scispace - formally typeset
Search or ask a question
Institution

Zhejiang Gongshang University

EducationHangzhou, China
About: Zhejiang Gongshang University is a education organization based out in Hangzhou, China. It is known for research contribution in the topics: Computer science & Chemistry. The organization has 8258 authors who have published 7670 publications receiving 90296 citations. The organization is also known as: Zhèjiāng Gōngshāng Dàxué.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes an ElementRank approach to provide a ranked list of classes (or packages) for maintainers to start the comprehension process in software maintenance, and shows the rank correlation between the results of ElementRank and that of the approaches in the related work.
Abstract: Software comprehension is an important part of software maintenance. To understand a piece of large and complex software, the first problem to be solved is where to start the understanding process. Choosing to start the comprehension process from the important software elements has proven to be a practical way. Research on complex networks opens new opportunities for identifying important elements, and many approaches have been proposed. However, the software networks that existing approaches use neglect the multilayer nature of software systems. That is, nodes in the network can have different types of relationships at the same time, and each type of relationship forms a specific layer. Worse still, they mainly focus on identifying important classes, and little work has been done on quantifying package importance. In this paper, we propose an ElementRank approach to provide a ranked list of classes (or packages) for maintainers to start the comprehension process. The top-ranked classes (or packages) can be seen as the starting points for the software comprehension process at the class (or package) level. First, we introduce two kinds of multilayer software networks to describe the topological structure of software at the class level and package level, respectively. Second, we propose a weighted PageRank algorithm to calculate the weighted PageRank value of classes (or packages) in each layer of the corresponding multilayer software network. Then, we use AHP (Analytic Hierarchy Process) to weigh each layer in the corresponding multilayer software network, and further aggregate the weighted PageRank value to obtain the global weighted PageRank value for each class (or package). Finally, all the classes (or packages) are ranked according to their global weighted PageRank values in a descending order, and the top-ranked classes (or packages) can serve as the starting points for the software comprehension process at the class (or package) level. ElementRank is validated theoretically using the widely accepted Weyuker’s criteria. Theoretical results show that the global weighted PageRank value for classes (or packages) satisfies most of Weyuker’s properties. Furthermore, ElementRank is evaluated empirically using a set of twelve open source software systems. Through a set of experiments, we show the rank correlation between the results of ElementRank and that of the approaches in the related work, and the benefits of ElementRank are also illustrated in comparison with other approaches in the related work. Empirical results also show that ElementRank can be applied to large software systems.

36 citations

Journal ArticleDOI
Linglin Fu1, Chong Wang1, Jinbao Wang1, Saiqiao Ni1, Yanbo Wang1 
TL;DR: This study introduced an approach to eliminate Penaeus chinensis TM by Maillard reaction with reducing sugars including ribose, galacto-oligosaccharide (GOS) and chitosan-olIGosac charide (COS), which reduced the allergenicity by up to 60%.

36 citations

Journal ArticleDOI
Kai Bu, Xuan Liu, Jiaqing Luo, Bin Xiao, Guiyi Wei1 
TL;DR: This paper tackles cloning attack detection in anonymous RFID systems without requiring tag IDs as a priori, and leverages unreconciled collisions to uncover cloning attacks.
Abstract: Cloning attacks threaten radio-frequency identification (RFID) applications but are hard to prevent. Existing cloning attack detection methods are enslaved to the knowledge of tag identifiers (IDs). Tag IDs, however, should be protected to enable and secure privacy-sensitive applications in anonymous RFID systems. In a first step, this paper tackles cloning attack detection in anonymous RFID systems without requiring tag IDs as a priori. To this end, we leverage unreconciled collisions to uncover cloning attacks. An unreconciled collision is probably due to responses from multiple tags with the same ID, exactly the evidence of cloning attacks. This insight inspires GREAT, our pioneer protocol for cloning attack detection in anonymous RFID systems. We evaluate the performance of GREAT through theoretical analysis and extensive simulations. The results show that GREAT can detect cloning attacks in anonymous RFID systems fairly fast with required accuracy. For example, when only six out of 50,000 tags are cloned, GREAT can detect the cloning attack in 75.5 s with a probability of at least 0.99.

36 citations

Journal ArticleDOI
TL;DR: Using the quantum entanglement swapping technologies under the collective-dephasing noise and the collective's collective-rotation noise, two robust quantum dialogue protocols are proposed, respectively, and the information leakage problem is avoided.
Abstract: In this paper, using the quantum entanglement swapping technologies under the collective-dephasing noise and the collective-rotation noise, two robust quantum dialogue protocols are proposed, respectively. The logical Bell states are used as the traveling states to combat the collective noise. The auxiliary logical Bell state is shared privately between two participants through the manner of direct transmission first. After encoded with the receiver's secret messages, it swaps entanglement with its adjacent logical Bell state. In this way, the information leakage problem is avoided. Moreover, Eve's active attacks can be detected with the help of decoy photon technology. For decoding, the Bell state measurements rather than the four-qubit joint measurements are needed.

36 citations

Journal ArticleDOI
TL;DR: In this article, a batch adaption experiment was conducted for the adsorption of Eu(III) ions from aqueous solution by D113 resin and the results indicated that D113 resins could adsorb Eu (III) ion effectively.

36 citations


Authors

Showing all 8318 results

NameH-indexPapersCitations
David Julian McClements131113771123
Sajal K. Das85112429785
Ye Wang8546624052
Xun Wang8460632187
Tao Jiang8294027018
Yueming Jiang7945220563
Mo Wang6127413664
Robert J. Linhardt58119053368
Jiankun Hu5749311430
Xuming Zhang5638410788
Yuan Li503528771
Chunping Yang491738604
Duo Li483299060
Matthew Campbell4823613448
Aiqian Ye481636120
Network Information
Related Institutions (5)
South China University of Technology
69.4K papers, 1.2M citations

89% related

Nankai University
51.8K papers, 1.1M citations

88% related

Zhejiang University
183.2K papers, 3.4M citations

88% related

Xiamen University
54.4K papers, 1M citations

87% related

Dalian University of Technology
71.9K papers, 1.1M citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20241
202325
2022153
2021937
2020770
2019627