Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiao Hongqiang is active.

Publication


Featured researches published by Jiao Hongqiang.


international conference on advanced computer theory and engineering | 2010

A dynamic program slice algorithm based on simplified dependence

Jia Limin; Jiao Hongqiang; Liu Jie

Dynamic program slice is a program subset which contains variable values affecting some interesting point in program and some controlling predication. This paper presents a dynamic program slicing algorithm which simplifies dependence. The purpose of algorithm is to solve the problem that H. Agrawals dynamic slicing is not accurate. The algorithm determines data dependence node, control dependence node and reachable node to calculate variable slice by program path. The experiment results show that it improves precise of dynamic program slicing and reduces complexity of dynamic slicing.


international symposium on computer science and computational technology | 2008

A Study on the One-Time Pad Scheme Based Stern-Brocot Tree

Jiao Hongqiang; Tian Junfeng; Wang Baomin

This paper utilizes Stern-Brocot tree to produce secret key and designs an encryption schemes, which achieve one-time padding. Then, the security and compute complexity analysis for the scheme is finished.


international convention on information and communication technology, electronics and microelectronics | 2010

A new method of smoke simulation

Ding Wanning; Jia Limin; Jiao Hongqiang

In this paper, a multiscale fluid model based on Navier-Stokes is proposed, and the operator splitting method is employed to split the model into advection term, diffusion term, external force term and projection term. Every step is stable, so the whole process is also stable. The idea of using particle system to modify the Navier-Stokes equations was raised. And at the same time, “vorticity confinement” is used to enhance the real-time simulation. Compared with the traditional technique, this method can be taken for realistic animation and real-time simulation for smoke in two-dimensional space.


international conference on industrial and information systems | 2010

Study of dynamic program slice algorithm of optimizing dependence

Jia Limin; Ding Wanning; Jiao Hongqiang

Based on the analysis that H.Agrawals slicing algorithm produced imprecise result for Circular program, from which a conclusion was drawn that the reason for the imprecision was that the dependence relation of the relied graph was defined too coarsely. Upon which, dynamic program slice algorithm of optimizing dependence was proposed, the connection of the states in a program can be denoted by arrival states, pass through layers by layers, the program structure and the connection of program states can be denoted clearly, improved the accuracy of dynamic program slicing.


international conference on computer modeling and simulation | 2010

Real-Time Simulation of Smoke

Ding Wanning; Jiao Hongqiang

In this paper, a multiscale fluid model based on Navier-Stokes is proposed, and the operator splitting method is employed to split the model into advection term, diffusion term, external force term and projection term. Every step is stable, so the whole process is also stable. And at the same time, “vorticity confinement” is used to enhance the real-time simulation. Compared with the traditional technique, this method can be taken for realistic animation and real-time simulation for smoke in two-dimensional space.


international conference on computer design | 2010

A kind of authentication scheme based Trusted Computing Platform

Jiao Hongqiang; Zhang Yanjun; Duan Jing

This paper presents a kind of mutual authentication scheme based on Trusted Computing Platform and smart card for enhancing the security of the system. It accomplishes mutual authentication safely between user and remote trusted server with low computation quantity and less communication, meanwhile, it can resist replay attack and forgery attack effectively. Finally, the article finishes security analysis and computation complexity for the scheme.


international conference on computer application and system modeling | 2010

VPNs authentication scheme based Trusted Computing Platform

Wang Baomin; Li Ning; Jiao Hongqiang

This paper propose a VPN scheme based Trusted Computing Platform with discussing the two main technologies used to implement them today: IPSEC and SSL. This papers main idea is according users situation, choosing the appropriate VPN authentication pattern,and improving the security of the terminal user with the Trusted Computing Platform (TCP). Finally, give the authentication scheme in the client to site pattern and the security analysis.


ieee international conference on information management and engineering | 2010

Trusted grid model

Jiao Hongqiang; Ding Wanning

This paper propose a conception named Trusted Grid and design the model of it, which makes grid computing integrated with trusted computing. The model establishes the trusted grid field by trusted evaluation and adopts security strategy: identity authentication, digital signature, intrusion tolerant for improving on the security and reliability of new grid security and trust (NGST). In addition, this model has a better ability of defending attack.


International Journal on Advances in Information Sciences and Service Sciences | 2012

A New Network Intrusion Detection Algorithm based on Radial Basis Function Neural Networks Classifier

Jiao Hongqiang; Jia Limin; Jin Yanhua


Optik | 2015

Subjective logic application research—Rough set belief rule model and trust evaluation model of the intrusion detection system

Jiao Hongqiang; Jia Limin; Ding Wanning; Li Na

Collaboration


Dive into the Jiao Hongqiang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Liu Jie

Hebei University of Engineering

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge