Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 2 )

2019 ( 253 )

2018 ( 1908 )

2017 ( 1803 )

Custom range...

Search Results: 1 - 10 of 120187 matches for " Yulong Wang "
All listed articles are free for downloading (OA Articles)
Page 1 /120187
Display every page Item
Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack
Yulong Zou,Gongpu Wang
Mathematics , 2015,
Abstract: This paper studies the intercept behavior of an industrial wireless sensor network (WSN) consisting of a sink node and multiple sensors in the presence of an eavesdropping attacker, where the sensors transmit their sensed information to the sink node through wireless links. Due to the broadcast nature of radio wave propagation, the wireless transmission from the sensors to the sink can be readily overheard by the eavesdropper for interception purposes. In an information-theoretic sense, the secrecy capacity of the wireless transmission is the difference between the channel capacity of the main link (from sensor to sink) and that of the wiretap link (from sensor to eavesdropper). If the secrecy capacity becomes non-positive due to the wireless fading effect, the sensor's data transmission could be successfully intercepted by the eavesdropper and an intercept event occurs in this case. However, in industrial environments, the presence of machinery obstacles, metallic frictions and engine vibrations makes the wireless fading fluctuate drastically, resulting in the degradation of the secrecy capacity. As a consequence, an optimal sensor scheduling scheme is proposed in this paper to protect the legitimate wireless transmission against the eavesdropping attack, where a sensor with the highest secrecy capacity is scheduled to transmit its sensed information to the sink. Closed-form expressions of the probability of occurrence of an intercept event (called intercept probability) are derived for the conventional round-robin scheduling and the proposed optimal scheduling schemes. Also, an asymptotic intercept probability analysis is conducted to provide an insight into the impact of the sensor scheduling on the wireless security. Numerical results demonstrate that the proposed sensor scheduling scheme outperforms the conventional round-robin scheduling in terms of the intercept probability.
Modeling Motorization Development in China  [PDF]
Junlei Wang, Xiaoduan Sun, Yulong He, Shuzhan Hou
Journal of Transportation Technologies (JTTs) , 2012, DOI: 10.4236/jtts.2012.23029
Abstract: Entering the 21st century, China’s economic development has reached new heights and the country has ascended to the world’s second largest economy. The 20 year unrelenting development in China also stimulates income growth. The increased disposable income enables an ordinary Chinese family vehicle ownership which was unthinkable two decades ago. The most populous country has started a love affair with automobile just like in the United States. Annual automobile sales in China rose from 2.1 million in 2000 to 18.1 million in 2010 with a yearly growth rate of 24.3%, which spurs the vehicle ownership increase from 18.1 million in 2000 to 78.8 million in 2010, a growth rate of 15.9% The unprecedented motorization development in China is making a huge impact on all aspects of society, including negative consequences that cannot be ignored. Traffic congestion, air pollution, and dependency on imported oil are huge emerging problems threatening Chinese sustainable development. Although these problems occurred and still exist in many other developed and developing countries, they are more acute in China today. By collecting and analyzing the massive data from various sources, this paper explores the relationship between economic development and level of mobility by studying the historical developments from several developed counties and discusses the key issues in Chinese motorization development. The objective of the study is to predict the future level of motorization and its potential impacts.
A Novel Integrated Multifunction Micro-Sensor for Three-Dimensional Micro-Force Measurements
Weizhong Wang,Yulong Zhao,Yafei Qin
Sensors , 2012, DOI: 10.3390/s120404051
Abstract: An integrated multifunction micro-sensor for three-dimensional micro-force precision measurement under different pressure and temperature conditions is introduced in this paper. The integrated sensor consists of three kinds of sensors: a three-dimensional micro-force sensor, an absolute pressure sensor and a temperature sensor. The integrated multifunction micro-sensor is fabricated on silicon wafers by micromachining technology. Different doping doses of boron ion, placement and structure of resistors are tested for the force sensor, pressure sensor and temperature sensor to minimize the cross interference and optimize the properties. A glass optical fiber, with a ladder structure and sharp tip etched by buffer oxide etch solution, is glued on the micro-force sensor chip as the tactile probe. Experimental results show that the minimum force that can be detected by the force sensor is 300 nN; the lateral sensitivity of the force sensor is 0.4582 mV/μN; the probe length is linearly proportional to sensitivity of the micro-force sensor in lateral; the sensitivity of the pressure sensor is 0.11 mv/KPa; the sensitivity of the temperature sensor is 5.836 × 10?3 KΩ/°C. Thus it is a cost-effective method to fabricate integrated multifunction micro-sensors with different measurement ranges that could be used in many fields.
Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks
Yulong Zou,Xianbin Wang,Weiming Shen
Mathematics , 2013,
Abstract: In this paper, we explore the physical-layer security in cooperative wireless networks with multiple relays where both amplify-and-forward (AF) and decode-and-forward (DF) protocols are considered. We propose the AF and DF based optimal relay selection (i.e., AFbORS and DFbORS) schemes to improve the wireless security against eavesdropping attack. For the purpose of comparison, we examine the traditional AFbORS and DFbORS schemes, denoted by T-AFbORS and TDFbORS, respectively. We also investigate a so-called multiple relay combining (MRC) framework and present the traditional AF and DF based MRC schemes, called T-AFbMRC and TDFbMRC, where multiple relays participate in forwarding the source signal to destination which then combines its received signals from the multiple relays. We derive closed-form intercept probability expressions of the proposed AFbORS and DFbORS (i.e., P-AFbORS and P-DFbORS) as well as the T-AFbORS, TDFbORS, T-AFbMRC and T-DFbMRC schemes in the presence of eavesdropping attack. We further conduct an asymptotic intercept probability analysis to evaluate the diversity order performance of relay selection schemes and show that no matter which relaying protocol is considered (i.e., AF and DF), the traditional and proposed optimal relay selection approaches both achieve the diversity order M where M represents the number of relays. In addition, numerical results show that for both AF and DF protocols, the intercept probability performance of proposed optimal relay selection is strictly better than that of the traditional relay selection and multiple relay combining methods.
Intercept Probability Analysis of Cooperative Wireless Networks with Best Relay Selection in the Presence of Eavesdropping Attack
Yulong Zou,Xianbin Wang,Weiming Shen
Mathematics , 2013,
Abstract: Due to the broadcast nature of wireless medium, wireless communication is extremely vulnerable to eavesdropping attack. Physical-layer security is emerging as a new paradigm to prevent the eavesdropper from interception by exploiting the physical characteristics of wireless channels, which has recently attracted a lot of research attentions. In this paper, we consider the physical-layer security in cooperative wireless networks with multiple decode-and-forward (DF) relays and investigate the best relay selection in the presence of eavesdropping attack. For the comparison purpose, we also examine the conventional direct transmission without relay and traditional max-min relay selection. We derive closed-form intercept probability expressions of the direct transmission, traditional max-min relay selection, and proposed best relay selection schemes in Rayleigh fading channels. Numerical results show that the proposed best relay selection scheme strictly outperforms the traditional direct transmission and max-min relay selection schemes in terms of intercept probability. In addition, as the number of relays increases, the intercept probabilities of both traditional max-min relay selection and proposed best relay selection schemes decrease significantly, showing the advantage of exploiting multiple relays against eavesdropping attack.
Rainbow connectivity of the non-commuting graph of a finite group
Yulong Wei,Xuanlong Ma,Kaishun Wang
Mathematics , 2015,
Abstract: Let $G$ be a finite non-abelian group. The non-commuting graph $\Gamma_G$ of $G$ has the vertex set $G\setminus Z(G)$ and two distinct vertices $x$ and $y$ are adjacent if $xy\ne yx$, where $Z(G)$ is the center of $G$. We prove that the rainbow $2$-connectivity of $\Gamma_G$ is $2$. In particular, the rainbow connection number of $\Gamma_G$ is $2$. Moreover, for any positive integer $k$, we prove that there exist infinitely many non-abelian groups $G$ such that the rainbow $k$-connectivity of $\Gamma_G$ is $2$.
Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks
Yulong Zou,Xianbin Wang,Weiming Shen
Computer Science , 2013,
Abstract: In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's quality of service (QoS) constraint while the eavesdroppers attempt to intercept the cognitive transmissions from CUs to CBS. We investigate the physical-layer security against eavesdropping attacks in the cognitive radio network and propose the user scheduling scheme to achieve multiuser diversity for improving the security level of cognitive transmissions with a primary QoS constraint. Specifically, a cognitive user (CU) that satisfies the primary QoS requirement and maximizes the achievable secrecy rate of cognitive transmissions is scheduled to transmit its data packet. For the comparison purpose, we also examine the traditional multiuser scheduling and the artificial noise schemes. We analyze the achievable secrecy rate and intercept probability of the traditional and proposed multiuser scheduling schemes as well as the artificial noise scheme in Rayleigh fading environments. Numerical results show that given a primary QoS constraint, the proposed multiuser scheduling scheme generally outperforms the traditional multiuser scheduling and the artificial noise schemes in terms of the achievable secrecy rate and intercept probability. In addition, we derive the diversity order of the proposed multiuser scheduling scheme through an asymptotic intercept probability analysis and prove that the full diversity is obtained by using the proposed multiuser scheduling.
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
Yulong Zou,Xianbin Wang,Lajos Hanzo
Computer Science , 2015,
Abstract: This paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial noise aided security, security-oriented beamforming, diversity assisted security, and physical-layer key generation approaches. Additionally, since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.
Interannual Variability of the Hadley Circulation Associated with Tropical Pacific SST Anomaly Interannual Variability of the Hadley Circulation Associated with Tropical Pacific SST Anomaly
GONG Xiaoqing,WANG Qi,LIU Yulong
- , 2015,
Abstract: The seasonal and interannual variability of zonal mean Hadley circulation are analyzed, and the important effects of sea surface temperature(SST), especially the tropical Pacific SST, on the meridional circulation are discussed. Following results are obtained: 1) the Hadley circulation presents a single clockwise(anticlockwise) cross-equator circulation in the Northern(Southern) Hemisphere winter,while it is a double-ring-shaped circulation quasi-symmetric about the equator in spring and autumn. The annual mean state just indicates the residual of the Hadley cell in winter and summer. 2) The first mode of interannual anomalies shows a single cell crossing the equator like the climatology in winter and summer but with narrower width. The second mode shows a double ring-shaped cell quasi-symmetric about the equator which is similar to the Hadley cell in spring or autumn. 3) Vertical motion of the Hadley circulation is driven by sea surface temperature(SST) through latent and sensible heat in the tropics, and the interannual anomalies are mainly driven by the SST anomaly(SSTa) in the tropical Pacific. 4) The meridional gradient of SSTa is well consistent with the lower meridional wind of Hadley circulation in the interannual part. For the spatial distribution, the meridional gradient of SSTa in the Pacific plays a major role for the first two modes while the effects of the Indian Ocean and the Atlantic Ocean can be ignored
The N2pc Is Increased by Perceptual Learning but Is Unnecessary for the Transfer of Learning
An An, Meirong Sun, Yun Wang, Fang Wang, Yulong Ding, Yan Song
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0034826
Abstract: Background Practice improves human performance in many psychophysical paradigms. This kind of improvement is thought to be the evidence of human brain plasticity. However, the changes that occur in the brain are not fully understood. Methodology/Principal Findings The N2pc component has previously been associated with visuo-spatial attention. In this study, we used event-related potentials (ERPs) to investigate whether the N2pc component changed during long-term visual perceptual learning. Thirteen subjects completed several days of training in an orientation discrimination task, and were given a final test 30 days later. The results showed that behavioral thresholds significantly decreased across training sessions, and this decrement was also present in the untrained visual field. ERPs showed training significantly increased the N2pc amplitude, and this effect could be maintained for up to 30 days. However, the increase in N2pc was specific to the trained visual field. Conclusion/Significance Training caused spatial attention to be increasingly focused on the target positions. However, this process was not transferrable from the trained to the untrained visual field, which suggests that the increase in N2pc may be unnecessary for behavioral improvements in the untrained visual field.
Page 1 /120187
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.