Jiao Hongqiang
Handan College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jiao Hongqiang.
international conference on advanced computer theory and engineering | 2010
Jia Limin; Jiao Hongqiang; Liu Jie
Dynamic program slice is a program subset which contains variable values affecting some interesting point in program and some controlling predication. This paper presents a dynamic program slicing algorithm which simplifies dependence. The purpose of algorithm is to solve the problem that H. Agrawals dynamic slicing is not accurate. The algorithm determines data dependence node, control dependence node and reachable node to calculate variable slice by program path. The experiment results show that it improves precise of dynamic program slicing and reduces complexity of dynamic slicing.
international symposium on computer science and computational technology | 2008
Jiao Hongqiang; Tian Junfeng; Wang Baomin
This paper utilizes Stern-Brocot tree to produce secret key and designs an encryption schemes, which achieve one-time padding. Then, the security and compute complexity analysis for the scheme is finished.
international convention on information and communication technology, electronics and microelectronics | 2010
Ding Wanning; Jia Limin; Jiao Hongqiang
In this paper, a multiscale fluid model based on Navier-Stokes is proposed, and the operator splitting method is employed to split the model into advection term, diffusion term, external force term and projection term. Every step is stable, so the whole process is also stable. The idea of using particle system to modify the Navier-Stokes equations was raised. And at the same time, “vorticity confinement” is used to enhance the real-time simulation. Compared with the traditional technique, this method can be taken for realistic animation and real-time simulation for smoke in two-dimensional space.
international conference on industrial and information systems | 2010
Jia Limin; Ding Wanning; Jiao Hongqiang
Based on the analysis that H.Agrawals slicing algorithm produced imprecise result for Circular program, from which a conclusion was drawn that the reason for the imprecision was that the dependence relation of the relied graph was defined too coarsely. Upon which, dynamic program slice algorithm of optimizing dependence was proposed, the connection of the states in a program can be denoted by arrival states, pass through layers by layers, the program structure and the connection of program states can be denoted clearly, improved the accuracy of dynamic program slicing.
international conference on computer modeling and simulation | 2010
Ding Wanning; Jiao Hongqiang
In this paper, a multiscale fluid model based on Navier-Stokes is proposed, and the operator splitting method is employed to split the model into advection term, diffusion term, external force term and projection term. Every step is stable, so the whole process is also stable. And at the same time, “vorticity confinement” is used to enhance the real-time simulation. Compared with the traditional technique, this method can be taken for realistic animation and real-time simulation for smoke in two-dimensional space.
international conference on computer design | 2010
Jiao Hongqiang; Zhang Yanjun; Duan Jing
This paper presents a kind of mutual authentication scheme based on Trusted Computing Platform and smart card for enhancing the security of the system. It accomplishes mutual authentication safely between user and remote trusted server with low computation quantity and less communication, meanwhile, it can resist replay attack and forgery attack effectively. Finally, the article finishes security analysis and computation complexity for the scheme.
international conference on computer application and system modeling | 2010
Wang Baomin; Li Ning; Jiao Hongqiang
This paper propose a VPN scheme based Trusted Computing Platform with discussing the two main technologies used to implement them today: IPSEC and SSL. This papers main idea is according users situation, choosing the appropriate VPN authentication pattern,and improving the security of the terminal user with the Trusted Computing Platform (TCP). Finally, give the authentication scheme in the client to site pattern and the security analysis.
ieee international conference on information management and engineering | 2010
Jiao Hongqiang; Ding Wanning
This paper propose a conception named Trusted Grid and design the model of it, which makes grid computing integrated with trusted computing. The model establishes the trusted grid field by trusted evaluation and adopts security strategy: identity authentication, digital signature, intrusion tolerant for improving on the security and reliability of new grid security and trust (NGST). In addition, this model has a better ability of defending attack.
International Journal on Advances in Information Sciences and Service Sciences | 2012
Jiao Hongqiang; Jia Limin; Jin Yanhua
Optik | 2015
Jiao Hongqiang; Jia Limin; Ding Wanning; Li Na