Yong-Zhen Li

Learn More
The radio frequency identification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called RFID tag. Even though RFID system is widely used for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect the users(More)
Previous RFID techniques, cause serious privacy infringements such as excessive information exposure and user's location information tracking due to the wireless characteristics and the limitation of RFID systems. Especially the information security problem of read only tag has been solved by physical method. In this paper, we propose a low-cost mutual(More)
These days, personal information privacy and security is getting an important issue. In various commercial and other application cases, because of convenience and efficiency, personal information is always stored and used by organizations and companies systems. These information have different sensitivity level of privacy among each subject. Usually, the(More)
From diversification of contents, CMS (contents Man- agement System) is operated variously for government of- ficial of contents. Present CMS plain applies a DRM tech- nology and is protecting contents copyright based on only position members. Therefore, global use of contents is lim- ited and use is impossible mutually and original copyright protection of(More)
Recently, in order to improve the energy efficiency of WSN(Wireless Sensor Network), widely research have been carried on. But, up to the present, all presented methods are based on direct communication between CH(cluster head) and sink node, and based on the assumption that node can intelligent regulate signal energy according to the distance between(More)
Multiple repeat false targets (RFTs), created by the digital radio frequency memory (DRFM) system of jammer, are widely used in practical to effectively exhaust the limited tracking and discrimination resource of defense radar. In this paper, common characteristic of radar polarization echoes of multiple RFTs is used for target recognition. Based on the(More)
OBJECTIVE To examine the transfection of Homeobox A13 (HOXA13) on epithelial-mesenchymal transition (EMT) and the expression of bone morphogenetic protein-7 (BMP-7) induced by albumin-overload in human kidney tubular epithelial cells (HKCs). METHODS The cultured HKCs were treated with 20 mg/mL human serum albumin (HSA) for 48 hours. Protein expression of(More)
In the previous study, a high-throughput screening method was established to find the antagonists of CD36. In the present study, a new compound named IMB-1680 was found using this method. The anti-atherosclerotic activities of IMB-1680 were then evaluated. Dose-dependent activities of IMB-1680 were detected by using Sf9 [hCD36] and CHO [hCD36] models.(More)
Development of metadata theories and their application techniques provide a solution to mass data sharing in internet. This paper researched the key application techniques for multi-CMSs(content management systems) data based on metadata. Among several CMSs, each CMS has its own metadata standard, which includes an identifier to mark the data. To overcome(More)
  • 1