Bio: Bo Chen is an academic researcher from University of Science and Technology of China. The author has contributed to research in topics: Power optimization & Pyrolysis. The author has an hindex of 3, co-authored 6 publications receiving 31 citations.
17 Aug 2011
TL;DR: In this paper, an active anti-plug-in online game system and an anti plug-in method thereof are presented, where the game server and the game client side are controlled by a game player.
Abstract: The invention discloses an active anti-plug-in online game system and an anti-plug-in method thereof. The system comprises a game server and a game client side; data interaction is performed between the game server and the game client side through a communication network; and the game client side is controlled by a game player. The system is characterized in that the game client side is provided with an anti-plug-in component which is loaded when an online game runs; after being successfully logged in, the game client side and the game server perform a seed cipher key, symmetric encipherment algorithm and message authentication code generation algorithm for safety negotiation data communication; the anti-plug-in component is in charge of actively monitoring the online game client side, encrypting monitored results through the symmetric encipherment algorithm after safety negotiation and sending the monitored results to the game server; and the game server is provided with a server terminal anti-plug-in system which decrypts and verifies the monitored results from the game client side according to relevant cryptographic algorithms after the safety negotiation, and performs query matching on the monitored results from the game client side to identify whether the game client side uses an plug-in program. The system is bound to game process, organically combines a data security communication technology with a client side protection technology, and can efficiently and securely defends various plug-in technologies.
TL;DR: This work presents a method to use MARTE/CCSL as a high level specification language for modelling, then mapping MARTe/ CCSL behavior model to timed Input/Output automata, then using an integrated tool (UPPAAL-TIGA) to verify the safety, liveness, and fairness thereof.
Abstract: Modelling and Analysis of Real-time and Embedded systems (MARTE) as a domain-specific language is widely used for designing, analysing, and the building of cyber physical systems (CPS). It also provides CCSL as a purely declarative language for expressing logical and chronometric constraints on clocks. Although MARTE/CCSL is powerful expressively, it lacks formal semantics-based language support for describing and analysing. Semantic support, such as timed Input/Output automata not only provides modelling and analysis of timing behaviors, it also provides modelling of the Input/Output behaviors in a direct sense compared to timed automata. The Input/Output behavior can verify the casual relationship between components, one of the most important behaviors is the fairness between components. Thus, to improve the capacity of modeling and verification of the MARTE/CCSL behavior model, we present a method to use MARTE/CCSL as a high level specification language for modelling, then mapping MARTE/CCSL behavior model to timed Input/Output automata, then using an integrated tool (UPPAAL-TIGA) to verify the safety, liveness, and fairness thereof. Finally, we demonstrate the proposed transformation method using a Telerobot control system of real-time systems.
••09 Dec 2014
TL;DR: An optimization mechanism to buffer the network packages is presented, classified according to the urgency of application, and then combined with the original Power Save mode mechanism of WiFi to dynamically regulate the data transmission to improve the network response time and reduce the energy consumption of WiFi for background application.
Abstract: To improve user experience, reducing energy consumption of a wireless device is an important factor. Several smartphones try to save energy by tearing down connections to the mobile network as soon as the data transmission has completed. However, the side effect is the frequent connection reestablishment in applications where small amounts data are sent and received, leading to a high energy overhead in the mobile network. This paper presents an optimization mechanism to buffer the network packages. The packages are classified according to the urgency of application, and then combined with the original Power Save (PS) mode mechanism of WiFi to dynamically regulate the data transmission. Therefore, urgent application data will be transmitted immediately while others would be delayed for different intervals. Our experiments show that the optimization mechanism can improve the network response time for the foreground application, reduce the energy consumption of WiFi for background application, as well as reduce the energy consumption for background application when the screen is locked.
TL;DR: In this article , the effects of different heating rates and mixing ratios were investigated, the kinetics of the pyrolysis reaction were calculated in detail, and the composition of the volatile fraction was studied.
Abstract: In the future, wind turbine blade waste will increase significantly. However, there is no proper treatment plan for this condition. Pyrolysis is one of the most feasible methods for recycling waste wind turbine blades. In this paper, the thermal degradation behaviors of epoxy resin mixed with carbon fiber applied in wind turbine blade base components were studied by thermogravimetric analysis, thermogravimetric-Fourier transform infrared spectroscopy and tube furnace. The effects of different heating rates and mixing ratios were investigated, the kinetics of the pyrolysis reaction were calculated in detail, and the composition of the pyrolysis volatile fraction was studied. The results showed that increasing the heating rate was more favorable for the pyrolysis characteristics of mixed samples. However, it would reduce the degree of pyrolysis, showing a different pattern from that of the pure epoxy resin. The activation energy of pyrolysis was calculated by the Coats and Redfern method and Flynn–Wall–Ozawa method, and the effects of the mixing ratio on the activation energies of the samples were greater than those of the heating rate. During the thermal decomposition of the sample, mainly carbon–oxygen compounds, methane, alkanes, olefins, carboxylic acids and aromatic compounds were produced. The pyrolysis of the mixture could be divided into three steps based on the product characteristics combined with kinetic calculation results. According to the tube furnace results, the best calorific value and recovery value of gaseous products are obtained with the sample proportion closest to the actual component. In general, the copyrolysis of carbon fiber and epoxy resin is much more complicated than that of epoxy resin alone, and the addition of carbon fiber eases the epoxy resin pyrolysis process, which does not exclude the existence of synergistic effects in the pyrolysis process; additionally, the difference in pyrolysis behavior is greater under different mixing ratios. Based on this phenomenon, basic data support was provided for further research on the pyrolysis and recycling process of waste wind turbine blades.
TL;DR: This article investigates and analyzes the key technologies of IEEE 802.11be including multi-band operation, multi-AP coordination, enhanced link reliability, and latency & jitter guarantee and gives a brief overview on the standardization process.
Abstract: The IEEE 80211ax for Wireless Local Area Network (WLAN), one of the most important wireless networks, will be released in 2020 In recent years, ultra-high definition video service and real-time applications attract increasing attention Therefore, the next generation WLAN (beyond IEEE 80211ax): IEEE 80211be task group (TGbe) was formally established in 2019, which regards achieving extremely high throughput (EHT) as its core technical objective This article investigates and analyzes the key technologies of IEEE 80211be, and further provides our perspectives and insights on it Specifically, this article gives a brief overview on IEEE 80211be, including the target scenario and technical objective, key technologies overview, and the standardization process After that, we further investigate, analyze and provide perspectives on the key technologies of IEEE 80211be including multi-band operation, multi-AP coordination, enhanced link reliability, and latency & jitter guarantee To the best of our knowledge, this is the first work to investigate, analyze and provide insights on IEEE 80211be
TL;DR: This work proposes the combined application of two verification techniques: model checking with UPPAAL and CoFI (Conformance and Fault Injection) model based testing with ConData, and compares the proposed processes to the traditional CoFI and UPPAal stand-alone processes.
Abstract: With the purpose of making the use of model based techniques in industrial software development more efficient, this work proposes the combined application of two verification techniques: model checking with UPPAAL and CoFI (Conformance and Fault Injection) model based testing with ConData. This combination is supported by ConTEA, a software tool for automatically connecting UPPAAL to ConData, and, therefore, explore both techniques simultaneously. We present the tool and discuss the use of ConTEA in two different development processes. The first process investigates how CoFI can contribute to identify gaps in the specification and implicit assumptions made by engineers when applying model checking. The second process focuses on how model checking can improve the development and verification of the models that are used for model based testing. The proposed processes were applied to three case studies. Based on them, we compare the proposed processes to the traditional CoFI and UPPAAL stand-alone processes. The results indicate that the combined use of the two verification technique contributes to the identification of a large range of diversified errors and problems early in the development cycle.
•09 Mar 2014
TL;DR: In this article, an online game anti-cheating method is presented, which includes sending cheating program characteristics to a client and receiving characteristics matching with cheating program attributes reported by the client.
Abstract: An online game anti-cheating method is provided. The method includes sending cheating program characteristics to a client and receiving characteristics matching with cheating program characteristics reported by the client. The method also includes matching the reported characteristics with characteristics in at least one stored characteristic list and obtaining a determination result based on a matching result. Further, the method includes returning the determination result to the client and to cause the client to react to the determination result.
11 Nov 2015
TL;DR: In this paper, the authors proposed a method for reducing the power consumption of the Wi-Fi network interface card based on data importance, characterized in that the method includes the following steps: (1) assessing the application which requests the network data, and determining a delayed sensitivity level of the application; (2) based on the delayed sensitivity levels of application, via a corresponding wifi power consumption optimization scheme, configuring a wifi network interfaces card for controlling the transmission of network data.
Abstract: The invention discloses a method for lowering wifi power consumption based on data importance, characterized in that the method includes the following steps: (1) based on the sensitivity to network data of an application which requests the network data, assessing the application which requests the network data, and determining a delayed sensitivity level of the application; (2) based on the delayed sensitivity level of the application, via a corresponding wifi power consumption optimization scheme, configuring a wifi network interface card for controlling the transmission of the network data. The method herein can reduce tail part energy consumption of the network interface card. The delay in waking up the network interface card can increase the time when the network interface card is in sleep mode.
07 Nov 2012
TL;DR: In this paper, a delay calculation method based on game movement logic client and server synchronization is proposed, where a game player sends a movement request on a client, the client calculates a time point K; a server is requested to carry out movement logic calculation at the time point k; and the server sends a calculation result to the client, and the client obtains the calculation result sent by the server.
Abstract: The invention provides a delay calculation method based on game movement logic client and server synchronization. The delay calculation method comprises the steps that: a game player sends a movement request on a client; the client calculates a time point K; a server is requested to carry out movement logic calculation at the time point K; the client and the server simultaneously carry out the movement logic calculation at the time point K; and the server sends a calculation result to the client; and the client obtains the calculation result sent by the server, and checks the calculation result of the client and the calculation result of the server, wherein an inertia motion value which is not controlled by the game player is given for a role controlled by the game player in a game. With the adoption of the delay calculation method provided by the invention, not only can the phenomenon of modifying game data by using a plug-in tool and the like be effectively avoided, but also the negative effects caused by the network delay in a client and server synchronization calculation movement logic process can be effectively avoided.