Fengyun Li

Learn More
With the proliferation of cloud computing, the way of reasonable establishment of trust relationship among entities, as a vital part for forming security mechanism in cloud computing environments, is attracting increasing attention. This article introduces a trust management model based on fuzzy set theory and named TMFC including direct trust measurement(More)
The "Internet of Things"(IoT) opens opportunities for devices and softwares to share information on an unprecedented scale. However, such a large interconnected network poses new challenges to system developers and users. In this article, we propose a layered architecture of IoT system. Using this model, we try to identify and assess each layer's(More)
miR396 targets seven GROWTH-REGULATING FACTOR (GRF) genes and the BASIC HELIX-LOOP-HELIX (bHLH) TRANSCRIPTION FACTOR 74 gene (bHLH74) in Arabidopsis. Previous research revealed that the miR396 target module regulates cell proliferation and plays a critical role in leaf development. However, no additional biological functions of miR396 have been investigated(More)
In wireless sensor networks, how to detect the malicious nodes and prevent them from attacking the normal nodes has become one of the most important issues. This paper introduces a new mechanism in which the sensor nodes collaborate with each other to resist denial of service (DoS) attack and protect the being attacked nodes. A reputation-based incentive(More)
With the development of micro-electronics technology, computing technology and the wireless communications technology, wireless sensor networks (WSNs) has been great concerned in recent years. The architecture of WSN directly affect entire network performance, and the network performance affects the availability of WSN. The design of WSN architecture need(More)
Aiming at the problems in traditional teaching methods of computer fundamentals course, a series of reform measures are put forward, such as innovating teaching methods, paying attention to cultivate the practical ability of students, and constructing network teaching platform to enrich the teaching resources and enhance the communication between teachers(More)
Routing algorithm as a research core in the wireless mesh network, the design is good or bad is very important to network performance. In the field of ant colony optimization (ACO), models of collective intelligence of ants are transformed into useful optimization techniques that find applications in computer networking. Unbalanced traffic may lead to more(More)