Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lvqing Yang is active.

Publication


Featured researches published by Lvqing Yang.


Neural Computing and Applications | 2017

Cloud computing system risk estimation and service selection approach based on cloud focus theory

Fan Lin; Wenhua Zeng; Lvqing Yang; Yue Wang; Shufu Lin; Jiasong Zeng

Abstract The main cloud computing service providers usually provide cross-regional and services of Crossing Multi-Internet Data Centers that supported with selection strategy of service level agreement risk constraint. But the traditional quality of service (QoS)-aware Web service selection approach cannot ensure the real-time and the reliability of services selection. We proposed a cloud computing system risk assessment method based on cloud theory, and generated the five property clouds by collecting the risk value and four risk indicators from each virtual machine. The cloud backward generator integrated these five clouds into one cloud, according to the weight matrix. So the risk prediction value is transferred to the risk level quantification. Then we tested the Web service selection experiments by using risk assessment level as QoS mainly constraint and comparing with LRU and MAIS methods. The result showed that the success rate and efficiency of risk assessment with cloud focus theory Web services selection approaches are more quickly and efficient.


Journal of Intelligent and Fuzzy Systems | 2016

An improved hash-based RFID two-way security authentication protocol and application in remote education

Lvqing Yang; Qingqiang Wu; Youjing Bai; Huiru Zheng; Shufu Lin

With the increasingly expanding application of RFID technology, the security and privacy issues of RFID system has also been a widespread concern. The existing RFID security protocol can’t simultaneously meet the requirements of low-cost, low computing, high efficiency and high security. In this paper, through the analysis of common principles and shortcomings of RFID security protocols based on Hash Function, we improve the security protocols, so as to achieve the objectives of two-way authentication. This paper theoretically proves the protocol security through BAN logic. And the new protocols can effectively solve the security and privacy problems such as replay attack, fake attack, location privacy, anonymous tags and so on. The paper proposes a kind of authentication and communication security mechanism that makes full use of the functions of the conditional Access Module (CAM) which exist in the original remote education system and when authenticating the nodes of the system, we use the proposed security scheme. Analysis showed that the mechanism is safe, reliable, strong compatibility, economic and applicable.


Journal of Intelligent and Fuzzy Systems | 2016

An efficient estimation method coping with the capture effect for RFID tags identification and application in remote learning

Lvqing Yang; Guoxing Zhang; Fan Lin; Huiru Zheng

In telecommunications, the capture effect is a phenomenon associated with frequency modulation reception in which two strong signals at, or near, the same frequency or channel will be demodulated. In wireless networks, a frame collision does not necessarily result in all the simultaneously transmitted frames being lost. Depending on the relative signal power and the arrival time of the involved frames, one frame can survive the collision and be successfully received by the receiver. Efficient object identification with passive RFID tags. In former works, many researches focus on the RFID anti-collision protocol only, however, less did pay special attention to the capture effect mainly to keep the design simple and cost low. Nonetheless, the capture effect occurs frequently in real deployments. In this paper, we have taken the capture effect into consideration and combined this thought to an efficient RFID anti-collision protocol, then proposed an efficient method to estimate the optimal frame length to adjust the quantity of RFID tags. After setting an optimal frame length by using the proposed method, furthermore, we obtained higher identification efficiency. RFID technology can be used for real-time recording and tracking of the learning process, which comprises real-time records of learners and their partners learning process such as experience, debate, cooperation, competition, problem solving, and other learning experiences.


International Journal of Information and Communication Technology | 2016

Design and implementation for the elevator public service platform base on internet of things

Lvqing Yang; He Xiao Li; Wu Ming Ming; Huang Jie

Security monitoring based on IOT was applied to the elevator-equipment, it provides great convenience and security for peoples daily life. By using the basic theory of software engineering, it mainly analyses and designs functions and modules for the elevator public service platform base on IOT in the paper. On the basis of stating the importance of platform construction, it focuses on expounding the function and the non-function requirements. Then the platform structure is established and different functional modules are divided. And it makes a simple description about related development technologies at the end of the paper.


mobile adhoc and sensor systems | 2011

Research on Enterprise Application Software Project Implementation Model

Lvqing Yang; Chuan Jiang

In view of the features of enterprise application software (EAS), this paper researches on its project implementation model combining software development process and software project management. With existing software development theories and tools, we analyze the implementation of EAS project from three dimensions (Process, Management and Technique) and put forward the 3-dimension model and each dimensions core concepts and constitution. This model establishes system model and knowledge structure for implementing EAS and can be used to guide project management. At last, the paper indicates that the model is effective and reasonable.


mobile adhoc and sensor systems | 2010

The Risk Assessment of Enterprise Application Software Based on Gray Relational Analysis and FMEA

Lvqing Yang; Zhenyu Liu

In this paper, the gray relational analysis and 6 sigma of the FMEA method have been applied to enterprise applications quantitative analysis of risk factors on the basis of building enterprise application software risk index system. Using improved FMEA model and method which are based on gray relational analysis, this paper makes quantitative assessment and ranking for the risks of enterprise application software. By analyzing the examples of the enterprise application software risk assessment, the correctness and effectiveness of the model and method designed herein will be proved.


international conference on computer science and education | 2017

An improved binary search RFID anti-collision algorithm

Youjing Bai; Lvqing Yang; Guoxing Zhang; Yezi Xu

At present, radio frequency identification technology has been widely used in many fields, such as data acquisition, transportation, logistics management and so on. However, the collision problem in RFID technology seriously affects the performance of RFID system. Aimed at the shortcomings of search times and traffic by the traditional binary search algorithm, this paper propose an improved binary search algorithm based on the combination of dynamic binary search algorithm and backward binary search algorithm. Experimental results show that the improved algorithm greatly reduces search times and the amount of data transmission, thereby improving the recognition efficiency.


ieee international conference on communication problem-solving | 2016

The LC-VCO PLL frequency synthesizers with constant loop bandwidth

Ji-Wei Huang; Lvqing Yang; Shou-hui Xu

This paper precented a phase-locked loop frequency synthesizer with almost constant loop bandwidth. In order to reduce the loop bandwidth variations caused by the LC-VCO gain, a calibration system is introduced, which sets the charge-pump current to be inversely proportional to the square of the divider ratio. The frequency synthesizer with this technique was fabricated in 0.13μm CMOS process. The measured results show that this method keeps the loop bandwidth almost a constant in frequency range of 2.44G~2.8GHz while consuming less power with better in-band phase noise.


Multimedia Tools and Applications | 2016

Visualization of local wind field based forest-fire’s forecast modeling for transportation planning

Jianwei Li; Lvqing Yang; Xiaowen Li; Huiru Zheng

The forest fire occurs every year and brings huge losses to human life and property. How to predict the trend of forest fire accurately for commanders to make decisions in a very short period of time, has become a hot issue of research in recent years. In many cases, temporal and spatial variation of wind direction and wind speed become the main factors in affecting the spread of forest fire. Research on local wind field in micro scale is helpful to improve the accuracy of the prediction of forest fire spreading, but in reality, the data provided by meteorological department are large scale wind field data. Micro scale of the local wind field data mostly rely on the speculation based on the experience of people. So the system which can transform the large scale wind field data to the micro scale local wind field data to improve the prediction accuracy of forest fire spreading is especially necessary. In this paper, according to the characteristics of the near surface wind field we calculate the wind speed by the wind profile, get differential of wind direction of each grid position through the diagnosis of the wind field model, so as to realize the finer micro scale wind field in the complex topography. Wind field and forest fire model can be displayed in real time visualization platform. In the final of this paper, we selected multiple fire cases contained with the southern typical fire cases which have the complete data as the research object to analyze, and have implemented the simulation of forest fire inversion in the self-developed software FFSimulator v1. 0. The simulation of local wind field, fixed wind field and the no wind field forest fire are conducted under the conditions of the same terrain and the same combustible material. With the comparison of simulation results and the case study of forest fire burning area and spread edges, the experimental results show that the simulation using local wind field data of forest fire is more accurate in forecasting the trend of fire spreading, and can provide more favorable reference for making fire prevention and fire fighting decisions and transportation planning in forest.


ieee international conference on dependable autonomic and secure computing | 2013

Analysis and Design of Electronic Map Based on RFID and Google Maps

Zhuangliang Wu; Wenhua Zeng; Lvqing Yang; Yue Li; Meihong Wang

Google Maps is an excellent GIS (Geographic Information System) product, but its visual effect is unsatisfactory under the specific environment. As is known to all, visualization is an important aspect to evaluate the quality of electronic map. Firstly, we analyze factors of visual effect in the paper. Combining implementation mechanisms of RFID (Radio Frequency Identification Devices) and Google Maps, we designed the system of electronic map which owns a reasonable amount of displayed information, beautiful legends and fast reaction rate. After that, we made an example to verify the effectiveness of the systems performance.

Collaboration


Dive into the Lvqing Yang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge