Skip to main content

and
  1. No Access

    Article

    Improving byzantine fault tolerance based on stake evaluation and consistent hashing

    In the context of distributed systems, Byzantine fault tolerance plays a critical role in ensuring the normal operation of the system, particularly when facing with malicious nodes. However, challenges remain ...

    Guangfu Wu, **n Lai, Dao**g He, Sammy Chan in Peer-to-Peer Networking and Applications (2024)

  2. No Access

    Article

    Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems

    The Grey Wolf Optimizer (GWO) is one of the more successful swarm-based intelligent algorithms in recent years, but the shortcomings of the Grey Wolf Optimizer are revealed as the problems handled become progr...

    Zhendong Wang, Donghui Dai, Zhiyuan Zeng, Dao**g He, Sammy Chan in Cluster Computing (2024)

  3. No Access

    Article

    Outdoor fine and coarse particles and hospital admissions for cardiovascular diseases: a large-scale case-crossover study

    Despite high levels of air pollution in the Middle East, there are relatively few studies of its impacts on population health. In this study, associations between short-term exposure to PM2.5 and PM10-2.5 and hos...

    Mojgan Karbakhsh, Marjan Mansourian, Marzieh Taheri in Air Quality, Atmosphere & Health (2022)

  4. No Access

    Article

    Deep logarithmic neural network for Internet intrusion detection

    Intrusion detection is an important means to deal with network attacks. The traditional neural network needs to preprocess the sample data in intrusion detection, which may cause the loss in data accuracy, thu...

    Zhendong Wang, Zhenyu Xu, Dao**g He, Sammy Chan in Soft Computing (2021)

  5. No Access

    Article

    Dynamic cloud resource management for efficient media applications in mobile computing environments

    Single-instruction-set architecture (Single-ISA) heterogeneous multi-core processors (HMP) are superior to Symmetric Multi-core processors in performance per watt. They are popular in many aspects of the Inter...

    Gangyong Jia, Guangjie Han, **fang Jiang, Sammy Chan in Personal and Ubiquitous Computing (2018)

  6. No Access

    Chapter and Conference Paper

    PTSLP: Position Tracking Based Source Location Privacy for Wireless Sensor Networks

    Abundant experiments have shown that phantom source nodes cannot leave far away from the real source node. In this paper, we propose a novel position tracking based source location privacy (PTSLP) protection s...

    Hao Wang, Guangjie Han, Chunsheng Zhu in Radio Frequency Identification and IoT Sec… (2017)

  7. Chapter and Conference Paper

    Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks

    Reprogramming is an important function required by wireless sensor networks (WSNs). Due to the openness of WSNs, more and more researchers pay attention to the security aspect of reprogramming, but confidentia...

    Depeng Chen, Dao**g He, Sammy Chan in Information and Communications Security (2016)

  8. Chapter and Conference Paper

    Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering

    Intrusion detection systems (IDSs) play a significant role to effectively defend our crucial computer systems or networks against attackers on the Internet. Anomaly detection is an effective way to detect intr...

    **ejun Ni, Dao**g He, Sammy Chan in Applied Cryptography and Network Security (2016)

  9. No Access

    Article

    Carotid Intima Media Thickness in Patients with Obstructive Sleep Apnea: Comparison with a Community-Based Cohort

    The impact of obstructive sleep apnea (OSA) on the development of atherosclerotic cardiovascular disease (CVD) in the absence of overt CVD or risk factors is unclear. Our purpose was to assess whether patients...

    Nurit Fox, Najib Ayas, Julie E. Park, John Fleetham, C. Frank Ryan, Scott A. Lear in Lung (2014)

  10. No Access

    Article

    Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks

    Designing a user authentication protocol with anonymity for the global mobility network (GLOMONET) is a difficult task because wireless networks are susceptible to attacks and each mobile user has limited powe...

    Dao**g He, Sammy Chan, Chun Chen, Jiajun Bu, Rong Fan in Wireless Personal Communications (2011)

  11. No Access

    Article

    A Simple and Robust Vertical Handoff Algorithm for Heterogeneous Wireless Mobile Networks

    Wireless networking is becoming an increasingly important and popular way of providing global information access to users on the move. One of the main challenges for seamless mobility is the availability of si...

    Dao**g He, Caixia Chi, Sammy Chan, Chun Chen in Wireless Personal Communications (2011)

  12. No Access

    Article

    The Impact of CPAP on Cardiovascular Biomarkers in Minimally Symptomatic Patients with Obstructive Sleep Apnea: A Pilot Feasibility Randomized Crossover Trial

    Background Previous, largely uncontrolled studies demonstrated the substantial effects of continuous positive airway pressure ventilation (CPAP) on a variety of physiologic and biochemica...

    Vikram R. Comondore, Rupi Cheema, Joel Fox, Arsalan Butt, G. B. John Mancini in Lung (2009)

  13. Chapter and Conference Paper

    Call Admission Control for 3G CDMA Networks with Differentiated QoS

    A call admission control (CAC) scheme for 3G wireless networks based on the estimated interference and differentiated quality of service (QoS) is proposed in this paper. In this CAC scheme, the interferences i...

    Qian Huang, Hui Min Chen, King Tim Ko in NETWORKING 2002: Networking Technologies, … (2002)

  14. No Access

    Article

    A refined model for performance analysis of output-buffered Banyan networks

    In this paper, a new analytical model for performance analysis of output-buffered Banyan networks is proposed. In this model, we consider not only the number of packets stored in a buffer, but also the state o...

    K.S. Chan, Sammy Chan, K.T. Ko, Kwan L. Yeung, Eric W.M. Wong in Telecommunication Systems (2000)