oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 32 )

2018 ( 369 )

2017 ( 394 )

2016 ( 321 )

Custom range...

Search Results: 1 - 10 of 20728 matches for " Ying "
All listed articles are free for downloading (OA Articles)
Page 1 /20728
Display every page Item
A Security Transfer Model Based on Active Defense Strategy  [PDF]
Ying Zheng
Communications and Network (CN) , 2010, DOI: 10.4236/cn.2010.23027
Abstract: This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/ management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, we use deceptive packets so that the attackers can not trace back to the encrypted data packets. Finally, according to the digested information from data packets, this model is capable of detecting attacks and tracing back to the attackers immediately. In the meantime, the overlaying routers in the security domain are dynamically administered. In summary, this model not only improves the se-curity of data transfer on the web, but also enhances the effectiveness of the network management and switching efficiency of routers as well.
Lossy-to-Lossless Compression of Hyperspectral Image Using the 3D Set Partitioned Embedded ZeroBlock Coding Algorithm  [PDF]
Ying Hou
Journal of Software Engineering and Applications (JSEA) , 2009, DOI: 10.4236/jsea.2009.22013
Abstract: In this paper, we propose a three-dimensional Set Partitioned Embedded ZeroBlock Coding (3D SPEZBC) lossy-to-lossless compression algorithm for hyperspectral image which is an improved three-dimensional Embedded ZeroBlock Coding (3D EZBC) algorithm. The algorithm adopts the 3D integer wavelet packet transform proposed by Xiong et al. to decorrelate, the set-based partitioning zeroblock coding to process bitplane coding and the con-text-based adaptive arithmetic coding for further entropy coding. The theoretical analysis and experimental results demonstrate that 3D SPEZBC not only provides the same excellent compression performances as 3D EZBC, but also reduces the memory requirement compared with 3D EZBC. For achieving good coding performance, the diverse wave-let filters and unitary scaling factors are compared and evaluated, and the best choices were given. In comparison with several state-of-the-art wavelet coding algorithms, the proposed algorithm provides better compression performance and unsupervised classification accuracy.
A Novel Mechanism in MPLS Network under Adversarial Uncertainty  [PDF]
Ying ZHENG
Communications and Network (CN) , 2009, DOI: 10.4236/cn.2009.12016
Abstract: The advantage of multi-protocol label switching (MPLS) is its capability to route the packets through explicit paths. But the nodes in the paths may be possibly attacked by the adversarial uncertainty. Aiming at this problem in MPLS Network, in this paper, we propose a novel mechanism in MPLS network under adversar-ial uncertainty, making use of the theory of artificial intelligence, at first, we find the initialized label switching paths (LSPs) using the A* arithmetic, and secondly, during the process of data transmission, we switch the transmission path duly by taking advantage of the non-monotone reasoning mechanism. Com-pared to the traditional route mechanism, the experimental results show that it improves the security if data transmission remarkably under our novel mechanism in MPLS network.
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network  [PDF]
Ying Zheng
Communications and Network (CN) , 2011, DOI: 10.4236/cn.2011.34026
Abstract: To improve routing security in MPLS network, base on the stochastic routing algorithm, we propose a proactive mechanism we call enhanced secure heuristic-stochastic routing (ESHSR) , which brings to bear Bayesian principle, explores the existence of multiple routes and forces packets to take alternate paths probabilistically. In this paper, we investigate game theoretic techniques to develop routing policies which make interception and eavesdropping maximally difficult. Through simulations, we validate our theoretical results and show how the resulting routing algorithms perform in terms of the security/delay/drop-rate, and we contrast them with the mechanism, secure stochastic routing (SSR). We observed that our scheme makes routing more secure than traditional secure stochastic routing, as they make use of the information of detecting the other side’s behavior.
Competition Policy under Economic Recessions: Historical Changes and Implications  [PDF]
Pinguang Ying
Modern Economy (ME) , 2013, DOI: 10.4236/me.2013.43A026
Abstract:

Before the current financial crisis, economic recessions in history were always accompanied by relaxation or abandon of competition policy. However, in the current financial crisis, although different jurisdictions have different practices, most jurisdictions have kept the bottom line of competition policy enforcement. Such historical transformation roots in deep reflections on historical failures and the popularization of competition policy as well as the strengthening of the competition authorities. Chinais one of the few countries still weakening competition policy enforcement during the current financial crisis. In fact, there are several mechanisms contained in competition laws and policies, such as the exemption of cartels, the defense of business concentrations and the coordination between competition authorities and sector regulators, which provide some space of flexible competition policy enforcement during economic recessions. Considering China’s short history of competition policy enforcement and consistent tradition of government intervention in economy, it is strongly advised to hold on the bottom line of competition policy and pay more attention to government-led anti-competitive conducts during economic recessions.

Cointegration Analysis and ECM of Industrial Economy and Direct Foreign Investments of China  [PDF]
Ying Yin
iBusiness (IB) , 2013, DOI: 10.4236/ib.2013.51B008
Abstract: Based on cointegration theory and Granger causality test, applied on the gross domestic production of industry and direct foreign investments economic statistic data from 1983 to 2010 of China to analyze the long and steady dynamic equilibrium relations. Research results indicate that there is long-term stable one-way Granger causality relationship between the growth of gross domestic production of industry and direct foreign investments. The growth of direct foreign investments affect the growth of gross domestic production of industry, but industrial economic growth is not the reasons of the direct foreign investments.
Study on Sport Injuries among College Students in Wuhan  [PDF]
Ying Zhao
Advances in Physical Education (APE) , 2013, DOI: 10.4236/ape.2013.32015
Abstract:

Objective: To investigate the characteristics and the precaution of and reduction of sport injuries among college students in Wuhan, and to provide evidence for the prevention. Methods: Stratified and cluster random sampling method was used to choose 1103 students from a university in Wuhan. A self-designed questionnaire was used to investigate the characteristics of sport injuries among172 college students who had experienced sport injuries. Results: The incidence of sport injuries among college students in Wuhan was 15.59%. Sport injuries were closely related with sports events, sports technique, physical condition of exerciser, and ground equipment. The incidence of sport injuries was higher in basketball, soccer and physical fitness exercise. Sport injuries were mainly soft tissue damage. The locations of injuries were primary in ankle joint (56.69%). Injuries induced by basketball & soccer were prone to occur in physical education class, while injuries caused by physical fitness exercise were prone to occur in extracurricular activities. Conclusion: The incidence of sport injuries was higher in basketball & soccer, and sport injuries were prone to occur in physical education class. It was imperative to strengthen the measures of prevention and intervention in college sport injuries.

Positive Solutions for Singular Boundary Value Problems of Coupled Systems of Nonlinear Differential Equations  [PDF]
Ying He
Journal of Applied Mathematics and Physics (JAMP) , 2014, DOI: 10.4236/jamp.2014.29102
Abstract:

We establish the existence of positive solutions for singular boundary value problems of coupled systems \"\"

The proof relies on Schauder’s fixed point theorem. Some recent results in the literature are generalized and improved.




Existence and Uniqueness of Positive Solutions for Fourth-Order Nonlinear Singular Sturm-Liouville Problems  [PDF]
Ying He
Journal of Applied Mathematics and Physics (JAMP) , 2014, DOI: 10.4236/jamp.2014.29099
Abstract:

By mixed monotone method, we establish the existence and uniqueness of positive solutions for fourth-order nonlinear singular Sturm-Liouville problems. The theorems obtained are very general and complement previously known results.

Moral Rights in the Information Society  [PDF]
Ying Zhou
Beijing Law Review (BLR) , 2014, DOI: 10.4236/blr.2014.52010
Abstract:

This essay mainly concentrates on the value of moral rights in this ever-developing society. Above all, the background of moral rights is provided, giving us a brief introduction. There are two categories of rights in copyright system; one is economic rights, which can bring economic interests to right holders directly; the other one is moral rights, which stands for the creator’s personality but can’t produce economic interests directly. As to international regulation, Art.6 bis of the Berne Convention has some clauses on such rights. In moral rights system, rights are divided into four kinds: the right to be identified as an author or a director—the paternity right or the right to be identified; the right to object to derogatory treatment of work—the integrity right; the false attribution of work—the false attribution right; and the right to privacy of certain photographs and films—the privacy right. All these rights are beneficial as they can protect creators’ rights from the four aspects. Form this standpoint, it is reasonable to grant moral rights. However, in the following, some shortcomings of moral rights are to be displayed as these rights are unable to meet the requirements of the modern society. With the advent and development of internet, collectivization, digitization and employment, some measures should be taken so as to adjust the moral rights system to keep pace of the society. From my standpoint, it is still justified to keep moral rights existing but we should make some adaptations of them in order to meet the needs of this digital era and the information society.

Page 1 /20728
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.