Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Clustered Routing Protocol with Distributed Intrusion Detection for Wireless Sensor Networks

    Clustered routing protocols in wireless sensor networks (WSN) provide significant advantages in energy saving and data preprocessing. However, the communication greatly depends on cluster heads, which leads to...

    Lan Yao, Na An, Fuxiang Gao, Ge Yu in Advances in Data and Web Management (2007)

  2. No Access

    Chapter and Conference Paper

    Short-Term Power Load Forecasting by Interval Type-2 Fuzzy Logic System

    Power load forecasting is very important in power industry, which can ensure power network runs safely and economically. A novel method for forecasting power load based on interval type-2 fuzzy logic system is...

    Lan Yao, Yu-lian Jiang, Jian **ao in Information Computing and Applications (2011)

  3. No Access

    Chapter and Conference Paper

    Group Signature Based Trace Hiding in Web Query

    To provide better service or push personalized advertisement, Internet companies collect users’ browsing information intentionally to analyze their behaviors. However, users want to hide browsing traces someti...

    ** Xu, Lan Yao, Fuxiang Gao in Big Data Computing and Communications (2015)

  4. No Access

    Chapter and Conference Paper

    Target Detection and Tracking in Big Surveillance Video Data

    The big video data information has become widely used in many application areas such as video monitoring. Moving object detection and tracking is one of the most important and difficult problems. This paper pu...

    Aiyun Yan, **gjiao Li, Zhenni Li, Lan Yao in Big Data Computing and Communications (2016)

  5. No Access

    Chapter and Conference Paper

    Privacy Preserving in the Publication of Large-Scale Trajectory Databases

    In recent years, preserving individual privacy when publishing trajectory data receives increasing attention. However, the existing trajectory data privacy preserving techniques cannot resolve the anonymous is...

    Fengyun Li, Fuxiang Gao, Lan Yao, Yu Pan in Big Data Computing and Communications (2016)

  6. No Access

    Chapter and Conference Paper

    An Asynchronous 2D-Torus Network-on-Chip Using Adaptive Routing Algorithm

    An asynchronous 2D-Torus Network-on-Chip (ATNoC) design based on System Verilog is implemented in this paper. A dynamic asynchronous XY routing algorithm DA-XY is proposed and designed as an Intellectual Prope...

    Zhenni Li, **gjiao Li, Aiyun Yan, Lan Yao in Big Data Computing and Communications (2016)

  7. No Access

    Article

    A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing

    Service caching can improve the QoS of computationally intensive vehicle applications by pre-storing the necessary application programs and related data for computing tasks on edge servers. In this paper, we p...

    Feng Zeng, Yaojia Chen, Lan Yao, **song Wu in Peer-to-Peer Networking and Applications (2021)

  8. No Access

    Article

    An image classification model based on transfer learning for ulcerative proctitis

    Ulcerative colitis (UC) can be classified as proctitis, left-sided colitis or pancolitis, usually with rectal involvement at the beginning. Mucosal carcinogenesis is one of the most severe complications of UC....

    Feng Zeng, **ngcun Li, **aoheng Deng, Lan Yao, Guanghui Lian in Multimedia Systems (2021)

  9. No Access

    Article

    Reducing blind spots in esophagogastroduodenoscopy examinations using a novel deep learning model

    The intricate architecture of gastric anatomy coupled with the complexities inherent in esophagogastroduodenoscopy (EGD) procedures can lead to blind spots during examinations. These blind spots refer to anato...

    Guangquan Wan, Guanghui Lian, Lan Yao in Multimedia Systems (2024)