Guoqing Zhao

Learn More
Identification of individuals is ubiquitous with increasing reliance by financial and governmental organizations on reliable and robust personal recognition systems to determine and confirm the identity and policy constraints for specific individuals in 'real-time' when reacting to service requests. The traditional identification approaches to user(More)
BACKGROUND Drinking alcohol has a long tradition in Chinese culture. However, data on the prevalence and patterns of alcohol consumption in China, and its main correlates, are limited. METHODS During 2004-08 the China Kadoorie Biobank recruited 512,891 men and women aged 30-79 years from 10 urban and rural areas of China. Detailed information on alcohol(More)
The complete mitogenome sequence of a vulnerable species Onychostoma lini was determined using polymerase chain reaction and directly sequenced with primer walking method. The complete mitogenome was 16,595 bp in length, containing 37 genes of 13 protein-coding genes, 22 tRNA genes, 2 rRNA genes, and a control region (D-loop). The gene order and composition(More)
Web pages are used popularly and frequently today because the message in the pages can be fast spreading all over the world in real-time. A kind of new approach is constructed for the webpage information hiding. The hiding data is composed of the length of secret, the checksum and the secret data. The secret message is required for modification using(More)
BACKGROUND Increasing evidence has suggested that major depression (MD) is associated with an increased risk of ischemic heart disease (IHD). We examined this association in Chinese adults using data from the China Kadoorie Biobank study. METHODS AND RESULTS Over 0.5 million adults aged 30 to 79 years were followed from baseline interview (2004-2008)(More)
Stepping-stone is the most popular way used to attack other computers. Some insiders use stepping-stone to launch their attacks pretending to be outsiders. In this paper, we propose a novel algorithm to detect stepping-stone insider attacks through comparing outgoing and incoming connections. We modify the existing packet matching algorithm by introducing(More)
Exact synchronization of PN code is the precondition of the excellences of spread spectrum communicating system, and how to rapidly and effectively make the PN code to exact synchronization becomes the key of the excellent performance of spread spectrum communicating system. After the analysis of simple serial acquisition and hybrid acquisition, this paper(More)
Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical way is to compare an incoming connection with outgoing connections to determine if a computer is used as a stepping-stone. In this paper, we present a way by using signal processing(More)