Chongqing University

Displaying 1-19 of 19 results

  • White Papers // Nov 2013

    NTRU-KE: A Lattice-Based Public Key Exchange Protocol

    Public key exchange protocol is identified as an important application in the field of public-key cryptography. Most of the existing public key exchange schemes are Diffie-Hellman (DH)-type, whose security is based on DH problems over different groups. Note that there exists shor's polynomial-time algorithm to solve these DH problems when...

    Provided By Chongqing University

  • White Papers // Dec 2012

    Ant Colony Optimization Based on Maximum Selection Probability for Path Planning in Unknown Environment

    To increase efficiency of global convergence and prevent premature stagnation in path planning of multiple mobile agents, an Ant Colony Optimization based on Maximum Selection Probability (ACOMSP) is proposed. In the process of environmental modeling, grid method is adopted to simplify the environment, and heuristic information is connected with simplified...

    Provided By Chongqing University

  • White Papers // Nov 2012

    Joint Utility Optimization Based Vertical Handoff Algorithm in Heterogeneous Network

    The next generation wireless communication system is expected to provide users with high-speed communication services through integrating multiple wireless access technologies, including cellular system, wireless local area network, worldwide interoperability for microwave access, and ad hoc network, etc. In a heterogeneous wireless network scenario, mobile nodes with multiple interfaces will...

    Provided By Chongqing University

  • White Papers // Aug 2012

    Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks

    Body Sensor Networks (BSNs) and WiFi networks have been widely investigated due to the availability of sensor motes and WiFi devices, but they are commonly deployed separately. In this paper, the authors propose to optimize the total communication energy consumption of BSN and WiFi (BSN-WiFi) networks using joint data rate...

    Provided By Chongqing University

  • White Papers // Aug 2012

    Protecting Privacy by Multi-Dimensional K-Anonymity

    Privacy protection for incremental data has a great effect on data availability and practicality. K-anonymity is an important approach to protect data privacy in data publishing scenario. However, it is a NP-hard problem for optimal k-anonymity on dataset with multiple attributes. Most partitions in k-anonymity at present are single-dimensional. Now...

    Provided By Chongqing University

  • White Papers // Jan 2012

    The Study on Software Reuse Based on Service Composition and Dependency-Aware Service Oriented Architecture

    This paper describes a Dependency-aware Service Oriented Architecture (DSOA) solution to the issue of service composition that allows the service composer to compose and register a service by analyzing and designing the dependency between existing Web services. Software reuse is to reduce the software development cycle of industry application and...

    Provided By Chongqing University

  • White Papers // Nov 2011

    Characterization of Stability for WMN-Based Network Control System Under the Optimum Transmission Condition

    In this paper, the authors consider stability analysis on WMN-based network control system with the optimum transmission condition. By establishing the optimum transmission model of the wireless mesh network, they get the minimum transmission delay. Then they propose a new Lyapunov stability criteria, which adapts to the stability of WMN-based...

    Provided By Chongqing University

  • White Papers // Sep 2011

    Realizing Automatic Conversion of Service Models Into Web Services Towards Dynamic and Adaptive Business Process Management

    The highly competitive and rapidly changing nature of the current business environment creates tremendous pressure on organizations to collaborate. This led to utterly different type of business eco-system in which individual organizations in collaborative business services increasingly demand for a collaborative business process that can easily adapt to changes. As...

    Provided By Chongqing University

  • White Papers // Sep 2011

    Channel Assignment Strategy for Multi-Radio Virtual Hierarchical Wireless Mesh Networks

    A virtual hierarchical wireless mesh network architecture is studied in this paper, which gains fine user diversity and routing stability. As each node inside a cell is equipped with multiple radios and multiple channels are available, an efficient channel assignment algorithm based on this multi-radio multi-channel virtual hierarchical wireless mesh...

    Provided By Chongqing University

  • White Papers // Sep 2011

    Phase Noise Estimation and Equalization for OFDM Systems Based on Interpolation of Common Phase Error

    In order to combat the PHase Noise (PHN) generated by the local oscillators, a simple and non-iterative algorithm for PHN estimation and equalization is proposed for Orthogonal Frequency Division Multiplexing (OFDM) systems, based on the conventional Common Phase Error (CPE) estimation scheme. The PHN is estimated by the interpolation of...

    Provided By Chongqing University

  • White Papers // Jul 2011

    Proactive Security Mechanism and Design for Firewall

    In this paper, the authors have presented the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security algorithm, they have figured out security level of each packet and adjust according to packets...

    Provided By Chongqing University

  • White Papers // Jun 2011

    Analysis on User Click Behavior in the Mobile Internet

    Mobile Internet develops rapidly these years, but little is published about the details of it in China. This paper uses the WAP gateway log to study the user behavior of Mobile Internet. Firstly, the authors propose a new method of measuring the similarity of daily clicks distribution by Pearson Correlated...

    Provided By Chongqing University

  • White Papers // Feb 2011

    Risk Accident Simulation Using Virtual Reality and Multi-Agent Technology

    Owing to the complexity of risk accidents in coalmine, traditional experimental approaches to analyze coalmine accidents can be costly, dangerous or even impossible to realize. Based on virtual reality and Multi-agent technology, a hierarchical architecture for virtual mine was constructed to simulate coalmine risk accidents. The proposed framework consists of...

    Provided By Chongqing University

  • White Papers // Feb 2011

    QoS Routing Algorithm for Cognitive Radio Based on Channel Capacity and Interference

    In this paper, a new QoS routing method for cognitive radio network is presented. Combining with the basic process of on-demand routing, the authors propose an appropriate routing algorithm which can meet the end-to-end QoS performance demanding. Difference from the existing conventional routing algorithms, the impact of two criterions: channel...

    Provided By Chongqing University

  • White Papers // Jan 2011

    An Active Margin System And Its Application In Chinese Margin Lending Market

    In order to protect brokers from customer defaults in a volatile market, an active margin system is proposed for the transactions of margin lending in China. The probability of negative return under the condition that collaterals are liquidated in a falling market is used to measure the risk associated with...

    Provided By Chongqing University

  • White Papers // Oct 2010

    How To Predict And Avert Economic Crisis

    The authors' study shows that many firms would accumulate at zero output level (namely, Bankruptcy status) if a perfectly competitive market reaches full employment (namely, those people who should obtain employment have obtained employment). As a result, appearance of economic crisis is determined by two points; that is, Stock market...

    Provided By Chongqing University

  • White Papers // Oct 2010

    A Quantum Model For The Stock Market

    Beginning with several basic hypotheses of quantum mechanics, the authors give a new quantum model in econophysics. In this model, they define wave functions and operators of the stock market to establish the Schr?dinger equation for the stock price. Based on this theoretical framework, an example of a driven infinite...

    Provided By Chongqing University

  • White Papers // Oct 2010

    Competitive Market For Multiple Firms And Economic Crisis

    The origin of economic crises is a key problem for economics. The authors present a model of long-run competitive markets to show that the multiplicity of behaviors in an economic system, over a long time scale, emerge as statistical regularities (perfectly competitive markets obey Bose-Einstein statistics and purely monopolistic-competitive markets...

    Provided By Chongqing University

  • White Papers // Sep 2010

    Implicit Authorization Mechanism of Object-Oriented Database

    Due to its special data structure and manipulative principle, Object-Oriented DataBase (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object...

    Provided By Chongqing University

  • White Papers // Aug 2012

    Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks

    Body Sensor Networks (BSNs) and WiFi networks have been widely investigated due to the availability of sensor motes and WiFi devices, but they are commonly deployed separately. In this paper, the authors propose to optimize the total communication energy consumption of BSN and WiFi (BSN-WiFi) networks using joint data rate...

    Provided By Chongqing University

  • White Papers // Nov 2012

    Joint Utility Optimization Based Vertical Handoff Algorithm in Heterogeneous Network

    The next generation wireless communication system is expected to provide users with high-speed communication services through integrating multiple wireless access technologies, including cellular system, wireless local area network, worldwide interoperability for microwave access, and ad hoc network, etc. In a heterogeneous wireless network scenario, mobile nodes with multiple interfaces will...

    Provided By Chongqing University

  • White Papers // Jan 2011

    An Active Margin System And Its Application In Chinese Margin Lending Market

    In order to protect brokers from customer defaults in a volatile market, an active margin system is proposed for the transactions of margin lending in China. The probability of negative return under the condition that collaterals are liquidated in a falling market is used to measure the risk associated with...

    Provided By Chongqing University

  • White Papers // Oct 2010

    How To Predict And Avert Economic Crisis

    The authors' study shows that many firms would accumulate at zero output level (namely, Bankruptcy status) if a perfectly competitive market reaches full employment (namely, those people who should obtain employment have obtained employment). As a result, appearance of economic crisis is determined by two points; that is, Stock market...

    Provided By Chongqing University

  • White Papers // Oct 2010

    Competitive Market For Multiple Firms And Economic Crisis

    The origin of economic crises is a key problem for economics. The authors present a model of long-run competitive markets to show that the multiplicity of behaviors in an economic system, over a long time scale, emerge as statistical regularities (perfectly competitive markets obey Bose-Einstein statistics and purely monopolistic-competitive markets...

    Provided By Chongqing University

  • White Papers // Oct 2010

    A Quantum Model For The Stock Market

    Beginning with several basic hypotheses of quantum mechanics, the authors give a new quantum model in econophysics. In this model, they define wave functions and operators of the stock market to establish the Schr?dinger equation for the stock price. Based on this theoretical framework, an example of a driven infinite...

    Provided By Chongqing University

  • White Papers // Sep 2010

    Implicit Authorization Mechanism of Object-Oriented Database

    Due to its special data structure and manipulative principle, Object-Oriented DataBase (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object...

    Provided By Chongqing University

  • White Papers // Sep 2011

    Realizing Automatic Conversion of Service Models Into Web Services Towards Dynamic and Adaptive Business Process Management

    The highly competitive and rapidly changing nature of the current business environment creates tremendous pressure on organizations to collaborate. This led to utterly different type of business eco-system in which individual organizations in collaborative business services increasingly demand for a collaborative business process that can easily adapt to changes. As...

    Provided By Chongqing University

  • White Papers // Jan 2012

    The Study on Software Reuse Based on Service Composition and Dependency-Aware Service Oriented Architecture

    This paper describes a Dependency-aware Service Oriented Architecture (DSOA) solution to the issue of service composition that allows the service composer to compose and register a service by analyzing and designing the dependency between existing Web services. Software reuse is to reduce the software development cycle of industry application and...

    Provided By Chongqing University

  • White Papers // Feb 2011

    Risk Accident Simulation Using Virtual Reality and Multi-Agent Technology

    Owing to the complexity of risk accidents in coalmine, traditional experimental approaches to analyze coalmine accidents can be costly, dangerous or even impossible to realize. Based on virtual reality and Multi-agent technology, a hierarchical architecture for virtual mine was constructed to simulate coalmine risk accidents. The proposed framework consists of...

    Provided By Chongqing University

  • White Papers // Feb 2011

    QoS Routing Algorithm for Cognitive Radio Based on Channel Capacity and Interference

    In this paper, a new QoS routing method for cognitive radio network is presented. Combining with the basic process of on-demand routing, the authors propose an appropriate routing algorithm which can meet the end-to-end QoS performance demanding. Difference from the existing conventional routing algorithms, the impact of two criterions: channel...

    Provided By Chongqing University

  • White Papers // Jun 2011

    Analysis on User Click Behavior in the Mobile Internet

    Mobile Internet develops rapidly these years, but little is published about the details of it in China. This paper uses the WAP gateway log to study the user behavior of Mobile Internet. Firstly, the authors propose a new method of measuring the similarity of daily clicks distribution by Pearson Correlated...

    Provided By Chongqing University

  • White Papers // Sep 2011

    Channel Assignment Strategy for Multi-Radio Virtual Hierarchical Wireless Mesh Networks

    A virtual hierarchical wireless mesh network architecture is studied in this paper, which gains fine user diversity and routing stability. As each node inside a cell is equipped with multiple radios and multiple channels are available, an efficient channel assignment algorithm based on this multi-radio multi-channel virtual hierarchical wireless mesh...

    Provided By Chongqing University

  • White Papers // Sep 2011

    Phase Noise Estimation and Equalization for OFDM Systems Based on Interpolation of Common Phase Error

    In order to combat the PHase Noise (PHN) generated by the local oscillators, a simple and non-iterative algorithm for PHN estimation and equalization is proposed for Orthogonal Frequency Division Multiplexing (OFDM) systems, based on the conventional Common Phase Error (CPE) estimation scheme. The PHN is estimated by the interpolation of...

    Provided By Chongqing University

  • White Papers // Nov 2011

    Characterization of Stability for WMN-Based Network Control System Under the Optimum Transmission Condition

    In this paper, the authors consider stability analysis on WMN-based network control system with the optimum transmission condition. By establishing the optimum transmission model of the wireless mesh network, they get the minimum transmission delay. Then they propose a new Lyapunov stability criteria, which adapts to the stability of WMN-based...

    Provided By Chongqing University

  • White Papers // Aug 2012

    Protecting Privacy by Multi-Dimensional K-Anonymity

    Privacy protection for incremental data has a great effect on data availability and practicality. K-anonymity is an important approach to protect data privacy in data publishing scenario. However, it is a NP-hard problem for optimal k-anonymity on dataset with multiple attributes. Most partitions in k-anonymity at present are single-dimensional. Now...

    Provided By Chongqing University

  • White Papers // Jul 2011

    Proactive Security Mechanism and Design for Firewall

    In this paper, the authors have presented the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security algorithm, they have figured out security level of each packet and adjust according to packets...

    Provided By Chongqing University

  • White Papers // Dec 2012

    Ant Colony Optimization Based on Maximum Selection Probability for Path Planning in Unknown Environment

    To increase efficiency of global convergence and prevent premature stagnation in path planning of multiple mobile agents, an Ant Colony Optimization based on Maximum Selection Probability (ACOMSP) is proposed. In the process of environmental modeling, grid method is adopted to simplify the environment, and heuristic information is connected with simplified...

    Provided By Chongqing University

  • White Papers // Nov 2013

    NTRU-KE: A Lattice-Based Public Key Exchange Protocol

    Public key exchange protocol is identified as an important application in the field of public-key cryptography. Most of the existing public key exchange schemes are Diffie-Hellman (DH)-type, whose security is based on DH problems over different groups. Note that there exists shor's polynomial-time algorithm to solve these DH problems when...

    Provided By Chongqing University