Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 1 )

2019 ( 343 )

2018 ( 2592 )

2017 ( 2493 )

Custom range...

Search Results: 1 - 10 of 153055 matches for " LI Xin-Song "
All listed articles are free for downloading (OA Articles)
Page 1 /153055
Display every page Item
A P2P Media-on-Demand Architecture Supporting Reliable Service

Wu Ai,Liu Xin-song,Li Fan,

电子与信息学报 , 2009,
Abstract: Reliability and stability are essential to Media-on-Demand (MoD) system. Based on the node reliability and QoS assessment, a Peer-to-peer MoD architecture (RP2MoD) is proposed in this paper. In the proposed system, the reliable degree of each client is calculated based on the failure probability of its parents, and the QoS level of its parents is also assessed. The reliability degree and QoS level are the basis of MoD operations, such as the parent selection, the allocation strategy of the requested media data and the error resilience. Analytical and experimental results about the system performance show that the operations relative to the reliability degree and QoS level have little effect on the performance of the proposed system and result in a strong ability of fault tolerance. Thus the system can provide large-scale, steady and reliable MoD service in Internet.
Photoluminescence of Electrospun Poly-Methyl-Methacrylate:Alq3 Composite Fibres

TONG Ke-Qin,XU Chun-Xian,WANG Qiong,GU Bao-Xiang,ZHENG Ke,YELi-Hua,LI Xin-Song,

中国物理快报 , 2008,
Abstract: Tris(8-hydroxyquinoline) aluminium doped poly-methyl-methacrylate (PMMA:Alq3) composite nanofibres are fabricated by electrospinning. The morphology of fibres is characterized by scanning electron microscopy. The photoluminescence of a series of the nanofibres with various contents of Alq3 to PMMA is investigated. UV-visible absorption and the PL spectra analysis are employed to analyse the interaction between the polymer and the luminescent molecule.
Novel Security Protocol and Strand Space Analysis

PI Jian-yong,YANG Le,LIU Xin-song,LI Ze-ping,

计算机科学 , 2010,
Abstract: We proposed a novel PJY identity authentication and key agreement security protocol based on computational difficulty of discrete logarithm in finite field.The PJY security protocol can validate identity of the both parties with two session,and generate peer session key.We analyzed the correctness of the security protocol on strand space model.First we constructed infiltrate strand space,and proved the PJY security protocol has injective agreement and secrecy by authentication tests under arbitrary penetrat...
A randomized, double-blind, placebo-controlled trial of safety and efficacy of combined praziquantel and artemether treatment for acute schistosomiasis japonica in China
Hou,Xun-Ya; McManus,Donald P; Gray,Darren J; Balen,Julie; Luo,Xin-Song; He,Yong-Kang; Ellis,Magda; Williams,Gail M; Li,Yue-Sheng;
Bulletin of the World Health Organization , 2008, DOI: 10.1590/S0042-96862008001000015
Abstract: objective: to evaluate the safety and efficacy of combining artemether (am) and praziquantel (pzq) in different regimens for treating acute schistosomiasis japonica. methods: we undertook a randomized, double-blind, placebo-controlled trial within four specialized schistosomiasis hospitals in the dongting lake region, hunan province, china, between may 2003 and december 2005. study participants were randomized into one of four treatment regimes: group a received 60 mg/kg pzq + 6 mg/kg am; group b received 60 mg/kg pzq + am placebo; group c received 120 mg/kg pzq + 6 mg/kg am; and group d received 120 mg/kg pzq + am placebo. all participants were followed up over a 45-day period. the primary endpoint of the trial was human infection status (determined by positive stool examination). secondary endpoints involved clinical observations and blood biochemistry, including monitoring haemoglobin and alanine aminotransferase levels over time. findings: treatment efficacies of the four different treatment regimens were 98.0%, 96.4%, 97.7% and 95.7% for group a, b, c, and d respectively (p > 0.05). the group b had a greater treatment efficacy (96.4%) than the group d (95.7%) (p > 0.05). group a treatment was better for clearance of fever (p < 0.05) and resulted in a shorter hospitalization time (p < 0.05). conclusion: this is the first report of a randomized, double-blind, placebo-controlled trial for evaluating combined chemotherapy with am and two different dosages (60 mg/kg and 120 mg/kg) of pzq in the treatment of acute schistosomiasis japonica in china. the combination of am and pzq chemotherapy did not improve treatment efficacy compared with pzq alone. pzq given as a dosage of 60 mg/kg (1 day, 3 × 20 mg/kg doses at 4-5 hour intervals) may be as effective as a dosage of 120 mg/kg (6 days, 20 mg/kg for each day split into 3 doses at 4-5 hour intervals).
Access control-based host anomaly intrusion detection model

PI Jian-yong,GONG Ming-shu,LIU Xin-song,LI Ze-ping,

计算机应用研究 , 2009,
Abstract: The model of intrusion detection based on access control(ACBIDS) was proposed under the precondition of positive access reference by access control mechanism, in which combined advantage of access control and intrusion detection respectively. Constructed the activity associate graph based on direct acyclic graph (DAG) according to restriction relations among system call functions, and constructed divergence function about activity associated graph for computing the match degree between actual system call sequence and activity associated graph. The ACBIDS could detect the intrusion action in host finally. The experiment shows this model implements low false positive rate and low false negative rate, and upper efficiency.
Frangibility of Complex Networks Based on Flow Attack and Edge Failure

Wu Ai,Liu Xin-song,Liu Dan,
吴 艾
,刘心松,刘 丹

电子与信息学报 , 2009,
Abstract: Attacks based on flow may bring tremendous damage to complex networks. In existing works, the cases of nodes attacking are mainly concerned, however, few work is involved to the edges. In this paper, the frangibility of complex networks is discussed in the case of some edges being deleted. Additionally, the effects of time strategy and network size are also discussed. By analyzing the load and degree of complex networks, it is demonstrated that the complex networks possess a high heterogeneous distribution of loads, which is caused by the power-law degree distribution, and the heterogeneity makes the networks particularly vulnerability to attacks. The analytic results show that complex networks exhibit strong error tolerance to random failures of edges, but a large-scale cascade of node failure can be triggered by disabling several key edges, which may result in the collapse of networks.
Novel location-index compression mechanism based on bit vector

CHEN Jian-ying,LIU Xin-song,

计算机应用研究 , 2011,
Abstract: To reduce the stress brought by shared resource in large-scale distributed system, a kind of novel location-index compression mechanism based on bit vector is put forward. It is established on hybrid overlay network that is composed with three levels of District/Site/Node and peer-to-peer District level. After mapping sub nodes of District and Site level agent nodes to corresponding bit vector, the location-index of many same replicas can be compressed to one record by bottom-up location-index publish and aggregating. Meanwhile, replicas in system can be located by query on corresponding bit vector. Application and experimental results indicate that this method can achieve high record compression ratio and improve the replica location efficiency.
Mesh Network Distributed Mutual Exclusion Algorithm Based on Cross Quorums

WANG Zheng,LIU Xin-song,

计算机科学 , 2008,
Abstract: Distributed Mutual Exclusion(DME)is an important problem of distributed mesh systems.According to the properties of mesh systems,a novel algorithm MNCME was presented for them.Based on the rows and columns,the algorithm generated distributed mutual exclusion cross quorums.And Lamport' s logical timestamps were utilized to guarantee the time sequence.Furthermore,Probemessages were employed to implement the fault-tolerance of the algorithm.Analysis and simulation results show that it has lower message complex...
Ring Network Distributed Mutual Exclusion Algorithm Based on Half-ring Quorums

WANG Zheng,LIU Xin-song,

计算机科学 , 2008,
Abstract: Distributed Mutual Exclusion(DME) is an important problem of distributed ring systems.According to the properties of ring networks,a novel algorithm is presented for them.Based on these half-rings,the algorithm generates distributed mutual exclusion quorums and regarded requesters as centers.And Lamport's logical timestamps are utilized to guarantee the time sequence.Furthermore,Probe messages are employed to implement the fault-tolerance of the algorithm.Analysis and simulation results show that it has low...
A New Error-driven Learning Approach for Chinese Word Segmentation

XIA Xin-Song,XIAO Jian-Guo,

计算机科学 , 2006,
Abstract: A well known problem for Chinese word segmentation(CWS)is that we can not have a unique definition of words.Different standards may result in different word segmentation outputs.It is unrealizable to develop different CWS systems according to different applications or standards,so it is significantly important to flexibly adapt segmen- tation outputs towards different standards or applications using existing CWS system.The paper presents a linguistical- ly enriched transformation-based learning approach for performing CWS adaptation as a postprocessor.Different from other transform-based learning used in CWS,the approach utilizes some linguistics information,and introduces word class and word internal structure to rule templates and transformations.The performance of the approach is evaluated on four different test sets,which represent four different standards.It turns out to be comparable to several state-of- the-art approaches which perform Chinese word segmentation based on single standard.
Page 1 /153055
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.