School of Advanced Technology

ADDRESS
School of Advanced Technology
Xi'an Jiaotong-Liverpool University
111 Ren'ai Road Suzhou Dushu Lake Science and Education Innovation District , Suzhou Industrial Park
Suzhou,Jiangsu Province,P. R. China,215123
81. SecIoT: a security framework for the Internet of Things

Author:Huang, X;Craig, P;Lin, HY;Yan, Z

Source:SECURITY AND COMMUNICATION NETWORKS,2016,Vol.9

Abstract:The 5th generation wireless system (5G) will support Internet of Things (IoT) by increasing the interconnectivity of electronic devices to support a variety of new and promising networked applications such as the home of the future, environmental monitoring networks, and infrastructure management systems. The potential benefits of the IoT are as profound as they are diverse. However, the benefits of the IoT come with some significant challenges. Not the least of these is that the increased interconnectivity integral to an IoT network increases its vulnerability to malevolent attacks. There is still no proven methodology for the design of security frameworks with device authentication and access control. This paper attempts to address this problem through the development of a prototype security framework with robust and transparent security protection. This includes an investigation into the security requirements of three different characteristic IoT scenarios (concretely, body IoT, home IoT, and hotel IoT), a design of new authentication mechanisms, and an access control subsystem with fine-grained roles and risk indicators. Our prototype security framework gives us an insight into some of the major difficulties of IoT security as well as providing some feasible solutions. Copyright (C) 2015 John Wiley & Sons, Ltd.
82. Anomalous Capacitance-Voltage Hysteresis in MOS Devices with ZrO2 and HfO2 Dielectrics

Author:Lu, QF;Qi, YF;Zhao, CZ;Zhao, C;Taylor, S;Chalker, PR

Source:2016 5TH INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS (ISNE),2016,Vol.

Abstract:Anomalous behaviors in capacitance-voltage (CV) characteristics are observed on MOS devices with ZrO2 and HfO2 oxides. The relative positions of forward and reverse CV traces measured by pulse technique are opposite to those obtained by LCR meter. This unusual phenomenon cannot be consistently explained by trapping/de-trapping of charges. A hypothesis related to interface dipoles is proposed to provide a possible explanation.
83. One-class kernel subspace ensemble for medical image classification

Author:Zhang, YG;Zhang, BL;Coenen, F;Xiao, JM;Lu, WJ

Source:EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING,2014,Vol.2014

Abstract:Classification of medical images is an important issue in computer-assisted diagnosis. In this paper, a classification scheme based on a one-class kernel principle component analysis (KPCA) model ensemble has been proposed for the classification of medical images. The ensemble consists of one-class KPCA models trained using different image features from each image class, and a proposed product combining rule was used for combining the KPCA models to produce classification confidence scores for assigning an image to each class. The effectiveness of the proposed classification scheme was verified using a breast cancer biopsy image dataset and a 3D optical coherence tomography (OCT) retinal image set. The combination of different image features exploits the complementary strengths of these different feature extractors. The proposed classification scheme obtained promising results on the two medical image sets. The proposed method was also evaluated on the UCI breast cancer dataset (diagnostic), and a competitive result was obtained.
84. Length-of-Stay Prediction for Pediatric Patients With Respiratory Diseases Using Decision Tree Methods

Author:Ma, F;Yu, LM;Ye, LS;Yao, DD;Zhuang, WF

Source:IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,2020,Vol.24

Abstract:Accurate prediction of a patient's length-of-stay (LOS) in the hospital enables an efficient and effective management of hospital beds. This paper studies LOS prediction for pediatric patients with respiratory diseases using three decision tree methods: Bagging, Adaboost, and Random forest. A data set of 11,206 records retrieved from the hospital information system is used for analysis after preprocessing and transformation through a computation and an expansion method. Two tests, namely bisection test and periodic test, are designed to assess the performance of the prediction methods. Bagging shows the best result on the bisection test (0.296 RMSE, 0.831 R-2, and 0.723 Acc +/- 1) for the testing set of the whole data test. The performances of the three methods are similar on the periodic test, whereas Adaboost performs slightly better than the other two methods. Results indicate that the three methods are all effective for the LOS prediction. This study also investigates the importance of different data fields to the LOS prediction, and finds that hospital treatment-related data fields contribute more to the LOS prediction than other categories of fields.
85. Cogbroker - A cognitive approach to intelligent product brokering for e-commerce

Author:Guan,Sheng Uei;Tan,Wen Pin;Liu,Fei

Source:International Journal of Computational Intelligence and Applications,2008,Vol.7

Abstract:Researchers have proposed intelligent product-brokering applications to help facilitate the m-commerce shopping process. However, most algorithms require explicit, user-provided feedback to learn about user preference. In practical applications, users may not be motivated to provide unrewarded and time-consuming feedback. By adopting a cognitive approach, this paper investigates the possibility of replacing user feedback with user behavioral data analysis during product browsing. By means of evolutionary algorithms, the system is able to derive corresponding models that simulate the user's shopping behavior. User group profiling is also implemented to help identify the user's shopping patterns. Upon simulations of trial cases with consistent and rational shopping patterns, our experimental results confirm this approach being promising. The system shows high accuracy in detecting the preferences of the user. The algorithms are also portable and effective across different products. © Imperial College Press.
86. Facile preparation of Co3O4 nanoparticles incorporating with highly conductive MXene nanosheets as high-performance anodes for lithium-ion batteries

Author:Zhao, YC;Liu, CG;Yi, RW;Li, ZQ;Chen, YB;Li, YQ;Mitrovic, I;Taylor, S;Chalker, P;Yang, L;Zhao, CZ

Source:ELECTROCHIMICA ACTA,2020,Vol.345

Abstract:There is considerable scientific interest in the newly available family of MXenes material. An analog as graphene, this two-dimensional (2D) layered material with the structure of transition metal carbides or nitrides exhibits superior electronic conductivity, large interlayer spacing for highly efficient lithium ions diffusion pathways and environmental benignity, making it useful as energy storage material. However, the inferior capability to store lithium ions impedes its wide application in lithium-ion batteries. Therefore, a facile strategy for preparing Co3O4 nanoparticles incorporated with MXene nanosheets on Ni foams has been developed. Small-size Co3O4 nanoparticles are uniformly distributed within the MXene nanosheets leading to the highly efficient lithium ions and electrons transmission, as well as the prevention for the restacking of MXene nanosheets and huge volume change of the Co3O4 nanoparticles. Under the cooperative effect of Co3O4 nanoparticles and MXene nanosheets, the Co3O4/MXene composite electrode with the mass ratio of Co3O4/MXene = 1:1 exhibits an excellent reversible capacity of 1005 mAh g(-1) after 300 cycles at the current density of 1 C, which significantly exceeds that of pristine Co3O4 electrode. Though the current density climbs to 5 C, the composite electrode remains a stable capacity of 307 mAh g(-1) after 1000 cycles. It is demonstrated that Co3O4/MXene composite electrode has the potential as an anode for the high-performance lithium-ion batteries. (c) 2020 Elsevier Ltd. All rights reserved.
87. Porting Spotlight Range Migration Algorithm processor from Matlab to Virtex 6

Author:Melnikov, A;Le Kernec, J;Gray, D

Source:2015 IEEE-APS TOPICAL CONFERENCE ON ANTENNAS AND PROPAGATION IN WIRELESS COMMUNICATIONS (APWC),2015,Vol.

Abstract:This paper describes the implementation and optimization of a Synthetic Aperture Radar process Spotlight Range Migration Algorithm processor on FPGA Virtex 6 DSP lit that fits on the chip. The mean/max error compared to a software implementation is -54/-28.74dB for 55 elements and 882 samples.
88. A Covert Ultrasonic Phone-to-Phone Communication Scheme

Author:Shi,Liming;Yu,Limin;Huang,Kaizhu;Zhu,Xu;Wang,Zhi;Li,Xiaofei;Wang,Wenwu;Wang,Xinheng

Source:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST,2021,Vol.349

Abstract:© 2021, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Smartphone ownership has increased rapidly over the past decade, and the smartphone has become a popular technological product in modern life. The universal wireless communication scheme on smartphones leverages electromagnetic wave transmission, where the spectrum resource becomes scarce in some scenarios. As a supplement to some face-to-face transmission scenarios, we design an aerial ultrasonic communication scheme. The scheme uses chirp-like signal and BPSK modulation, convolutional code encoding with ID-classified interleaving, and pilot method to estimate room impulse response. Through experiments, the error rate of the ultrasonic communication system designed for mobile phones can be within 0.001 %% in 1 m range. The limitations of this scheme and further research work are discussed as well.
89. Towards an experimental analysis of android phone: GSM network positioning

Author:Man,Ka Lok;Man,Ka Lok;Wang,Wei;Liu,Dawei;Tayahi,Moncef;Hsu,Hui Huang;Lim,Eng Gee

Source:International Journal of Applied Engineering Research,2014,Vol.9

Abstract:Network positioning technology has been widely used in existing smart phones. Traditional network positioning methods are carried out by the network provider; this could violate user's privacy.In this paper we present a work in progress on the positioning of smart phone users using wireless networks. We propose a self-positioning scheme based on the fingerprint method, a positioning method commonly used in indoor environments in previous studies. We outline the proposed self-positioning scheme and propose a k-nearest neighbor method to improve the positioning accuracy. In future, we will evaluate the proposed scheme and method in field experiments.
90. Customer churn prediction in the telecommunication sector using a rough set approach

Author:Amin, A;Anwar, S;Adnan, A;Nawaz, M;Alawfi, K;Hussain, A;Huang, KZ

Source:NEUROCOMPUTING,2017,Vol.237

Abstract:Customer churn is a critical and challenging problem affecting business and industry, in particular, the rapidly growing, highly competitive telecommunication sector. It is of substantial interest to both academic researchers and industrial practitioners, interested in forecasting the behavior of customers in order to differentiate the churn from non-churn customers. The primary motivation is the dire need of businesses to retain existing customers, coupled with the high cost associated with acquiring new ones. A review of the field has revealed a lack of efficient, rule-based Customer Churn Prediction (CCP) approaches in the telecommunication sector. This study proposes an intelligent rule-based decision-making technique, based on rough set theory (RST), to extract important decision rules related to customer churn and non-churn. The proposed approach effectively performs classification of churn from non-churn customers, along with prediction of those customers who will churn or may possibly churn in the near future. Extensive simulation experiments are carried out to evaluate the performance of our proposed RST based CCP approach using four rule-generation mechanisms, namely, the Exhaustive Algorithm (EA), Genetic Algorithm (GA); Covering Algorithm (CA) and the LEM2 algorithm (LA). Empirical results show that RST based on GA is the most efficient technique for extracting implicit knowledge in the form of decision rules from the publicly available; benchmark telecom dataset. Further, coniparative results demonstrate that our proposed approach offers a globally optimal solution for CCP in the telecom sector, when benchmarked against several state-of-the-art methods. Finally, we show how attribute-level analysis can pave the way for developing a successful customer retention policy that could form an indispensable part of strategic decision making and planning process in the telecom sector.
91. A self-test and self-repair approach for analog integrated circuits

Author:Karmani, Mouna ; Khedhiri, Chiraz ; Man, Ka Lok ; Krilavicˇius, Tomas ; Hamdi, Belgacem ; Rahmani, Amir-Mohammad

Source:2012 2nd Baltic Congress on Future Internet Communications, BCFIC 2012,2012,Vol.

Abstract:With the continuous increase of integration densities and complexities, secure integrated circuits (ICs) are more and more required to guarantee reliability for safety-critical applications in the presence of soft and hard faults. Thus, testing has become a real challenge for enhancing the reliability of safety-critical systems. This paper presents a Self-Test and Self-Repair approach which can be used to tolerate the most likely defects of bridging type that create a resistive path between VDD supply voltage and the ground occurring in analog CMOS circuits during the manufacturing process. The proposed testing approach is designed using the 65 nm CMOS technology. We then used an operational amplifier (OPA) to validate the technique and correlate it with post layout simulation results. © 2012 IEEE.
92. Survey of minimal layer number lens antennas for mm-wave alternatives to the Luneburg lens

Author:Derek GRAY;Nasiha NIKOLIC

Source:IEICE Technical Report,2014,Vol.

Abstract:Large planar array antennas are the favored technology for future 5G, mm-wave and 60GHz ISM-band high speed gateways. However, where wide angle scan spot beams are required, spherical lenses have the advantages of close to 180 degrees scan without gain loss, wide bandwidth and relative loss cost compared to phased arrays. In this survey, 2 and 3 layer lenses suited to 3D printing are discussed and initial simulation results presented.
93. A novel classifier ensemble method with sparsity and diversity

Author:Yin, XC;Huang, KZ;Hao, HW;Iqbal, K;Wang, ZB

Source:NEUROCOMPUTING,2014,Vol.134

Abstract:We consider the classifier ensemble problem in this paper. Due to its superior performance to individual classifiers, class ensemble has been intensively studied in the literature. Generally speaking, there are two prevalent research directions on this, i.e., to diversely generate classifier components, and to sparsely combine multiple classifiers. While most current approaches are emphasized on either sparsity or diversity only, we investigate the classifier ensemble by learning both sparsity and diversity simultaneously. We manage to formulate the classifier ensemble problem with the sparsity or/and diversity learning in a general framework. In particular, the classifier ensemble with sparsity and diversity can be represented as a mathematical optimization problem. We then propose a heuristic algorithm, capable of obtaining ensemble classifiers with consideration of both sparsity and diversity. We exploit the genetic algorithm, and optimize sparsity and diversity for classifier selection and combination heuristically and iteratively. As one major contribution, we introduce the concept of the diversity contribution ability so as to select proper classifier components and evolve classifier weights eventually. Finally, we compare our proposed novel method with other conventional classifier ensemble methods such as Bagging, least squares combination, sparsity learning, and AdaBoost, extensively on UCI benchmark data sets and the Pascal Large Scale Learning Challenge 2008 webspam data. The experimental results confirm that our approach leads to better performance in many aspects. (C) 2014 Elsevier B.V. All rights reserved.
94. In their shoes A structured analysis of job demands, resources, work experiences, and platform commitment of crowdworkers in China    

Author:Wang, Yihong ; Papangelis, Konstantinos ; Lykourentzou, Ioanna ; Liang, Hai-Ning ; Sadien, Irwyn ; Demerouti, Evangelia ; Khan, Vassilis-Javed

Source:Proceedings of the ACM on Human-Computer Interaction,2020,Vol.4

Abstract:Despite the growing interest in crowdsourcing, this new labor model has recently received severe criticism. The most important point of this criticism is that crowdworkers are often underpaid and overworked. This severely affects job satisfaction and productivity. Although there is a growing body of evidence exploring the work experiences of crowdworkers in various countries, there have been a very limited number of studies to the best of our knowledge exploring the work experiences of Chinese crowdworkers. In this paper we aim to address this gap. Based on a framework of well-established approaches, namely the Job Demands-Resources model, the Work Design Questionnaire, the Oldenburg Burnout Inventory, the Utrecht Work Engagement Scale, and the Organizational Commitment Questionnaire, we systematically study the work experiences of 289 crowdworkers who work for ZBJ.com - the most popular Chinese crowdsourcing platform. Our study examines these crowdworker experiences along four dimensions (1) crowdsourcing job demands, (2) job resources available to the workers, (3) crowdwork experiences, and (4) platform commitment. Our results indicate significant differences across the four dimensions based on crowdworkers' gender, education, income, job nature, and health condition. Further, they illustrate that different crowdworkers have different needs and threshold of demands and resources and that this plays a significant role in terms of moderating the crowdwork experience and platform commitment. Overall, our study sheds light to the work experiences of the Chinese crowdworkers and at the same time contributes to furthering understandings related to the work experiences of crowdworkers. © 2020 Copyright held by the owner/author(s). Publication rights licensed to ACM.
95. Insight of direct search methods and module-integrated algorithms for Maximum Power Point Tracking (MPPT) of stand-alone photovoltaic systems

Author:Ma J.;Man K.L.;Ting T.O.;Guan S.-U.;Ma J.;Wong P.W.H.;Man K.L.;Lee H.;Jeong T.;Sean J.-K.

Source:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),2012,Vol.7513

Abstract:By detection of input signal, Maximum Power Point Tracking (MPPT) algorithms are used to maximize the potential output power. Since Perturbation and Observe (P&O) method was first applied in a Photovoltaic (PV) system, a myriad of MPPT algorithms has been proposed. With the pros and cons of various MPPT algorithms, a detailed analysis of several typical direct search and module-integrated MPPT algorithms is presented in this paper. Directions of future work for implementing new MPPT algorithms are also outlined. © IFIP International Federation for Information Processing 2012.
96. Model Checking Denial-of-Service Attack against IEEE 802.15.6 Protocol

Author:Liu, HN;Wang, YM;Zheng, K;Huang, X

Source:2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018),2018,Vol.

Abstract:With the prevalence of Internet of Things, numerous system vulnerabilities can be explored, and the hacker may launch a series of DoS attacks by exploiting the vulnerabilities of the system. In this paper, a simulation experiment is designed to implement DoS attacks on a system that utilizes the IEEE 802.15.6 password association protocol to accomplish the information transmission. During the process, authors introduce the probabilistic model checking technique with the tool of PRISM. This method is used for the analysis of the factors affecting the success rate of DoS attacks. The study is expected to enrich the analysis of the factors influencing the success rate of DoS attacks.
97. Supporting Deterministic Wireless Communications in Industrial IoT

Author:Bartolomeu, P;Alam, M;Ferreira, J;Fonseca, JA

Source:IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS,2018,Vol.14

Abstract:Wireless communication technologies have become widely adopted, appearing in heterogeneous applications ranging from tracking victims, responders, and equipment in disaster scenarios to machine health monitoring in networked manufacturing industries. These systems are said to have real-time timeliness requirements since data communication must be conducted within predefined temporal bounds, whose unfulfillment may compromise the correct behavior of the system and cause economic losses or endanger human lives. The support of real-time communications over license-free bands in open environments is a challenging task since real-time medium access is only achieved by a strict timing control of all communicating stations (real and nonreal-time). However, in open communication environments, the traffic generated by uncontrolled stations cannot be avoided by existing medium access protocols. In this paper, the definition, implementation, and assessment of a novel MAC technique named bandjacking is performed. Results demonstrate that the support of low-power deterministic communications is possible in open environments by using bandjacking.
98. Solution Processed Metal Oxide in Emerging Electronic Devices

Author:Zhao, C;Zhao, CZ;Zhao, TS

Source:2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ASIC (ASICON),2019,Vol.

Abstract:Recently, solution processed metal oxide (MO) attracts wide interests due to the advantages including low-cost fabrication, procedure simplicity and vacuum-free technique. Within the paper, the synthesis mechanism of metal oxide deposited through solution process is firstly briefly introduced. Then the recent advances and progress on n-type solution processed MO semiconductors as well as the solution processed MO gate dielectrics have been reviewed for thin-film transistors.
99. Comparisons of switching characteristics between Ti/Al2O3/Pt and TiN/Al2O3/Pt RRAM devices with various compliance currents

Author:Qi, YF;Zhao, CZ;Liu, CG;Fang, YX;He, JH;Luo, T;Yang, L;Zhao, C

Source:SEMICONDUCTOR SCIENCE AND TECHNOLOGY,2018,Vol.33

Abstract:In this study, the influence of the Ti and TiN top electrodes on the switching behaviors of the Al2O3/Pt resistive random access memory devices with various compliance currents (CCs, 1-15 mA) has been compared. Based on the similar statistical results of the resistive switching (RS) parameters such as V-set/V-reset, R-HRS/R-LRS (measured at 0.10 V) and resistance ratio with various CCs for both devices, the Ti/Al2O3/Pt device differs from the TiN/Al2O3/Pt device mainly in the forming process rather than in the following switching cycles. Apart from the initial isolated state, the Ti/Al2O3/Pt device has the initial intermediate state as well. In addition, its forming voltage is relatively lower. The conduction mechanisms of the ON and OFF state for both devices are demonstrated as ohmic conduction and Frenkel-Poole emission, respectively. Therefore, with the combined modulations of the CCs and the stop voltages, the TiN/Al2O3/Pt device is more stable for nonvolatile memory applications to further improve the RS performance.
100. Field Support Vector Machines

Author:Huang, KZ;Jiang, HC;Zhang, XY

Source:PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND MACHINE LEARNING (IML'17),2017,Vol.

Abstract:The identically and independently distributed (i.i.d.) condition required by conventional machine learning approaches may sometimes be violated when patterns occur as groups (where each group shares a homogeneous style, called a field). By breaking it, we extend in this paper the famous Support Vector Machine (SVM) to a novel framework named Field Support Vector Machine (F-SVM), in which the training and predicting a group of patterns (i.e., a field pattern) are performed simultaneously. Specifically, the proposed F-SVM is learned by optimizing simultaneously both the classifier and the Style Normalization Transformation (SNT) for each group of data, even feasible in the high-dimensional kernel space. The SNT transform the original style-discriminative patterns to style-free ones, satisfying the i.i.d. assumption required by the conventional SVM learning and implementation. An efficient optimization algorithm is further developed with the convergence guaranteed theoretically. More importantly, by appropriately exploring the style consistency in each field, the proposed F-SVM model is able to significantly improve the classification accuracy. A series of experiments are conducted to verify the effectiveness and confirmed improvement on the performance of the F-SVM model. Empirical results show that the proposed F-SVM outperforms other relevant baselines in two different benchmark data sets.
Total 2,057 results found
Copyright 2006-2020 © Xi'an Jiaotong-Liverpool University 苏ICP备07016150号-1 京公网安备 11010102002019号