Resource Type

Journal Article 28

Conference Videos 1

Year

2023 2

2022 5

2021 4

2020 4

2019 4

2018 2

2017 2

2013 2

2010 1

2005 3

open ︾

Keywords

Blockchain 2

Brain network 2

Graph theoretical analysis 2

Physical layer security 2

Algebraic connectivity 1

Anesthesia 1

Anonymity 1

Artificial noise 1

Average propagation 1

Cascading failure 1

Chaotic systems 1

Clinical monitoring system 1

Connectivity 1

Cooperative beamforming 1

Copyright protection 1

Correlated channels 1

Cyber-physical production systems 1

Data analytics 1

Data hiding 1

open ︾

Search scope:

排序: Display mode:

Secure connectivity analysis in unmanned aerial vehicle networks None

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 409-422 doi: 10.1631/FITEE.1700032

Abstract: Based on the trust model, the concept of a secure link in UAVNs is formulated that exists only when thereMoreover, the metrics of both the physical connectivity probability and the secure connectivity probabilitybetween two UAVs are adopted to analyze the connectivity of UAVNs.We derive accurate and analytical expressions of both the physical connectivity probability and the securephysical connection probability with or without malicious attacks, the proposed trust model can guarantee secure

Keywords: Unmanned aerial vehicle networks (UAVNs)     Trust model     Secure connectivity     Doppler shift    

High-precision standard enthalpy of formation for polycyclic aromatic hydrocarbons predicting from general connectivity

Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 12,   Pages 1743-1750 doi: 10.1007/s11705-022-2184-9

Abstract: accurate standard enthalpies of formation for polycyclic aromatic hydrocarbons based on the general connectivity

Keywords: standard enthalpy of formation     polycyclic aromatic hydrocarbons     connectivity based hierarchy     high-precision    

Managing obsolescence of embedded hardware and software in secure and trusted systems

Zachary A. COLLIER, James H. LAMBERT

Frontiers of Engineering Management 2020, Volume 7, Issue 2,   Pages 172-181 doi: 10.1007/s42524-019-0032-5

Abstract: Obsolescence of integrated systems which contain hardware and software is a problem that affects multiple industries and can occur for many reasons, including technological, economic, organizational, and social factors. It is especially acute in products and systems that have long life cycles, where a high rate of technological innovation of the subcomponents result in a mismatch in life cycles between the components and the systems. While several approaches for obsolescence forecasting exist, they often require data that may not be available. This paper describes an approach using non-probabilistic scenarios coupled with decision analysis to investigate how particular scenarios influence priority setting for products and systems. Scenarios are generated from a list of emergent and future conditions related to obsolescence. The key result is an identification of the most and least disruptive scenarios to the decision maker’s priorities. An example is presented related to the selection of technologies for energy islanding, which demonstrates the methodology using six obsolescence scenarios. The paper should be of broad interest to scholars and practitioners engaged with enterprise risk management and similar challenges of large-scale systems.

Keywords: enterprise risk management     diminishing manufacturing sources and material shortages     scenario-based preferences     systems engineering     deep uncertainty     product life cycle    

Preliminary Analysis of Power Connectivity along the Belt and Road

Liu Zhe, Gao Yi, Wang Yusheng, Li Jun, Huang Weihe

Strategic Study of CAE 2019, Volume 21, Issue 4,   Pages 76-81 doi: 10.15302/J-SSCAE-2019.04.007

Abstract: clean energy development from the aspects of environment and cost, and analyzes the potential of power connectivityThis study also analyzes the supporting role of technological revolution in power connectivity, in termsfields such as renewable energy, power grid, and information, should be adopted to support the power connectivity

Keywords: the Belt and Road     energy internet     clean energy     power connectivity     energy transition    

Synchronization of two different chaotic systems using Legendre polynomials with applications in secure None

Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9,   Pages 1180-1190 doi: 10.1631/FITEE.1601814

Abstract: In secure communication systems, observer-based synchronization is required since only one state variableThe problem of secure communications is explained and the controller performance in secure communications

Keywords: Observer-based synchronization     Chaotic systems     Legendre polynomials     Secure communications    

Multi-UAV cooperative target tracking with bounded noise for connectivity preservation

Rui Zhou, Yu Feng, Bin Di, Jiang Zhao, Yan Hu,jzhao@buaa.edu.cn

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 10,   Pages 1413-1534 doi: 10.1631/FITEE.1900617

Abstract: We investigate cooperative target tracking of multiple unmanned aerial vehicles (UAVs) with a limited communication range. This is an integration of UAV motion control, target state estimation, and network topology control. We first present the communication topology and basic notations for , and introduce the distributed . Then, convergence and boundedness of the estimation errors using the filter are analyzed, and potential functions are proposed for communication link maintenance and collision avoidance. By taking stable target tracking into account, a distributed potential function based UAV motion controller is discussed. Since only the estimation of the target state rather than the state itself is available for UAV motion control and UAV motion can also affect the accuracy of state estimation, it is clear that the UAV motion control and target state estimation are coupled. Finally, the stability and convergence properties of the coupled system under are analyzed in detail and demonstrated by simulations.

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Strategic Study of CAE 2005, Volume 7, Issue 3,   Pages 74-77

Abstract:

This paper discusses the secure operations in the web applications, and designs a framework of middlewareThe paper implements the security middleware based on the “JavaBeans” and “Secure Cookie

Keywords: JavaBeans     Secure Cookie     middleware     PMI     RBAC    

The research of connectivity-credibility restricted clustering algorithm in wireless sensor networks

Yu Jiming,Sun Yamin,Lei Yanjing,Yang Yuwang

Strategic Study of CAE 2010, Volume 12, Issue 9,   Pages 73-77

Abstract:

This paper proposed a speeding clustering algorithm of connectivity-credibilityComparing to the lowerst-ID clustering and highest-connectivity clustering algorithm, the algorithm can

Keywords: wireless sensor networks     connectivity-credibility     clustering algorithm    

Advanced Antennas Push Forward Wireless Connectivity

Kwai Man Luk, Baoyan Duan

Engineering 2022, Volume 11, Issue 4,   Pages 1-2 doi: 10.1016/j.eng.2022.03.003

The Dynamic Functional Network Connectivity Analysis Framework

Zening Fu, Yuhui Du, Vince D. Calhoun

Engineering 2019, Volume 5, Issue 2,   Pages 190-193 doi: 10.1016/j.eng.2018.10.001

The secure and highly efficient development technology for Puguang Gas Field and its industrial application

Cao Yaofeng

Strategic Study of CAE 2013, Volume 15, Issue 11,   Pages 49-52

Abstract:

To solve the multi-types of technical problem concerning with the development technology of Puguang Gas Field which is deeply reserved and abounds with hydrogen sulfide, we have organized a scientific innovation team of industry- teaching- research integration. So that, we have formed a technology innovation system,realized the general interaction of key science and technology program and site-testing,promoted the research and development of gas field with super- deep and high-sulfur, localization of key equipment,the construction of standard system and its industrial application, pushed China to be one of the few countries of holding the core technology for high-sulfur gas field development,and made important contribution to superdeep and high-sulfur gas field development of China and even the whole world.

Keywords: Puguang Gas Field     super-deep and high-sulfur     technology innovation     industrial application    

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 940-956 doi: 10.1631/FITEE.2000071

Abstract: This necessitates protection of digital medical images and their secure transmission.

Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗    

Cerebral regional and network characteristics in asthma patients: a resting-state fMRI study

Siyi Li, Peilin Lv, Min He, Wenjing Zhang, Jieke Liu, Yao Gong, Ting Wang, Qiyong Gong, Yulin Ji, Su Lui

Frontiers of Medicine 2020, Volume 14, Issue 6,   Pages 792-801 doi: 10.1007/s11684-020-0745-1

Abstract: amplitude of low-frequency fluctuations) and neural network function (degree centrality (DC) and functional connectivity

Keywords: asthma     brain     regional activation     functional connectivity     resting-state fMRI    

Reducing power grid cascading failure propagation by minimizing algebraic connectivity in edge addition Research Articles

Supaporn LONAPALAWONG, Jiangzhe YAN, Jiayu LI, Deshi YE, Wei CHEN, Yong TANG, Yanhao HUANG, Can WANG,11821132@zju.edu.cn,wcan@zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 3,   Pages 382-397 doi: 10.1631/FITEE.2000596

Abstract: However, most of existing methods focus on localized network metrics, such as node connectivity and edgeconnectivity, which do not encompass a global perspective of cascading propagation in a .

Keywords: Network robustness     Cascading failure     Average propagation     Algebraic connectivity     Power grid    

An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication Research Articles

Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 1010-1019 doi: 10.1631/FITEE.2000043

Abstract: In this paper we propose an based secure scheme that can resist current underwater attacks, i.e., replay

Keywords: 海豚哨音;改进Merkle哈希树;安全水声通信(UWAC)    

Title Author Date Type Operation

Secure connectivity analysis in unmanned aerial vehicle networks

Xin YUAN, Zhi-yong FENG, Wen-jun XU, Zhi-qing WEI, Ren-ping LIU

Journal Article

High-precision standard enthalpy of formation for polycyclic aromatic hydrocarbons predicting from general connectivity

Journal Article

Managing obsolescence of embedded hardware and software in secure and trusted systems

Zachary A. COLLIER, James H. LAMBERT

Journal Article

Preliminary Analysis of Power Connectivity along the Belt and Road

Liu Zhe, Gao Yi, Wang Yusheng, Li Jun, Huang Weihe

Journal Article

Synchronization of two different chaotic systems using Legendre polynomials with applications in secure

Saeed KHORASHADIZADEH, Mohammad-Hassan MAJIDI

Journal Article

Multi-UAV cooperative target tracking with bounded noise for connectivity preservation

Rui Zhou, Yu Feng, Bin Di, Jiang Zhao, Yan Hu,jzhao@buaa.edu.cn

Journal Article

A Security Middleware for Web Applications Based on JavaBeans and Secure Cookie

Cai Zhun,Kong Fanyu,Li Daxing

Journal Article

The research of connectivity-credibility restricted clustering algorithm in wireless sensor networks

Yu Jiming,Sun Yamin,Lei Yanjing,Yang Yuwang

Journal Article

Advanced Antennas Push Forward Wireless Connectivity

Kwai Man Luk, Baoyan Duan

Journal Article

The Dynamic Functional Network Connectivity Analysis Framework

Zening Fu, Yuhui Du, Vince D. Calhoun

Journal Article

The secure and highly efficient development technology for Puguang Gas Field and its industrial application

Cao Yaofeng

Journal Article

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Journal Article

Cerebral regional and network characteristics in asthma patients: a resting-state fMRI study

Siyi Li, Peilin Lv, Min He, Wenjing Zhang, Jieke Liu, Yao Gong, Ting Wang, Qiyong Gong, Yulin Ji, Su Lui

Journal Article

Reducing power grid cascading failure propagation by minimizing algebraic connectivity in edge addition

Supaporn LONAPALAWONG, Jiangzhe YAN, Jiayu LI, Deshi YE, Wei CHEN, Yong TANG, Yanhao HUANG, Can WANG,11821132@zju.edu.cn,wcan@zju.edu.cn

Journal Article

An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication

Masoud Kaveh, Abolfazl Falahati,afalahati@iust.ac.ir

Journal Article