scispace - formally typeset
Search or ask a question
Institution

Beijing University of Posts and Telecommunications

EducationBeijing, Beijing, China
About: Beijing University of Posts and Telecommunications is a education organization based out in Beijing, Beijing, China. It is known for research contribution in the topics: MIMO & Quality of service. The organization has 39576 authors who have published 41525 publications receiving 403759 citations. The organization is also known as: BUPT.


Papers
More filters
Journal ArticleDOI
TL;DR: The proposed BIQA model is called no-reference quality assessment using statistical structural and luminance features (NRSL), and it is demonstrated that the proposed NRSL metric compares favorably with the relevant state-of-the-art BIZA models in terms of high correlation with human subjective ratings.
Abstract: Blind image quality assessment (BIQA) aims to develop quantitative measures to automatically and accurately estimate perceptual image quality without any prior information about the reference image. In this paper, we introduce a novel BIQA metric by structural and luminance information, based on the characteristics of human visual perception for distorted image. We extract the perceptual structural features of distorted image by the local binary pattern distribution. Besides, the distribution of normalized luminance magnitudes is extracted to represent the luminance changes in distorted image. After extracting the features for structures and luminance, support vector regression is adopted to model the complex nonlinear relationship from feature space to quality measure. The proposed BIQA model is called no-reference quality assessment using statistical structural and luminance features (NRSL). Extensive experiments conducted on four synthetically distorted image databases and three naturally distorted image databases have demonstrated that the proposed NRSL metric compares favorably with the relevant state-of-the-art BIQA models in terms of high correlation with human subjective ratings. The MATLAB source code and validation results of NRSL are publicly online at http://www.ntu.edu.sg/home/wslin/Publications.htm .

142 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors investigated the impact of website quality on online impulse buying behavior (OIBB) in China, and assessed the moderating roles of sales promotion and credit card use.
Abstract: The purpose of this paper is to investigate the impact of website quality on online impulse buying behavior (OIBB) in China, and assess the moderating roles of sales promotion and credit card use.,An online and personal survey from 1,161 online shoppers belonging to three big cities of China – Beijing, Shanghai, and Nanjing – was conducted. A random sampling technique was utilized for data collection. Data were analyzed using validity and reliability tests, confirmatory factor analysis, and structural equation modeling.,Three major findings discovered are: first, the website quality positively affects the OIBB; second, the sales promotion significantly influences OIBB and acts as a strong moderator on the relationship between website quality and online impulse buying; and third, the online impulse purchases are positively influenced by use of credit card, and the use of credit card enhances the relationship between website quality and online impulse buying.,First, the website quality positively affects the OIBB; second, the sales promotion significantly influences OIBB and acts as a strong moderator in the relationship between website quality and online impulse buying; and third, online impulse purchases are positively influenced by credit card use. Moreover, credit card use enhances the relationship between website quality and online impulse buying.,This research is the first to investigate the relationship between website quality and OIBB in China, with sales promotion and credit card use as moderators.

142 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: A new reputation system for data credibility assessment based on the blockchain techniques that is reliable in collecting, validating, and storing reputation information in vehicular networks is proposed.
Abstract: The security of vehicular networks has been paid increasing attention to with the rapid development of automobile industry and Internet of Things (IoT). However, existing approaches mainly focus on ensuring data authentication and integrity, which are not sufficient to assess the credibility of received messages. Recently, reputation systems are proved to be effective approaches to solve the above problem. This paper proposes a new reputation system for data credibility assessment based on the blockchain techniques. In this system, vehicles rate the received messages based on observations of traffic environments and pack these ratings into a “block”. Each block is “chained” to the previous one by storing the hash value of the previous block. Then, a temporary center node is elected from vehicles and it is responsible for broadcasting its rating block to others. Based on ratings stored in the blockchain, vehicles are able to calculate the reputation value of the message sender and then evaluate the credibility of the message. Simulation results reveal that the proposed system is reliable in collecting, validating, and storing reputation information in vehicular networks.

142 citations

Journal ArticleDOI
TL;DR: This paper presents the first secure multiparty QKA protocol against both outside and participant attacks and proves its security in detail.
Abstract: Two conditions must be satisfied in a secure quantum key agreement (QKA) protocol: (1) outside eavesdroppers cannot gain the generated key without introducing any error; (2) the generated key cannot be determined by any non-trivial subset of the participants. That is, a secure QKA protocol can not only prevent the outside attackers from stealing the key, but also resist the attack from inside participants, i.e. some dishonest participants determine the key alone by illegal means. How to resist participant attack is an aporia in the design of QKA protocols, especially the multi-party ones. In this paper we present the first secure multiparty QKA protocol against both outside and participant attacks. Further more, we have proved its security in detail.

142 citations

Journal ArticleDOI
TL;DR: Symbolic computation on an observationally/experimentally-supported (2+1)-dimensional generalized variable-coefficient Kadomtsev-Petviashvili-Burgers-type equation is done, for certain dusty plasmas, relying on such plasma coefficient functions as the nonlinearity, dispersion, dusty-fluid-viscosity-dissipation, geometric-effect and diffraction/transverse-perturbation coefficients.

142 citations


Authors

Showing all 39925 results

NameH-indexPapersCitations
Jie Zhang1784857221720
Jian Li133286387131
Ming Li103166962672
Kang G. Shin9888538572
Lei Liu98204151163
Muhammad Shoaib97133347617
Stan Z. Li9753241793
Qi Tian96103041010
Xiaodong Xu94112250817
Qi-Kun Xue8458930908
Long Wang8483530926
Jing Zhou8453337101
Hao Yu8198127765
Mohsen Guizani79111031282
Muhammad Iqbal7796123821
Network Information
Related Institutions (5)
Beihang University
73.5K papers, 975.6K citations

88% related

National Chiao Tung University
52.4K papers, 956.2K citations

87% related

Harbin Institute of Technology
109.2K papers, 1.6M citations

87% related

Tsinghua University
200.5K papers, 4.5M citations

87% related

Southeast University
79.4K papers, 1.1M citations

86% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202394
2022533
20213,009
20203,720
20193,817
20183,296