Xiaoyuan Yang

  • Citations Per Year
Learn More
In this paper, a new monopole with G type structure is proposed, consisting of two wires rectangle rings with radius of 2 mm. The software Numerical Electromagnetic Code (NEC) is used to analyze the proposed antenna and a prototype is designed. The experimental and numerical results of the designed wideband antenna are presented and analyzed, and a 510 MHz(More)
Fair multi-party exchange protocol is one of the foundation electronic commerce, but at present, the study of multi-party fair exchange protocol is very weak. Aiming at solving this problem, we present a secure and efficient ID-based fair multi-party exchange protocol with off-line semi-trusted third party. Application of multi-receiver identity-based(More)
The development of a small diameter (≤5 mm) arterial prosthesis requires the appropriate selection of materials, structure and fabrication method so as to provide adequate mechanical properties, superior biocompatibility and precise control over the diameter. In this study, 100% polyester, 100% silk fibroin and a combination of both yarns were woven into(More)
In this paper, we work on the topological properties such as the connectivity of regions, the boundaries and the adjacency for 2-D grayscale images. We present some original ideas for applying topology methods onto the graylevel image transformation which we call it pansystem topology. We use a Pansystem Parental model to develop an algorithm for grayscale(More)
This paper designs and implements a WCDMA (Wideband Code Division Multiple Access) network mobile terminal positioning system. In this system, we use a device to call the target initiatively so as to tempt it to establish a link with the base station, but every call stops before the target perception. The system captures relevant parameters in link(More)
Compared to color and texture, contour is closer to human vision. So contour-based image retrieval has been a hot topic. However, existing methods can't obtain object contour effectively, which makes contour description and matching more difficult. To address these problems, this paper uses KPAC (Kernel-based Parametric Active Contour) to obtain the object(More)
The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In this paper, we use data perturbation assumptions and oblivious transfer protocol to construct a multi-party confidential computation protocol(More)