Skip to main content

and
  1. Article

    Predicting examinee performance based on a fuzzy cloud cognitive diagnosis framework in e-learning environment

    The score profiles could be used to measure learners’ skills proficiency via cognitive diagnosis models (CDMs) for predicting their performance in the future examination. The prediction results could provide i...

    Hua Ma, Zhuoxuan Huang, Haibin Zhu, WenSheng Tang, Hongyu Zhang, Keqin Li in Soft Computing (2023)

  2. No Access

    Chapter and Conference Paper

    Measurement-Device-Independent Quantum Identity Authentication Based on Single Photon

    To overcome the channel attacks of the detector side, a measurement-device-independent quantum identity authentication based on single photon is proposed. The participants authenticate the identity of each oth...

    Yu Cheng, ** Lou, Wensheng Tang, Zehong Liu in Artificial Intelligence and Security (2020)

  3. No Access

    Chapter and Conference Paper

    A Short Flows Fast Transmission Algorithm Based on MPTCP Congestion Control

    With the development of cloud computing and big data technology, traffic in the network presents new features. Real-time online interactive applications are increasing, mainly including web services, instant m...

    Hua Zhong, **** Dong, WenSheng Tang, Bo Yang in Artificial Intelligence and Security (2020)

  4. No Access

    Chapter and Conference Paper

    Research on Educational Data Mining Based on Big Data

    Educational data mining (EDM) is a cross-disciplinary technology involving computer science, education, statistics, etc. It analyzes and mines education-related data to discover and solve various types of educ...

    Xu** He, Wensheng Tang, Jia Liu, Bo Yang in e-Learning, e-Education, and Online Traini… (2020)

  5. No Access

    Chapter and Conference Paper

    Research on DINA Model in Online Education

    Learning tests play an important role in both traditional learning and online learning. The traditional education test can only report students’ scores or abilities, but not their knowledge level, which is no ...

    Jia Liu, Wensheng Tang, Xu** He, Bo Yang in e-Learning, e-Education, and Online Traini… (2020)

  6. No Access

    Article

    A Quantum Blind Signature Scheme Based on Block Encryption and Quantum Fourier Transfer

    Motivated by the block encryption and quantum Fourier transfer, a quantum blind signature scheme is proposed. Alice encodes the original message into three pairs of hybrid entangled states, which are distribut...

    ** Lou, Wensheng Tang, Hu Long in International Journal of Theoretical Physi… (2019)

  7. No Access

    Article

    An Arbitrated Proxy Blind Signature Based on Hyper Entanglement Analysis

    Motivated by the hyperentangled Bell states analysis, an arbitrated quantum proxy blind signature (QPBS) scheme is developed. Four participants accomplish the task of signing and verifying via exchanging the e...

    ** Lou, Wensheng Tang, Hua Ma in International Journal of Theoretical Physics (2018)

  8. No Access

    Article

    A high capacity quantum weak blind signature based on logistic chaotic maps

    Motivated by the teleportation of hyper-entangled states, a high capacity quantum weak blind signature (QWBS) scheme is developed via logistic chaotic maps. Three participants jointly accomplish the task in tw...

    ** Lou, Wensheng Tang, **aoxiao Chen in Quantum Information Processing (2018)

  9. No Access

    Chapter and Conference Paper

    Blocking Time-Based MPTCP Scheduler for Heterogeneous Networks

    In order to solve the problem of buffer congestion caused by multipath transmission, we present Blocking Time-based MPTCP (MPTCP-BT) in heterogeneous network. The proposed algorithm designs a new metric path b...

    Chen Ling, Wensheng Tang, **** Dong, Wenjun Yang in Cloud Computing and Security (2018)

  10. No Access

    Chapter and Conference Paper

    Pavement Crack Segmentation Algorithm Based on Local Optimal Threshold of Cracks Density Distribution

    Asphalt pavement distress is very important for road maintenance and rehabilitation decisions. The traditional manual pavement crack detection by human eyes is expensive, labor intensive, time consuming, and s...

    Shengchun Wang, Wensheng Tang in Advanced Intelligent Computing (2012)

  11. No Access

    Chapter and Conference Paper

    Network Security Situation Assessment Based on Stochastic Game Model

    From the perspective of game theory, this paper studies the information security problem, establishes an offense and defense game model of information security, and puts forward a quantitative evaluation algor...

    Boyun Zhang, Zhigang Chen, Wensheng Tang, Qiang Fan in Advanced Intelligent Computing (2012)

  12. No Access

    Chapter and Conference Paper

    Fast Algorithm for Multisource Image Registration Based on Geometric Feature of Corners

    Due to the different imaging characteristics of sensor, there are big differences of multisource images in gray and trend of gray gradient. And the existing algorithms of image registration were time-consuming...

    Shaohua Jiang, Cheng Wang, Xuejun Xu in Advanced Intelligent Computing Theories an… (2010)

  13. No Access

    Chapter and Conference Paper

    A SWP Specification for Sequential Image Processing Algorithms

    To retarget sequential image processing algorithm written in sequential languages (e.g. C) to processors with multimedia extensions and multimedia-specific embedded microprocessors is an open issue. Image proc...

    Wensheng Tang, Shaogang Wang, Dan Wu in Advances in Computer Systems Architecture (2007)