua Yang Contents: JDCTA: Editorial Board... i JDCTA: Call For Paper & Special Issue... vi Part.1 Risk Assessment of NPD Project Based on ANP...1 Jiayu Chi, Ling Sun, Hai Xu, Xiaohua Yang Research on DMB Technology

More information

Simulation and Realization of Wireless Emergency Communication System of Digital Mine

Simulation and Realization of Wireless Emergency Communication System of Digital Mine Simulation and Realization of Wireless Emergency Communication System of Digital Mine Yi Sun Department of Telecommunication and Information Engineering Xi an University of Science and Technology, Xi an

More information

An Overview of Optical Label Switching Technology

An Overview of Optical Label Switching Technology Physics Procedia 22 (2011) 392 396 2011 International Conference on Physics Science and Technology (ICPST 2011) An Overview of Optical Label Switching Technology Fugen Su a,hongli Jin b,fulu Jin c a* a

More information

Research on Multi-service Unified Bearing Electric Power Communication Access Network Bao Feng1,a, Yang Li1, Yang Hu1, Yan Long2, Yongzhong Xie3

Research on Multi-service Unified Bearing Electric Power Communication Access Network Bao Feng1,a, Yang Li1, Yang Hu1, Yan Long2, Yongzhong Xie3 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Research on Multi-service Unified Bearing Electric Power Communication Access Bao Feng1,a, Yang

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

Application of Face Recognition Technology in the Exam Identity Authentication System Li-jun YU 1,a,* and Ke-feng LI 2,b

Application of Face Recognition Technology in the Exam Identity Authentication System Li-jun YU 1,a,* and Ke-feng LI 2,b 2017 3rd International Conference on Social Science and Management (ICSSM 2017) ISBN: 978-1-60595-445-5 Application of Face Recognition Technology in the Exam Identity Authentication System Li-jun YU 1,a,*

More information

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.

More information

A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang

A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016) A Tentative Study on Ward Monitoring System based on Zigbee Technology Jifeng Liang Xi an Fanyi University, Xi an

More information

Research on Heterogeneous Network Integration in Distribution Communication Network

Research on Heterogeneous Network Integration in Distribution Communication Network Research on Heterogeneous Integration in Distribution Communication Wei Li 1, Haonan Zheng 1, Hui He 1 1 (School of Control and Computer Engineering, North China Electric Power University, China) Abstract:

More information

JCIT: Call For Paper & Special Issue... v. A Parallel SRL algorithm based on synergetic neural network...1 Zhehuang Huang, Yidong Chen, Xiaodong Shi

JCIT: Call For Paper & Special Issue... v. A Parallel SRL algorithm based on synergetic neural network...1 Zhehuang Huang, Yidong Chen, Xiaodong Shi Contents: JCIT: Editorial Board... i JCIT: Call For Paper & Special Issue... v Part.1 A Parallel SRL algorithm based on synergetic neural network...1 Zhehuang Huang, Yidong Chen, Xiaodong Shi Optimized

More information

Development of a Rapid Design System for Aerial Work Truck Subframe with UG Secondary Development Framework

Development of a Rapid Design System for Aerial Work Truck Subframe with UG Secondary Development Framework Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 2961 2965 Advanced in Control Engineering and Information Science Development of a Rapid Design System for Aerial Work Truck Subframe

More information

JCIT: Editorial Board... i. JCIT: Call For Paper & Special Issue... v

JCIT: Editorial Board... i. JCIT: Call For Paper & Special Issue... v Contents: JCIT: Editorial Board... i JCIT: Call For Paper & Special Issue... v A Scheduling Algorithm for Private Clouds... 1 Jiandun Li, Junjie Peng, Wu Zhang A Long-short Block Decision and Time-domain

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines

Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines DOI: 10.23977/acss.2019.31002 EISSN 2371-8838 Advances in Computer, Signals and Systems (2019) 3: 8-14 Clausius Scientific Press, Canada Research on WSN Secure Communication Method Based on Digital Watermark

More information

Cooperative Communications and Wireless Body Area Networks. Xigang Huang

Cooperative Communications and Wireless Body Area Networks. Xigang Huang Cooperative Communications and Wireless Body Area Networks Xigang Huang Contents Wireless Body Area Networks Applications Network architecture of WBANs MAC and Route Protocols Interworking Cooperative

More information

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2 International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang

More information

China Travel Guide - Macau By ZHONG GUO LV YOU ZHI NAN )BIAN WEI HUI

China Travel Guide - Macau By ZHONG GUO LV YOU ZHI NAN )BIAN WEI HUI China Travel Guide - Macau By ZHONG GUO LV YOU ZHI NAN )BIAN WEI HUI Hong Kong From Huo Tan To Sha Tian - World News - zu lesen insclusive shui nian ge wu shi jian wen mu ping kai si qwan lung wa hu huai,

More information

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Design of student information system based on association algorithm and data mining technology

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute

Accepted List. Result Paper Id Paper Title Authors. Agile Project Management in MIS: A Case Study in A Research Institute Oral 011 Oral 016 Oral 017 Agile Project Management in MIS: A Case Study in A Research Institute Exploring Developing Countries Immigrants Intention to Use Information Communication Technology Partial

More information

Fast Grain Shape Determination Algorithm Based on Parallel Processing

Fast Grain Shape Determination Algorithm Based on Parallel Processing 39 3 Vol.39, No.3 3 Opto-Electronic Engineering March, 3 5X(3 66 6,,,, (. ( Britton Chance 4374. 4374 (GPU (CUDA GPU (CPU 4 TP39 A.3969/j.issn.3-5X..3. Fast Grain Shape Determination Algorithm Based on

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on

More information

Design of Smart Home System Based on the Technology of Internet of Things

Design of Smart Home System Based on the Technology of Internet of Things Research Journal of Applied Sciences, Engineering and Technology 4(14): 2236-2240, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: March 10, 2012 Accepted: April 03, 2012 Published:

More information

Design of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,*

Design of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,* International Conference on Computational Science and Engineering (ICCSE 2015) Design of Greenhouse Temperature and Humidity Monitoring System Based on ZIGBEE Technique Ming Xin 1,a, Wei Zhongshan 1,b,*

More information

Key words: Wireless Sensor Networks, Clustering Routing Algorithm, Hierarchical Multi-hop Clustering Routing Algorithm

Key words: Wireless Sensor Networks, Clustering Routing Algorithm, Hierarchical Multi-hop Clustering Routing Algorithm doi:10.21311/001.39.11.34 An Improved Clustering Routing Algorithm Based on Energy Balance Li Cai and Jianying Su Chongqing City Management College, Chongqing 401331,China Abstract: For network distribution

More information

Telecommunications Engineering Course Descriptions

Telecommunications Engineering Course Descriptions Telecommunications Engineering Course Descriptions Electrical Engineering Courses EE 5305 Radio Frequency Engineering (3 semester hours) Introduction to generation, transmission, and radiation of electromagnetic

More information

Research on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c

Research on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c Applied Mechanics and Materials Submitted: 2014-07-18 ISSN: 1662-7482, Vols. 644-650, pp 1950-1953 Accepted: 2014-07-21 doi:10.4028/www.scientific.net/amm.644-650.1950 Online: 2014-09-22 2014 Trans Tech

More information

Intelligent bus temperature measurement system based on Zigbee networks

Intelligent bus temperature measurement system based on Zigbee networks 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Intelligent bus temperature measurement system based on networks Gang Ma1,a, WenGong Jiang2,b

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO

A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO Yinghui HUANG School of Electronics and Information,

More information

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,*

The Design of Electronic Color Screen Based on Proteus Visual Designer Ting-Yu HOU 1,a, Hao LIU 2,b,* 2016 Joint International Conference on Service Science, Management and Engineering (SSME 2016) and International Conference on Information Science and Technology (IST 2016) ISBN: 978-1-60595-379-3 The

More information

Real time emergency route generating algorithm in tunnel

Real time emergency route generating algorithm in tunnel Trans. Nonferrous Met. Soc. China 21(2011) s637-s641 Real time emergency route generating algorithm in tunnel FANG Yuan min 1, CHEN Jie 1, AI Chun long 2, ZHANG Chun liang 2, ZHOU Shi yong 2, FU Xia jiang

More information

Indian Silicon Technologies 2013

Indian Silicon Technologies 2013 SI.No Topics IEEE YEAR 1. An RFID Based Solution for Real-Time Patient Surveillance and data Processing Bio- Metric System using FPGA 2. Real-time Binary Shape Matching System Based on FPGA 3. An Optimized

More information

Ant Colony Based Optimistic Route Discovery and Packet Distribution Approach

Ant Colony Based Optimistic Route Discovery and Packet Distribution Approach Ant Colony Based Optimistic Route Discovery and Packet Distribution Approach Chandrashekhara N 1, Geetha G P 2 1PG Scholar, Dept. of ECE, SJBIT, Karnataka, India 2Assistant Professor, Dept. of ECE, SJBIT,

More information

AISS: Editorial Board... i. An Effective DEA-AHP Algorithm for Evaluation of Emergency Logistics Performance... 1 Jiyong Zhang, Shaochuan Fu

AISS: Editorial Board... i. An Effective DEA-AHP Algorithm for Evaluation of Emergency Logistics Performance... 1 Jiyong Zhang, Shaochuan Fu Contents: AISS: Editorial Board... i AISS: Call For Paper... vi < PART 1 > An Effective DEA-AHP Algorithm for Evaluation of Emergency Logistics Performance... 1 Jiyong Zhang, Shaochuan Fu Learning Solution

More information

DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS

DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS 1 C. NISHANT PAUL, 2 V. SAKTHIVEL 1 P.G. Student, School Of Computing, SASTRA University, Thanjavur 613401, India.

More information

Infrared Image Stitching Based on Immune Memory Clonal Selection Algorithm

Infrared Image Stitching Based on Immune Memory Clonal Selection Algorithm Infrared Image Stitching Based on Immune Memory Clonal Selection Algorithm by Tong Hejun, Fu Dongmei, Dong Lin and Yang Tao School of Automation and Electrical Engineering, University of Science and Technology

More information

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority

Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority IOP Conference Series: Earth and Environmental Science PAPER OPEN ACCESS Comprehensive analysis and evaluation of big data for main transformer equipment based on PCA and Apriority To cite this article:

More information

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG

A Test Sequence Generation Method Based on Dependencies and Slices Jin-peng MO *, Jun-yi LI and Jian-wen HUANG 2017 2nd International Conference on Advances in Management Engineering and Information Technology (AMEIT 2017) ISBN: 978-1-60595-457-8 A Test Sequence Generation Method Based on Dependencies and Slices

More information

Publications for Ying-Chang Liang

Publications for Ying-Chang Liang Publications for Ying-Chang Liang 2018 Li, Q., Ding, M., Ma, C., Liu, C., Lin, Z., Liang, Y. (2018). A Reinforcement Learning Based User Association Algorithm for UAV Networks. 28th International Telecommunication

More information

Tag Based Image Search by Social Re-ranking

Tag Based Image Search by Social Re-ranking Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule

More information

manufacturing process.

manufacturing process. Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 203-207 203 Open Access Identifying Method for Key Quality Characteristics in Series-Parallel

More information

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning

Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Intuitionistic Fuzzy Petri Nets for Knowledge Representation and Reasoning Meng Fei-xiang 1 Lei Ying-jie 1 Zhang Bo 1 Shen Xiao-yong 1 Zhao Jing-yu 2 1 Air and Missile Defense College Air Force Engineering

More information

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN:

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 978-1-60595-502-5 Design of Attendance Check System Based on Ethernet Technology and Fingerprint Recognition

More information

Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA

Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA 2009 Fifth International Conference on Information Assurance and Security Design of Fault Diagnosis System of FPSO Production Process Based on MSPCA GAO Qiang, HAN Miao, HU Shu-liang, DONG Hai-jie ianjin

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Design of Coal Mine Power Supply Monitoring System

Design of Coal Mine Power Supply Monitoring System 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic

More information

Dynamic Balance Design of the Rotating Arc Sensor Based on PSO Algorithm

Dynamic Balance Design of the Rotating Arc Sensor Based on PSO Algorithm 016 International Conference on Advanced Manufacture Technology and Industrial Application (AMTIA 016) ISBN: 978-1-60595-387-8 Dynamic Balance Design of the Rotating Arc Sensor Based on PSO Algorithm Ji-zhong

More information

Cross-Layer Optimization for Efficient Delivery of Scalable Video over WiMAX Lung-Jen Wang 1, a *, Chiung-Yun Chang 2,b and Jen-Yi Huang 3,c

Cross-Layer Optimization for Efficient Delivery of Scalable Video over WiMAX Lung-Jen Wang 1, a *, Chiung-Yun Chang 2,b and Jen-Yi Huang 3,c Applied Mechanics and Materials Submitted: 2016-06-28 ISSN: 1662-7482, Vol. 855, pp 171-177 Revised: 2016-08-13 doi:10.4028/www.scientific.net/amm.855.171 Accepted: 2016-08-23 2017 Trans Tech Publications,

More information

KEY TECHNOLOGY DESIGN OF VIRTUAL INSTRUMENT FOR FAULT DETECTION ON ANALOGUE INTEGRATED OPERATION- AMPLIFIER BASED ON FPGA AND DSP

KEY TECHNOLOGY DESIGN OF VIRTUAL INSTRUMENT FOR FAULT DETECTION ON ANALOGUE INTEGRATED OPERATION- AMPLIFIER BASED ON FPGA AND DSP Key Technology Design of irtual Instrument for Fault Detection on Analog Integrated Operation-amplifier KEY TECHNOLOGY DESIGN OF IRTUAL INSTRUMENT FOR FAULT DETECTION ON ANALOGUE INTEGRATED OPERATION-

More information

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication Yujie Zhang, Liang Han, and Yuanyuan Zhang College of Electrical and Information Engineering, Shaanxi University

More information

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network

Hex-Grid Based Relay Node Deployment for Assuring Coverage and Connectivity in a Wireless Sensor Network ISBN 978-93-84422-8-6 17th IIE International Conference on Computer, Electrical, Electronics and Communication Engineering (CEECE-217) Pattaya (Thailand) Dec. 28-29, 217 Relay Node Deployment for Assuring

More information

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12.

1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Lecture Slides 1. The Internet 2. Principles 3. Ethernet 4. WiFi 5. Routing 6. Internetworking 7. Transport 8. Models 9. WiMAX & LTE 10. QoS 11. Physical Layer 12. Additional Topics 1.1. Basic Operations

More information

Sl.No Project Title Year

Sl.No Project Title Year Sl.No Project Title Year WSN(Wireless Sensor ) 1 Distributed Topology Control With Lifetime Extension Based on Non-Cooperative Game for Wireless Sensor 2 Intercept Behavior Analysis of Industrial Wireless

More information