scispace - formally typeset
Search or ask a question

Showing papers by "Zheng Yan published in 2011"


Journal ArticleDOI
TL;DR: An adaptive trust control model to specify, evaluate, establish, and ensure the trust relationships among system entities and a number of trust control modes supported by the system are proposed.
Abstract: Trust plays an important role in software systems, especially component-based systems in which components or their environments vary. This paper introduces an autonomic trust management solution for a component-based software system. We propose an adaptive trust control model to specify, evaluate, establish, and ensure the trust relationships among system entities. This model concerns the quality attributes of the entity and a number of trust control modes supported by the system. In particular, its parameters can be adaptively adjusted based on runtime trust assessment in order to reflect real system context and situation. Based on this model, we further develop a number of algorithms that can be adopted by a trust management framework for autonomic management of trust during component execution. We verify the algorithms' feasibility through simulations and demonstrate the effectiveness and benefits of our solution. We also discuss the issues for successful deployment of our solution in a component software platform.

122 citations


Journal ArticleDOI
TL;DR: In this article, a microstrip-fed printed monopole antenna is proposed for WLAN and WiMAX applications using a modified fork-shaped strip, multiple impedance bandwidths covering 2.4/5.8 GHz WLAN, and a dual L-shaped parasitic plane is inserted on the bottom of the FR4 substrate to cover the 3.5 GHz WiMAX band.
Abstract: A novel microstrip-fed printed monopole antenna is proposed for WLAN and WiMAX applications. Using a modified fork-shaped strip, multiple impedance bandwidths covering 2.4/5.2/5.8 GHz WLAN and 5.5 GHz WiMAX bands are obtained. In addition, a dual L-shaped parasitic plane is inserted on the bottom of the FR4 substrate to cover the 3.5 GHz WiMAX band. Omnidirectional radiation patterns with appreciable gains over the operating bands are obtained by the fabricated antenna with a compact size of 34.5 × 18 mm 2 . Thus, the antenna is suitable for multi-band wireless communication applications.

61 citations


Proceedings ArticleDOI
13 Oct 2011
TL;DR: A QoS framework for mobile cloud computing and an adaptive QoS management process to manage QoS assurance in mobile cloud Computing environment are presented and a QoSmanagement model based on Fuzzy Cognitive Map (FCM) is presented.
Abstract: With the rapid growth of mobile smart phone users, more and more mobile users are using mobile phones to access Internet services. Meanwhile, cloud computing is changing the landscape of Internet services, so as to affect the mobile services. Cloud computing is regarded as the future of mobile. However, cloud computing still faces a number of challenges, one of which is Quality of Services (QoS), that is, how a service provider can ensure QoS of its cloud services, especially for mobile users. In this paper, we present a QoS framework for mobile cloud computing and an adaptive QoS management process to manage QoS assurance in mobile cloud computing environment. Furthermore, we present a QoS management model based on Fuzzy Cognitive Map (FCM). With an example, we evaluate the proposed system and demonstrate its effectiveness and benefits.

43 citations


Journal ArticleDOI
Cheng Wang1, Zheng Yan1, Pengfei Xu1, Jun-Bo Jiang1, B. Li1 
TL;DR: In this paper, a trident-shaped dual-band CPW-fed monopole antenna for PCS/WLAN applications is presented, where two pairs of symmetrical strips are inserted in the middle strip of the tridentshaped antenna, and dual-frequency operating bands with 10 dB return-loss bandwidths are achieved.
Abstract: A novel trident-shaped dual-band CPW-fed monopole antenna for PCS/WLAN applications is presented. By inserting two pairs of symmetrical strips in the middle strip of the trident-shaped antenna, dual-frequency operating bands with 10 dB return-loss bandwidths of 33.7 % , ranging from 1.80 to 2.53 GHz, and of about 1100 MHz centred at 5.5 GHz have been achieved. They cover the required bandwidths of the PCS band (1.85 1.99 GHz) and WLAN bands (2.4 2.484 and 5.15 5.825 GHz). Also, good radiation patterns, and 3.6 and 9.1 dBi peak antenna gains for the lower (2.2 GHz) and upper (5.5 GHz) bands have been measured.

30 citations


Proceedings ArticleDOI
16 Nov 2011
TL;DR: A research model of human-computer trust interaction is proposed that contains three root constructs: interaction intention, computer system trust and communication trust and a measurement scale is designed to verify it in the future.
Abstract: Trust plays an important role in human-computer interaction. It helps people overcome risk and uncertainty. With the rapid growth of computer and networking technology, human-computer trust has been paid attention to. This paper studies the factors that influence the trust in human-computer interaction, i.e., the construct of human-computer trust interaction (HCTI). Based on a literature survey, we propose a research model of human-computer trust interaction that contains three root constructs: interaction intention, computer system trust and communication trust. Meanwhile, we design a measurement scale to verify it in the future.

21 citations


Patent
Zheng Yan1
18 Jan 2011
TL;DR: In this paper, various methods for unwanted traffic control in a wireless network are provided, such as detecting an occurrence of unwanted content as indicated by a complaint about a content item provided by a source device, wherein the complaint may be received from a remote mobile device or generated locally based on a local detection.
Abstract: Various methods for unwanted traffic control in a wireless network are provided. One example method may include detecting an occurrence of unwanted content as indicated by receipt of a complaint about a content item provided by a source device, wherein the complaint may be received from a remote mobile device or generated locally based on a local detection. The example method may further include determining a trust value for the source device based at least on the complaint, determining that the source device is a distrusted device based at least on a comparison between the trust value and a trust threshold value, and causing traffic from the source device to be controlled as unwanted traffic. Similar and related example methods, example apparatuses, and example computer program products are also provided.

21 citations


Proceedings ArticleDOI
16 Nov 2011
TL;DR: Simulation based evaluation shows that the proposed generic unwanted traffic control solution can control unwanted traffic from its source to destinations according to trust evaluation and is effective against a number of malicious attacks.
Abstract: People's life has been totally changed by the fast growth of Internet. It provides an incentive platform for many killer services and applications. However, it also offers an easy channel to distribute various contents that could be unwanted by users. This paper proposes a generic unwanted traffic control solution through global trust management. It can control unwanted traffic from its source to destinations according to trust evaluation. Simulation based evaluation shows that the solution is effective with regard to accuracy, efficiency and robustness against a number of malicious attacks.

15 citations


Proceedings ArticleDOI
03 Oct 2011
TL;DR: A robust model predictive control method is proposed for nonlinear affine systems with bounded disturbances that requires on-line solution of a minimax optimal control problem and is solved by using a two-layer recurrent neural network.
Abstract: A robust model predictive control (MPC) method is proposed for nonlinear affine systems with bounded disturbances. The robust MPC technique requires on-line solution of a minimax optimal control problem. The minimax strategy means that worst-case performance with respect to uncertainties is optimized. The minimax optimization problem involved in robust MPC is reformulated to a minimization problem and then is solved by using a two-layer recurrent neural network. Simulation examples are included to illustrate the effectiveness of the proposed method.

13 citations


Proceedings ArticleDOI
01 Nov 2011
TL;DR: A neural network approach to nonlinear model predictive control (NMPC) is proposed by using a feedforward neural network via supervised learning to solve the convex optimization problem involved in MPC.
Abstract: This paper proposes a neural network approach to nonlinear model predictive control (NMPC). The NMPC problem is formulated as a convex programming problem via Jacobain linearization. The unknown high-order term associated with the linearization is estimated by using a feedforward neural network via supervised learning. The convex optimization problem involved in MPC is solved by using a recurrent neural network. Simulation results are provided to demonstrate the performance of the approach.

10 citations


Proceedings ArticleDOI
16 Nov 2011
TL;DR: The architecture and procedures for building up the trusted identity management to achieve seamless roaming and a generic and flexible solution based on cloud computing technology that can achieve various benefits, such as robustness, high availability, and so on.
Abstract: Mobile Internet enables mobile users to access Internet services through mobile networks. Currently, cellular networks are converging with various wireless networks, e.g., WLAN, MANET, which forms a heterogeneous mobile environment. In such environment, it has been a big challenge for mobile operators and mobile service providers to offer seamless roaming and services among the networks. Previous work on solving the problem falls in specific network circumstance, which cannot be easily and widely applied in the heterogeneous environment. In this paper, we foresee the future of mobile networks into mobile cloud environment. Thus, we propose a generic and flexible solution based on cloud computing technology that can achieve various benefits, such as robustness, high availability, and so on. We present the architecture and procedures for building up the trusted identity management to achieve seamless roaming.

10 citations


Journal ArticleDOI
TL;DR: In this article, a synthesis technique of the dual offset shaped reflector antenna using Differential Evolution with Global and Local Neighborhood (DEGL) algorithm was presented, where the main reflector and sub-receiver were used.
Abstract: This paper presents a synthesis technique of the dual offset shaped reflector antenna using Differential Evolution with Global and Local neighborhoods (DEGL) algorithm. The main reflector and subre...

Proceedings ArticleDOI
16 Nov 2011
TL;DR: A construct of human-computer trust interaction (HCTI) is proposed, which contains two root constructs: interaction intention and computer system trust, each of which is consistent of a number of sub-constructs.
Abstract: Trust helps users overcome perceptions of uncertainty and engages in usage. It plays an important role in human-computer interaction. This position paper studies the theoretical issues in the study of trust in Human-Computer Interaction (HCI). We propose a construct of human-computer trust interaction (HCTI) through theoretical studies. It contains two root constructs: interaction intention and computer system trust, each of which is consistent of a number of sub-constructs.

Proceedings ArticleDOI
18 Sep 2011
TL;DR: AdChatRep, a reputation system for MANET chatting based on the result of a need assessment survey is designed and implemented by applying Nokia N900 smart phones as MANET nodes and results show the effectiveness of AdChatRep with regard to its usefulness and user acceptance.
Abstract: A Mobile Ad Hoc Network (MANET) is becoming a practical platform for pervasive social networking. People chat with each other via MANET for instant social activities. How to help mobile users to build up trust in MANET chatting is becoming an interesting issue. We design AdChatRep, a reputation system for MANET chatting based on the result of a need assessment survey. We implement it by applying Nokia N900 smart phones as MANET nodes. We further conduct a two-session controlled user experiment to investigate the impacts of AdChatRep on mobile users. Results show the effectiveness of AdChatRep with regard to its usefulness and user acceptance.

Proceedings ArticleDOI
26 Mar 2011
TL;DR: The general projection neural network based MPC is applied to the CSTR problem with input and output constraints and demonstrates the usefulness and effectiveness of proposed MPC approach to industrial problems.
Abstract: Model predictive control (MPC) is an advanced technique for process control. It is based on iterative, finite horizon optimization of a cost function associated with a plant model. Neural network is an effective approach for on-line optimization problems. In this paper, we apply the general projection neural network for MPC of nonlinear affine systems. Continuous stirred tank reactor (CSTR) system is a typical chemical reactor widely used in chemical industry and can be characterized as a nonlinear affine system. The general projection neural network based MPC is applied to the CSTR problem with input and output constraints. This application demonstrates the usefulness and effectiveness of proposed MPC approach to industrial problems.

Journal ArticleDOI
TL;DR: In this article, a compact coplanar waveguide (CPW)-fed triple-band planar antenna applied to WALN and WiMAX applications is proposed, which occupies an overall dimension of 38 × 36 × 16mm3, and has good omnidirectional radiation patterns in the azimuth plane.
Abstract: A compact coplanar waveguide (CPW)-fed triple-band planar antenna applied to WALN and WiMAX applications is proposed The antenna, which occupies an overall dimension of 38 × 36 × 16mm3, is simply composed of a U-shaped radiating patch and a U-shaped open stub It has good omnidirectional radiation patterns in the azimuth plane and reaches 23 dBi at both 245 GHz and 35 GHz, 35 dBi at the band of 52 GHz and 37 dBi at the band of 58 GHz The designed antenna is simulated by HFSS software, and a good agreement with experimental results is demonstrated

Journal ArticleDOI
TL;DR: Automatically detecting instant message receivers by applying semantic relevance can help improve the usability of current IM systems and make multiple, simultaneous IM conversations more convenient.
Abstract: Automatically detecting instant message receivers by applying semantic relevance can help improve the usability of current IM systems and make multiple, simultaneous IM conversations more convenient.

Journal ArticleDOI
TL;DR: In this paper, a compact corrugated horn operating in Kuband was designed for high Gaussian beam efficiency and low spillover, and tested as a feed for an offset dual-shaped reflector antenna.
Abstract: The design of a compact corrugated horn operating in Kuband is presented. This horn successfully optimized for high Gaussian beam efficiency and low spillover is manufactured and tested as a feed for an offset dual shaped reflector antenna. The requirements have been satisfied. The sidelobe level is below –30 dB, and the cross-polarization level is below –35 dB over the operating band. All simulation results are confirmed by measurements.


Proceedings ArticleDOI
16 Nov 2011
TL;DR: A reputation system for pervasive social networking is developed by applying Nokia N900 smart phones as MANET nodes based on a distributed energy-efficient social networking platform and can indicate each user's local reputation during chatting.
Abstract: A Mobile Ad Hoc Network (MANET) is becoming a practical platform for pervasive social networking. People chat with each other via MANET for instant social activities. How to help mobile users to build up trust in such an environment is becoming an important issue. We develop a reputation system for pervasive social networking. We implement it by applying Nokia N900 smart phones as MANET nodes based on a distributed energy-efficient social networking platform. Our system can indicate each user's local reputation during chatting. It also provides detailed reputation information and supports on-chat voting and afterwards voting. This demo paper introduces the system design and its principal functionalities.

Book ChapterDOI
02 Sep 2011
TL;DR: This work designs a number of algorithms for AdPriRec, a context-aware recommender system for preserving user privacy in MANET services and designs a hybrid recommendation generation solution, based on long term historical experiences.
Abstract: Mobile ad hoc network (MANET) has become a practical platform for pervasive services. Various user data could be requested for accessing such a service. However, it is normally difficult for a user to justify whether it is safe and proper to disclose personal data to others in different contexts. For solving this problem, we propose AdPriRec, a context-aware recommender system for preserving user privacy in MANET services. To support frequent changes of node pseudonyms in MANET, we develop a hybrid recommendation generation solution. We apply a trusted recommendation sever who knows the node's real identity to calculate a recommendation vector based on long term historical experiences. The vector can be also generated at each MANET node according to recent experiences accumulated based on node pseudonyms, while this vector could be further fine-tuned when the recommendation server is accessible. We design a number of algorithms for AdPriRec to generate context-aware recommendations for MANET users. The recommendation vector is calculated based on a number of factors such as data sharing behaviors and behavior correlation, service popularity and context, personal data type, community information of nodes and trust value of each involved party. An example based evaluation illustrates the usage and implication of the factors and shows AdPriRec's effectiveness. A prototype implementation based on Nokia N900 further proves the concept of AdPriRec design.

Journal ArticleDOI
TL;DR: In this article, the steady state model for the asynchronous generator is established and wind farms are considered as special PQ buses during power flow calculation, combining with state models of conventional generating units, transmission lines and transformers.
Abstract: Wind energy will affect the reliability of power system for its randomness and fluctuation. In this paper, the steady state model for the asynchronous generator is established and wind farms are considered as special PQ buses during power flow calculation. Combining with state models of conventional generating units, transmission lines and transformers, a time-sequential Monte Carlo simulation based on wind farm reliability model is established to do reliability assessment of composite generation and transmission system with wind farm. Meanwhile, an optimal load shedding model is used to decrease shedding load. IEEE-RTS test system is used to prove the proposed method. Analysis and comparison of results show that reliability can be improved clearly after integration of wind farm.

Proceedings ArticleDOI
19 Oct 2011
TL;DR: A model of trust behavior that contains three root constructs: using behavior, reflection behavior and correlation behavior is explored and an algorithm that provides recommendations on software based on the correlation of trust behaviors is designed in order to overcome the challenges of existing recommender systems.
Abstract: Trust plays an important role in software usage. It helps users overcome perceptions of uncertainty and risk and engages in trust behaviors. In this position paper, we propose using the trust behavior as a main characteristic to provide software recommendations. We explore a model of trust behavior that contains three root constructs: using behavior, reflection behavior and correlation behavior. The behavior information can be automatically collected through software usage observation. We further design an algorithm that provides recommendations on software based on the correlation of trust behaviors in order to overcome the challenges of existing recommender systems.