Loading [MathJax]/extensions/MathMenu.js
Qian Zhao - IEEE Xplore Author Profile

Showing 1-15 of 15 results

Results

Traditional Image Classification algorithms have problems of high recognition error rate and low efficiency in fashion classification. So, the research proposes an improved model based on GooLeNet model.At first, we created a new inception network module which called inception-improved module.Compared with original inception module,Inception-improved module reduced the computational cost and impro...Show More
Protein s-nitrosylation (SNO) is one of the most important post-translational modifications and is formed by the covalent modification of nitric oxide and cysteine residues. Extensive studies have shown that SNO plays a pivotal role in the plant immune response and treating various major human diseases. In recent years, SNO sites have become a hot research topic. Traditional biochemical methods fo...Show More
Edge computing offloading in remote areas is a challenging problem in 5 G and 6 G studies, since edge cloud infrastructures are often unavailable in remote areas. In these areas, using drones instead of infrastructures to provide edge computing services can be an efficient solution. However, the limited coverage of drones makes it challenging to provide effective edge computing services. In this p...Show More
In this paper, we study the computation offloading problem in a mobile ad hoc network (MANET) scenario, where the network nodes can cooperatively help each other to fulfill computation tasks, and the energy-harvesting technology is also considered to overcome possible energy-exhausted issues. To tradeoff energy-harvesting and consumption, the problem of task offloading and energy-harvesting is for...Show More
We developed a recipe based on Chinese herbal medicines for a special medicinal purpose. It is based on the market demand and clinical feedback of formulas for special medicinal uses. The whole nutrient formula contains raw materials in the form of powder and granules, and the finished product is prepared using a dry process. Striking a balance when mixing the powder and granular materials in a un...Show More
Mobile data demand of users is soaring with the increasing number of smartphones, which brings huge challenges to cellular network providers. To meet the user traffic demand, we study the problem that the user traffic data is served by cellular and WiFi network concurrently, i.e., mobile data offloading between cellular and WiFi operators. Different from the existing work where the users or networ...Show More
Proxy re-encryption (PRE) is an important cryptographic primitive used for private information sharing. However, the recent advance in quantum computer has potentially crippled its security, as the traditional decisional Diffie-Hellman (DDH)-based PRE is venerable to the quantum attack. Thus, learning with errors (LWE)-based PRE schemes, as a kind of latticebased construction with the inherent qua...Show More
The objective function of a cognitive network is the basis for optimizing its operation parameters. However, one kind of attack, named OFA (Objective Function Attack), could exploit some cognitive characters to disrupt the optimizing process, which will result in the operation parameters deviating from the optimal value. Existed defense strategies for OFA mainly focus on verifying the fluctuation ...Show More
The goal of software evolution research is to use the history of a software system to analyze its present state and to predict its future development, which made people can better use and management software In this paper, a process of changing normal software into autonomic software is described, which add autonomic attribute in software. Relationship and operation of components for software evol...Show More
With the application and popularization of autonomic computing in the field of aerospace exploration, large-scale database management and critical network control, existing self-reflection models based on natural language or diagram can not meet the requirements of analysis and verification. In this article, two kinds of self-reflection models, one is the static and the other is dynamic, capable o...Show More
In order to inspect the internal and external environment of software efficiently, more and more autonomic computing elements (AEs) are deployed in the autonomic computing architecture software, autonomic software for shorted, which usually causes a great resources waste. Based upon the queuing theory, this paper proposes a new model to process the software internal and external information, which...Show More
In actual data streams, there are lots of prefix-coded data, which widely existed in applications. What leads to non-ideal performance and clustering result is that the special treatment of these prefix-coded data structure is not considered in traditional clustering algorithm. To deal with this problem, a new concept of median-tree as well as a method of calculating the coding distance is propose...Show More
Intrusion detection has emerged as an important approach to security problems. The common problems of current intrusion detection systems are analyzed in this paper. Based on these, a distributed IDS framework model based on independent agents is proposed. This paper describes the function of entities in detail. The proposed model is an open system with good scalability. Agents are independent ind...Show More
Intrusion response is a hot topic in the domain of information security. First, some disadvantages of current intrusion response systems are analyzed. For solving these problems, a mobile agents-based intrusion response framework is proposed. Then the function of every entity and the operation of the system are described in details. Finally, the characteristics of system and some points that need ...Show More