Qi Yong

Learn More
The lack of remote data access control capability and the loss of remote data access trail make data owners hesitate when they have to outsource their sensitive data to remote third party platform. The data owners have no choice but to trust the remote third party software before they ship their data to the remote environment. In this paper we propose a new(More)
According to the characteristics of the operational behavior and runtime state of application sever, the resource consumption time series are observed and modeled by fuzzy wavelet network (FWN) with fuzzy logic inference and learning capability. The objective is to model the extracted data series of systematic performance parameters to predict software(More)
Redundant collagen deposition at sites of healing dermal wounds results in hypertrophic scars. Adipose-derived stem cells (ADSCs) exhibit promise in a variety of anti-fibrosis applications by attenuating collagen deposition. The objective of this study was to explore the influence of an intralesional injection of ADSCs on hypertrophic scar formation by(More)
The context-aware application's main feature is that the program can adjust its behavior according to the context environment. In the traditional object-oriented model, behaviors related to the context may be separated through branching statement, thus greatly reducing the degree of adaptation to environmental changes. This paper, after analyzing the issue(More)
Secure protocol is the foundation of the MANET. It is very critical to ensure the correctness of the security properties in the designed routing protocols. However, nowadays, new designed protocols are predominantly validated by an interpretation of simulation methods, lacking rigid formal analysis to ensure security properties. Firstly, this paper presents(More)