Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    A Lower Bound on the Share Size of Leakage-Resilient Secret-Sharing Schemes

    Sabyasachi Dutta, Shaoquan Jiang in New Advances in Designs, Codes and Cryptog… (2024)

  2. No Access

    Chapter and Conference Paper

    Study on Factors Influencing the Unbalance of Double-Split Parallel Cable Current Carrying

    In recent years, the transmission capacity of a single high-voltage cable has been unable to meet the growing load demand, and double-split parallel cables have become a necessary treatment to improve the tran...

    Jiayin Bian, Jue Zhang, Zebin He in Proceedings of the 4th International Confe… (2024)

  3. No Access

    Chapter and Conference Paper

    Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing

    Cheating detectable secret sharing schemes (CDSS) detects changes in the secret that is caused by an adversary who modifies shares of an unauthorized subset of participants. We consider leakage resilient cheat...

    Sabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini in Cryptology and Network Security (2023)

  4. No Access

    Chapter and Conference Paper

    Research on Data Acquisition Algorithm Based on ZYNQ Biometric Signal

    Under the irradiation of laser, biological particles emit fluorescence and scattered light. The spectral signals composed of fluorescence and scattered light can be used to classify and recognize biological pa...

    Shaoquan Jiang, Xuebing Cao, Tao Jiang in Advancements in Mechatronics and Intellige… (2021)

  5. No Access

    Chapter and Conference Paper

    Biological Particle Recognition Based on BP Neural Network Algorithm

    The particles in the air are collected by the biomonitoring alarm, which produces fluorescence and scattered light under laser irradiation, and is converted into an electrical signal using a photoelectric sens...

    Jianqiang Fan, Shaoquan Jiang, Chao Zhang in 3D Imaging Technologies—Multi-dimensional … (2021)

  6. No Access

    Chapter and Conference Paper

    Design of Intelligent Boiler Controller

    This paper discusses the development status of boilers in China. The design and implementation of the intelligent boiler controller are introduced in detail. The author completed the controller using the STC89...

    Sijia Lian, Tao Jiang, Chao Zhang in 3D Imaging Technologies—Multidimensional S… (2021)

  7. No Access

    Chapter and Conference Paper

    Design of Multi-Input High Fidelity Preamplifier Based on STM32

    With the popularization of audio-visual entertainment equipment, the application of pre-stage power amplifiers is becoming more and more extensive. The use of a high-quality pre-stage amplifier will often brin...

    Anlei Yu, Tao Jiang, Chao Zhang, Zhikun Yang in 3D Imaging Technologies—Multidimensional S… (2021)

  8. No Access

    Chapter and Conference Paper

    Design of Fire Alarm Based on 51 Single Chip Microcomputer

    In this paper, 51 single-chip microcomputer is designed and implemented. In this design, 51 single-chip microcomputer is the main control chip, MQ-2 smoke sensor is used to detect the concentration of combusti...

    Yuexiong Feng, Zhikun Yang, Chao Zhang in 3D Imaging Technologies—Multidimensional S… (2021)

  9. Chapter and Conference Paper

    PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model

    Password-based authenticated key exchange (PAKE) allows two parties with a shared password to agree on a session key. In the last decade, the design of PAKE protocols from lattice assumptions has attracted lot...

    Shaoquan Jiang, Guang Gong, **gnan He, Khoa Nguyen in Public-Key Cryptography – PKC 2020 (2020)

  10. No Access

    Chapter and Conference Paper

    Robust Topology Optimization with Loading Magnitude and Direction Uncertainty

    The robust topology optimization approach with uncertainties of loading magnitude and direction is investigated for continuum structures. The input loadings with uncertain magnitude and direction are decompose...

    **ang Peng, Jianxiang Wang, Jiquan Li, Shaofei Jiang in Advances in Mechanical Design (2018)

  11. No Access

    Chapter and Conference Paper

    Application of CO2 Gas Monitoring System in the CO2 Geological Storage Project

    In this paper, we designed a set of CO2 gas monitoring system in the CO2 Geological Storage Project which was used in Ordos Basin of western China. The change of CO2 concentration in atmosphere and soil was effec...

    Shao**g Jiang, Xufeng Li, Weibo Wang, Lisha Hu in Geo-Spatial Knowledge and Intelligence (2018)

  12. No Access

    Chapter and Conference Paper

    Monitoring of the Ground Subsidence in Macao Using the PSI Technique

    In this paper, we investigated the long-term reclamation-induced ground subsidence in Macao, a coastal city of southern China. Persistent Scatterers Interferometry (PSI) technique was applied to retrieve the ...

    Shao**g Jiang, Fenghua Shi, Bo Hu, Weibo Wang in Geo-Spatial Knowledge and Intelligence (2018)

  13. No Access

    Chapter and Conference Paper

    Mining User Preferences for Recommendation: A Competition Perspective

    Mining user preferences plays an important role in building personalized recommender systems. Instead of mining user preferences with the item content or the user-item-rating matrix, we exploit Bradley-Terry m...

    Shaowei Jiang, **aojie Wang, Caixia Yuan in Chinese Computational Linguistics and Natu… (2013)

  14. No Access

    Chapter and Conference Paper

    User-Characteristics Topic Model

    This paper proposes a method to capture user’s characteristics in a topic model frame, where user characteristics act as a latent variable that does not depend on texts. As it is obvious that different people ...

    Wenfeng Li, **aojie Wang, Shaowei Jiang in Chinese Computational Linguistics and Natu… (2013)

  15. No Access

    Chapter and Conference Paper

    Timed Encryption with Application to Deniable Key Exchange

    We propose a new notion of timed encryption, in which the security holds within time t while it is totally insecure after some time T > t. We are interested in the case where t and T are both polynomial and propo...

    Shaoquan Jiang in Theory and Applications of Models of Computation (2012)

  16. No Access

    Chapter and Conference Paper

    On Peer Feedback in English Writing Classes in China

    Writing, as one of the four major language skills, has been playing the same important role in China’s EFL (English as a foreign language) classroom as the other three ones. It is an important activity which a...

    Shaojun Jiang in Education and Educational Technology (2012)

  17. No Access

    Chapter and Conference Paper

    A New Interpretation of Culture in Teaching English as an International Language

    This paper argues for a new way to interprete culture in contrast with traditional views of culture commonly existing in foreign and second language learning. It also proposes ways to restructure curriculum ac...

    Shaojun Jiang in Education and Educational Technology (2012)

  18. No Access

    Chapter and Conference Paper

    Content–Based Medical Image Retrieval Based on Fuzzy Image Structure and Content

    This paper proposed a new method to retrieve cerebral hemorrhage CT images based on fuzzy binary tree structure and content (FBTS). Most of fuzzy-region-based CBIR systems only use fuzzy content information of...

    Shaofeng Jiang, Zhen Chen, Suhua Yang in Advances in Information Technology and Ind… (2012)

  19. No Access

    Chapter and Conference Paper

    Reweighting BiasMap Based Image Retrieval and Relevance Feedback for Medical Cerebral MRI Image

    This paper proposed a region based image retrieval and relevant feedback (RF) system for Medical cerebral MRI images. In the system, firstly, the brains were extracted from cerebral images by a modified BET al...

    Shaofeng Jiang, Yan** Zhu, Suhua Yang in Advances in Information Technology and Ind… (2012)

  20. No Access

    Chapter and Conference Paper

    A Simple Power Control Approach in Wireless Ad Hoc Network

    Ad hoc networks are a new paradigm of wireless communication for mobile hosts, in which there are no fixed infrastructure such as base stations or mobile switching centers. Mobile nodes that are within each ot...

    Shao** Jiang, Yi Wang in Green Communications and Networks (2012)

previous disabled Page of 3