Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shaochun Zhong is active.

Publication


Featured researches published by Shaochun Zhong.


international conference on scalable computing and communications | 2009

A Utility-Based Dynamic Bandwidth Allocation Algorithm with QoS Guarantee for IEEE 802.16j-Enabled Vehicular Networks

Ridong Fei; Kun Yang; Shumao Ou; Shaochun Zhong; Lixun Gao

In this paper, we propose a utility-based uplink dynamic bandwidth allocation (DBA) algorithm for the IEEE 802.16j-enabled vehicular network. In the proposed DBA algorithm, a utility function, which considers characteristics of different types of service, is designed, and the utility of the total network is formulated. The objective of the proposed DBA algorithm is to allocate bandwidth to different types of service with quality of service (QoS) considered, by maximizing the utility of the overall network and further minimizing the average queuing delay of the overall system, with reasonable consideration to the required minimum bandwidth of different types of service, rtPS, nrtPS and BE. The solution to the problem of maximizing the utility of the total network is solved by using Lagrange multipliers with relaxed constraints. The simulation results have shown the effectiveness and efficiency of the proposed DBA algorithm.


international conference on networking | 2005

A prediction-based location update algorithm in wireless mobile ad-hoc networks

Jun Shen; Kun Yang; Shaochun Zhong

Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. The essence of PLU lies in the integration of location prediction and one-hop broadcasting of location update packets. The full PLU algorithm and its associated data structure are described in the paper. The simulation results have shown an improved performance of PLU thanks to its newly introduced type of updates where location prediction is applied to reduce the number of packets or bytes transmitted for location update purpose whereas keeping a high accuracy level of location information.


international conference on innovative computing, information and control | 2006

Routing Protocols for an Integrated Cellular and Ad-hoc Network with Flexible Access and Their Overhead Analysis

Yumin Wu; Kun Yang; Shaochun Zhong; Wenyong Wang; Jun Shen

This paper proposes an adaptive routing protocol called ARFA for an integrated cellular and ad hoc heterogeneous network with flexible access (iCAR-FA). An iCAR-FA system offers a flexible traffic diversion mechanism that allows a mobile host to utilize the bandwidth in another cell, as such easing the congestion problem and increasing the throughput in a cellular network. Based on the presentation of the iCAR-FA physical characteristics, the paper details the design issues and operation of ARFA. Detailed numerical analysis on routing overhead, which is along with some general evaluations, has indicated the effectiveness and efficiency of the ARFA protocol


computational intelligence and security | 2005

A mobile agent based spam filter system

Xiaochun Cheng; Xiaoqi Ma; Long Wang; Shaochun Zhong

A new distributed spam filter system based on mobile agent is proposed in this paper. We introduce the application of mobile agent technology to the spam filter system. The system architecture, the work process, the pivotal technology of the distributed spam filter system based on mobile agent, and the Naive Bayesian filter method are described in detail. The experiment results indicate that the system can prevent spam emails effectively.


international conference on artificial reality and telexistence | 2006

Virtual biology modeling method based on validity confirmation mechanism

Ying Liang; Wenyong Wang; Shaochun Zhong; Qingrong Zhang; Yao Wang; Xiaolin Quan; Qian Xu

The problem of the existing constructing process for virtual biology model is that it is not analyzed whether the enacted initial condition of the judgment model is reasonable or satisfying with the natural biological rule. Based on this, we propose an idea to construct the virtual biology model using validity confirmation mechanism method. The novel mothod considers both the complexity of the system model, and the characteristics of alternation and cooperation between various essential factors. The feasibility of the new mechanism is confirmed in the biology teaching.


international conference on artificial reality and telexistence | 2006

Modeling of Artificial Life Based Virtual Fish Behavior

Xiaolin Quan; Shaochun Zhong; Wenyong Wang; Qian Xu; Ying Liang; Qingrong Zhang

Conventional virtual biology behavior cartoon has some shortages because that it is realized by means of key frames technology. We proposed a virtual biology behavior model based on artificial life method. Giving an example of virtual fish, we have realized many kinks of virtual fish behaviors simulations by combining artificial life method and the virtual reality technique, without need of any key frame. The virtual model owns not only the basic characteristics of virtual biology, but also high trueness, which can be used in the virtual biology education and experiment


computational intelligence and security | 2005

An agent based education resource purvey system

Xiaochun Cheng; Xin He; Xiaoqi Ma; Dongdai Zhou; Peijun Duan; Shaochun Zhong

Most current education organizations use books and CDs as the main media, which takes a long time for knowledge updating between education resource providers and the users. The rapid development of the Internet has brought with it the possibility of improving the resource purveying mechanisms. Therefore, we designed an agent based system to purvey education resources from the resource centre to schools through the Internet. Agent technology helps to improve system performance and flexibility. This paper describes the design of our system, details the functions of the main parts of the system, shows the communication methods between agents and finally evaluates the system by experiments.


web age information management | 2003

Data Securing through Rule-Driven Mobile Agents and IPsec

Kun Yang; Xin Guo; Shaochun Zhong; Dongdai Zhou; Wenyong Wang

While IP Virtual Private Network (VPN), especially its branch IPsec (IP Security), turns out to be a practical solution for secure data exchange through the Internet, it is suffering from the tedious deployment procedure due to the shortage of centralized network management capabilities, and this can easily causes safety outages. This paper proposes to use mobile agents to automate this deployment procedure so as to reach the final goal of real-time data securing across the Internet. The intelligence of mobile agents comes from rules guiding the management of IPsec as proposed by IETF Policy-based Network Management method. An object-oriented policy information model for IPsec is presented. A case study of inter-domain IPsec provisioning, a typical mechanism coping with data security across multiple domains, demonstrates the design and implementation of this data securing mechanism.


Archive | 2004

A mobile agent based intrusion detection system

X He; Xiaoqi Ma; Xiaochun Cheng; X Yu; Shaochun Zhong


Archive | 2004

Knowledge Management for E-Learning System

P Sun; Xiaoqi Ma; Xiaochun Cheng; X Yu; Shaochun Zhong

Collaboration


Dive into the Shaochun Zhong's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiaoqi Ma

University of Reading

View shared research outputs
Top Co-Authors

Avatar

Wenyong Wang

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dongdai Zhou

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Jun Shen

Beijing Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Qian Xu

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Qingrong Zhang

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Xiaolin Quan

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar

Ying Liang

Northeast Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge