Skip to main content

previous disabled Page of 25
and
  1. No Access

    Chapter and Conference Paper

    Crowd Intelligence Driven Design Framework Based on Perception-Retrieval Cognitive Mechanism

    Currently, the use of crowd intelligence in which the knowledge from different disciplines is integrated for complex product design has attracted increasing attention from both academia and industry. However, ...

    Chen Zheng, Kangning Wang, Tengfei Sun in Product Lifecycle Management. PLM in Trans… (2023)

  2. No Access

    Chapter and Conference Paper

    A Prototype Tool of Optimal Wireless Sensor Placement for Structural Health Monitoring

    With increasing collapses of civil infrastructures and popularized utilization of large-scale structures, worldwide deployment of structural health monitoring (SHM) systems is of importance in emerging and fut...

    Weixiang Shi, Changzhi Wu, **angyu Wang in Advanced Computing Strategies for Engineering (2018)

  3. No Access

    Chapter and Conference Paper

    Development and Improvement of Deep Learning Based Automated Defect Detection for Sewer Pipe Inspection Using Faster R-CNN

    Currently, visual inspection techniques, especially closed-circuit television (CCTV), are commonly utilized for sewer pipe inspection. Computer vision techniques are applied for automated interpretation of CCT...

    Mingzhu Wang, Jack C. P. Cheng in Advanced Computing Strategies for Engineering (2018)

  4. No Access

    Chapter and Conference Paper

    Adaptive Firefly Algorithm with a Modified Attractiveness Strategy

    The performance of firefly algorithm (FA) is seriously affected by its parameters. Recently, we proposed a new FA with adaptive control parameters (ApFA), in which the step factor is dynamically updated and th...

    Wenjun Wang, Hui Wang, Jia Zhao, Li Lv in Cloud Computing and Security (2017)

  5. No Access

    Chapter and Conference Paper

    Layout Optimization for a Long Distance Wireless Mesh Network: An Industrial Case Study

    In the deployment of industrial wireless network, nodes can only be deployed in some special regions due to the restriction of the environment in the factory, thus failing to effectively elude occlusions, and ...

    **tao Wang, ** **, Peng Zeng, Zhaowei Wang in Wireless Algorithms, Systems, and Applicat… (2017)

  6. No Access

    Chapter and Conference Paper

    Conducting Correlated Laplace Mechanism for Differential Privacy

    Recently, differential privacy achieves good trade-offs between data publishing and sensitive information hiding. But in data publishing for correlated data, the independent Laplace noise implemented in curren...

    Hao Wang, Zhengquan Xu, Lizhi **ong, Tao Wang in Cloud Computing and Security (2017)

  7. No Access

    Chapter and Conference Paper

    Accurate Indoor Localization with Multiple Feature Fusion

    In recent years, many fingerprint-based localization approaches have been proposed, in which different features (e.g., received signal strength (RSS) and channel state information (CSI)) were used as the finge...

    Yalong **ao, Jianxin Wang, Shigeng Zhang in Wireless Algorithms, Systems, and Applicat… (2017)

  8. No Access

    Chapter and Conference Paper

    Maximum-Weighted \(\lambda \) -Colorable Subgraph: Revisiting and Applications

    Given a vertex-weighted graph G and a positive integer \(\lambda \) λ ...

    Peng-Jun Wan, Huaqiang Yuan, Xufei Mao in Wireless Algorithms, Systems, and Applicat… (2017)

  9. No Access

    Chapter and Conference Paper

    Employing Smartwatch for Enhanced Password Authentication

    This paper presents an enhanced password authentication scheme by systematically exploiting the motion sensors in a smartwatch. We extract unique features from the sensor data when a smartwatch bearer types hi...

    Bing Chang, **ming Liu, Yingjiu Li in Wireless Algorithms, Systems, and Applicat… (2017)

  10. No Access

    Chapter and Conference Paper

    Social D2D Communications Based on Fog Computing for IoT Applications

    To satisfy the rapidly growing requirements of wireless data services recently, fog computing which is as an extension of cloud computing is proposed for offloading the Internet of Things (IoT) data services a...

    Junjie Yan, Dapeng Wu, Honggang Wang in Wireless Algorithms, Systems, and Applicat… (2017)

  11. No Access

    Chapter and Conference Paper

    Leveraging Scheduling to Minimize the Tardiness of Video Packets Transmission in Maritime Wideband Communication

    In this paper, we investigated the scheduling issue of the vessel’s uploading data to the infostations through the maritime communication network, to optimize the dispatching process by Dynamic Programming. We...

    Tingting Yang, Zhengqi Cui, Rui Wang in Wireless Algorithms, Systems, and Applicat… (2017)

  12. No Access

    Chapter and Conference Paper

    Newton Method for Interval Predictor Model with Sphere Parameter Set

    In this paper, we study the construction of interval prediction model. After introducing the family of models and some basic information, we present the computational results for the construction of interval p...

    Xuan **ao, Peng Wang, Jian-Hong Wang in Cloud Computing and Security (2017)

  13. No Access

    Chapter and Conference Paper

    Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest

    Flooding Distributed Denial of Service (DDoS) attacks could cause huge damages to Internet, which has much similarity with Flash Crowds (FC). Traditional Machine learning methods usually have a better performa...

    Degang Sun, Kun Yang, Zhixin Shi in Wireless Algorithms, Systems, and Applications (2017)

  14. No Access

    Chapter and Conference Paper

    Community Verification with Topic Modeling

    Different performance measurement metrics have been proposed to evaluate the performance of community detection algorithms, such as modularity, conductance, etc. However, there is few work which makes sense of...

    Feng Wang, Ken Orton in Wireless Algorithms, Systems, and Applications (2017)

  15. No Access

    Chapter and Conference Paper

    A Credibility Evaluation Method in Opportunistic Networks

    There are lots of misbehaving nodes in opportunistic networks which can cause severe performance downgrade. Those misbehaving nodes contains malicious nodes and selfish nodes. Selfish nodes don’t cooperate in ...

    **xia Dou, Wenbin Yao, Dongbin Wang in Cloud Computing and Security (2017)

  16. No Access

    Chapter and Conference Paper

    Server-Less Lightweight Authentication Protocol for RFID System

    The design of secure authentication protocols for RFID system is still a great challenging problem. Many authentication protocols for RFID have been presented, but most have security flaws. We analyzes the sec...

    **g Li, Zhi** Zhou, ** Wang in Cloud Computing and Security (2017)

  17. No Access

    Chapter and Conference Paper

    A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs

    Coverage control is one of the most critical issues for wireless sensor networks (WSNs), which is closely related to the sensor network performance. Generally, sensor nodes are randomly and massively deployed ...

    ** Wang, Chunwei Ju, Huan Ji, Geumran Youn, Jeong-Uk Kim in Cloud Computing and Security (2017)

  18. No Access

    Chapter and Conference Paper

    Quantified Attribute Access Control Model for Cloud Storage Platform

    Recently, cloud computing is the most domain studies in information technology. At the same time, the security of cloud computing becomes an important challenge. Existing access control models are poor on the ...

    DongMin Li, **g Li, Sai Liu, Chao Wang in Cloud Computing and Security (2017)

  19. No Access

    Chapter and Conference Paper

    OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating

    Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising technique to enable fine-grained access control for data storage and sharing. In CP-ABE, data are encrypted with an access policy on attribu...

    Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming **an in Network and System Security (2017)

  20. No Access

    Chapter and Conference Paper

    Differential Direction Adaptive Based Reversible Information Hiding

    In order to reversibly hide information in images with high capacity, an self-adaptive method is proposed in this paper by optimally selecting the differential direction. By dividing image into blocks, differe...

    Feipeng Lin, Bo Wang, Yabin Li in Cloud Computing and Security (2017)

previous disabled Page of 25