Ji-Jiang Yang
Tsinghua University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ji-Jiang Yang.
Applied Physics Letters | 1996
B. W. Lim; Q. Chen; Ji-Jiang Yang; M. Asif Khan
This letter reports on the fabrication and characterization of visible‐blind ultraviolet photoconductors using single‐crystal AlxGa1−xN layers deposited on basal plane sapphire substrates. With aluminum mole fractions ranging from 5% to 61%, the long‐wavelength cutoff can be varied from 350 to 240 nm. Photoresponsitivities as high as several hundred amperes per watt were measured with 10 μm interelectrode spacing.
2012 IEEE International Conference on Emerging Signal Processing Applications | 2012
Mridul Khan; Sheikh Iqbal Ahamed; Miftahur Rahman; Ji-Jiang Yang
Natural user interfaces that detect gestures from acceleration data require fast and highly accurate signal matching algorithms to provide fluid interaction. In this paper, we contribute a novel system that uses Haar transform and Support Vector Machines for accelerometer-based gesture recognition. We benchmarked it using the uWave gesture library and found around 99% recognition accuracy after tenfold cross validation. Our method is better than those currently in the literature in terms of both accuracy and computational complexity. It also eliminates the necessity of personalized training and template adaptation. High accuracy and low computational complexity makes the proposed method suitable for gesture recognition using any kind of accelerometer equipped device.
computer software and applications conference | 2012
Lei Chen; Ji-Jiang Yang; Qing Wang
The practice of using electronic medical records (EMR) to store healthcare data instead of traditional paper is becoming popular, as its widely believed that the efficiency of medical institution could be improved and the cost could be reduced by using EMR. Nevertheless, EMR makes the sensitive healthcare data much easier to collect, process, store and publish. The change has increased the privacy risk of patients significantly. There are still many problems about patients privacy protection in practical application, although many methods have been proposed to handle privacy risk when using EMR. Many hospitals are trying to make use of accumulated free text EMR for medical research and training. However, the hospitals may lose control with the EMR as the EMR may be transferred to different organizations in such application. And properly dealing with patients privacy in EMR is an important requirement to avoid privacy leakage in such applications. In this paper, we study the privacy protection challenge those Hospitals are facing when they try to share EMR with other institutions. Then, we identify the major problems that make the traditional privacy preserving methods not suitable to process free text EMR, especially for free text Chinese EMR. Furthermore, we propose a new method to solve the problems and design a privacy-preserving data publishing system for electronic medical records based on it. Experiments with real-life data is showed to evaluate the new method.
high assurance systems engineering | 2014
Farzana Rahman; Drew Williams; Sheikh Iqbal Ahamed; Ji-Jiang Yang; Qing Wang
The integration of sensing capability into active RFID tags has recently generated a lot of interest among the RFID community. In any sensor enabled Radio Frequency Identification (RFID) system data collection is done continuously. Data collection in this context can refer to the computation of statistical means and moments, as well as other cumulative quantities that summarize the data obtained by the system. However, these systems are usually very critical and used in sensitive applications. One such application area is healthcare where sensor enabled RFID tags are used in hospitals and clinics to provide various healthcare services by collecting different environmental and physiological data. In these types of healthcare services, the leakage of any raw data may lead to privacy violation of the system and the application users (in this case patient) in general. In such sensor enabled RFID based healthcare applications, privacy preservation cannot be accomplished using different cryptographic techniques because they involve heavy computation which is not feasible for resource constrained tags. Moreover, in these types of system, it is desirable to have end-to-end security with the data decrypted only at the reader in order to avoid security vulnerabilities as much as possible. Ensuring system security and preserving data privacy are two conflicting goals. To address this problem, we propose a privacy preserving data collection technique (PriDaC) for sensor enabled RFID based healthcare application. In PriDaC the data secrecy maintenance and data privacy protection mechanisms work cooperatively. To the best of our knowledge, it is the first work that allows privacy preserving data collection in sensor enabled RFID systems that provides healthcare services.
international conference on smart homes and health telematics | 2013
Farzana Rahman; Sheikh Iqbal Ahamed; Ji-Jiang Yang; Qing Wang
With the rise of Healthcare IT infrastructures, the need of healthcare data sharing and integration has become extremely important. Cloud computing paradigm is one of the most popular healthcare IT infrastructures for facilitating electronic health record sharing and integration. Many predict that managing healthcare applications with clouds will make revolutionary change in the way we do healthcare today. Enabling the access to ubiquitous healthcare not only will help us improve healthcare as our data will always be accessible from anywhere at any time, but also it helps cutting down the costs drastically. However, since healthcare data contains lots of sensitive private information, how to protect data privacy within the untrusted cloud is facing a huge challenge. Thus, a mechanism to protect the privacy of healthcare data is needed when these data are stored and processed within the cloud to provide various medical services. To address this issue, in this paper, we present a generic framework named PriGen that preserves the privacy of sensitive healthcare data in the cloud. PriGen allows the users to preserve privacy while accessing cloud based healthcare service without the help of a trusted third party. With making use of homomorphic encryption function on sensitive private information; our proposed framework maintains confidentiality of private information sent by the cloud users to untrusted cloud based healthcare service providers. In this paper, we also present a brief discussion of different components of PriGen framework.
computer software and applications conference | 2011
Lei Chen; Ji-Jiang Yang; Qing Wang; Ming-yu Wang
As lots of cities are facing a new baby boom in China and rural areas are facing a serious shortage of medical resources, Chinas maternal and child health care system is facing a lot of problems. In this paper we introduce an intelligent information system for maternal and child health care based on Body area networks and Cloud computing technologies. Wearable sensors are used for detecting physical signs. Cloud computing and data mining technologies is used for fast data processing and medical models design. First, we will give a detailed introduction about the system design. Second, the system architecture will be carefully explained. Third, we will introduce an implementation of the system. At last, we will give a conclusion about our current work and introduce our future research directions.
international conference on e-health networking, applications and services | 2012
Farzana Rahman; Sheikh Iqbal Ahamed; Ji-Jiang Yang; Qing Wang
RFID has received considerable attention within the healthcare for almost a decade now. The technologys promise to efficiently track hospital supplies, medical equipment, medications and patients is an attractive proposition to the healthcare industry. However, the prospect of wide spread use of RFID tags in healthcare has also triggered discussions regarding privacy, particularly because RFID data in transit may easily be intercepted. In a nutshell, this technology has not really seen its true potential in healthcare since privacy concerns raised by the tag bearers are not properly addressed by existing protocols and frameworks. The two major types of privacy preservation techniques that are required in an RFID based healthcare are: 1) a privacy preserving authentication protocol is required while sensing RFID tags for different identification and monitoring purposes 2) a privacy preserving access control mechanism is required to restrict unauthorized access of private information while providing healthcare services using the tag ID. In this paper, we propose a component based framework (PriSens-HSAC) that makes an effort to address the above mentioned two privacy issues. To the best of our knowledge, this is the first framework to provide better privacy in RFID based healthcare systems, using authentication and access control technique.
computer software and applications conference | 2010
Jia Shang; Ji-Jiang Yang; Qing Wang; Hui Pan
Medical Simulation is becoming more and more important training mode for hospitals. How to evaluate training effects is an interesting topic in a medical simulation training center. This paper tries to introduce a framework of Medical Simulation Education and Evaluation System (MSEES). After identifying its problems, an improved MSEES for supporting SaaS is given. The improved MSEES is rule-based. By using rules engine technology, it can separate business rules from system code so that tutors can customize the rules independently and update it dynamically. This can greatly increases the flexibility and maintainability of MSEES.
computer software and applications conference | 2014
Ivor D. Addo; Ji-Jiang Yang; Sheikh Iqbal Ahamed
With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, trust and privacy concerns continuously surface as a key deterrent to the adoption of these emergent technologies. The ensuing literature presents a Secure, Private and Trustworthy protocol (named SPTP) that was prototyped for addressing critical security, privacy and trust concerns surrounding mobile, pervasive and cloud services in Collective Intelligence (CI) scenarios. The efficacy of the protocol and its associated characteristics are evaluated in CI-related scenarios including multimodal monitoring of Elderly people in smart home environments, Online Advertisement targeting in Computational Advertising settings, and affective state monitoring through game play as an intervention for Autism among Children. We present our evaluation criteria for the proposed protocol, our initial results and future work.
Advances in Computers | 2016
Farzana Rahman; Ivor D. Addo; Sheikh Iqbal Ahamed; Ji-Jiang Yang; Qing Wang
Abstract The global phenomena of mobile technology have encouraged collaborations between national governments and diverse international stakeholders in applying mobile-based health (mHealth) solutions as a powerful opportunity for improving health and development in rural and remote areas. A significant impact offered by modern mHealth technologies includes the potential to transform various aspects of healthcare, improving accessibility, quality, and affordability. Over the years, mHealth has become important in the field of healthcare information technology as patients begin to use mobile-based medical sensors to record their daily activities and vital signs. The rapid expansion of mobile information and communications technologies within health service delivery and public health systems has created a range of new opportunities to deliver new forms of interactive health services to patients, clinicians, and caregivers alike. The scope and scale of mHealth interventions range from simple direct-to-individual consumer and interactive patient-provider communications to more complex computer-based systems facilitating coordinated patient care and management.