Chenglian Liu
YOU?
Author Swipe
View article: The second-hand car system based on teraherhz and blockchain technology
The second-hand car system based on teraherhz and blockchain technology Open
In recent years, the application of terahertz technology has gradually become more and more extensive. It has important research significance in physics, biomedicine, astronomy, material science and environmental science. Terahertz can als…
View article: Normalized solutions for the Kirchhoff problem with critical exponential growth
Normalized solutions for the Kirchhoff problem with critical exponential growth Open
View article: Intelligent Diagnosis of Rolling Bearings Under Cross-Domain Missing Data: A Lightweight Complex Domain Interpolation and Unsupervised Time-Frequency Alignment Approach
Intelligent Diagnosis of Rolling Bearings Under Cross-Domain Missing Data: A Lightweight Complex Domain Interpolation and Unsupervised Time-Frequency Alignment Approach Open
View article: The Difficulties and Decisions of Academic Misconduct in Information Forensics–A Case Study to Cryptographer
The Difficulties and Decisions of Academic Misconduct in Information Forensics–A Case Study to Cryptographer Open
Panda and Chattopadhyay proposed "A Hybrid Algorithm for RSA Cryptosystem" in 2017, they modified well-known algorithm RSA into modulo four prime numbers. Later, Gondaliya, Savani, Dhaduvai and Hossain proposed "Hybrid Security RSA Algorit…
View article: Security Analysis of Heart Disease Data Based Privacy Preservation Using Enhanced Elgamal and Resnet Classifie
Security Analysis of Heart Disease Data Based Privacy Preservation Using Enhanced Elgamal and Resnet Classifie Open
View article: The Symmetry of Primitive Root in Number Theory
The Symmetry of Primitive Root in Number Theory Open
Symmetry refers to the exact same characteristics on both sides of an object or figure on a central axis or plane. In science and daily life, symmetrical things give people a sense of dignity and contain the beauty of balance and stability…
View article: Transferring General Multimodal Pretrained Models to Text Recognition
Transferring General Multimodal Pretrained Models to Text Recognition Open
This paper proposes a new method, OFA-OCR, to transfer multimodal pretrained models to text recognition. Specifically, we recast text recognition as image captioning and directly transfer a unified vision-language pretrained model to the e…
View article: Transferring General Multimodal Pretrained Models to Text Recognition
Transferring General Multimodal Pretrained Models to Text Recognition Open
This paper proposes a new method, OFA-OCR, to transfer multimodal pretrained models to text recognition. Specifically, we recast text recognition as image captioning and directly transfer a unified vision-language pretrained model to the e…
View article: Intra-session Context-aware Feed Recommendation in Live Systems
Intra-session Context-aware Feed Recommendation in Live Systems Open
Feed recommendation allows users to constantly browse items until feel uninterested and leave the session, which differs from traditional recommendation scenarios. Within a session, user's decision to continue browsing or not substantially…
View article: Study of COVID-19 Monitoring System Based on Block Chain and Anonymity Techniques
Study of COVID-19 Monitoring System Based on Block Chain and Anonymity Techniques Open
Since the COVID-19 epidemic has been raging around the world, it has a great impact on people’s life and work; in addition to monitoring and controlling the epidemic situation, government departments are also facing the impact of economic …
View article: A Novel Personal Medicine Record Scheme Based on Block Chain and Cryptographic
A Novel Personal Medicine Record Scheme Based on Block Chain and Cryptographic Open
The World Health Organization (WHO) has defined “eHealth” as “the application of information and communication technology” (ICT) in the medical and health field. This includes “medical care, disease management, public health surveillance, …
View article: Research on the Used Car System Based on Blockchain and Cryptographic Technology
Research on the Used Car System Based on Blockchain and Cryptographic Technology Open
Different countries have different issues with related to topic of used car in all of world, and used car issues involve very wide range of fields, such as environmental protection, market economy, sales services, information systems, regu…
View article: A Novel Integrated Freight Forwarding Information System Based on Block-Chain Technology
A Novel Integrated Freight Forwarding Information System Based on Block-Chain Technology Open
As an emerging foreign trade model, crossborder E-commerce is booming. This foreign trade model shortens the distance between products from manufacturers to foreign consumers and reshapes the value chain of foreign trade. However, because …
View article: Study of Enterprise Internal Control Based on Virtual Team and Cryptology Technique
Study of Enterprise Internal Control Based on Virtual Team and Cryptology Technique Open
The development in information technology, the widespread use of Internet and the fast movement of e-commerce has promoted the earlier realization of digital economy. Lots of enterprises use information technology inside the enterprise to …
View article: Review of Li-Li Mixture XOR Algorithm
Review of Li-Li Mixture XOR Algorithm Open
RSA is one of the well-known public key cryptography algorithms (asymmetric encryption cryptosystem) , it has been more than 40 years since it was put forward. There are countless literatures on RSA related issues; hot discussion and popul…
View article: A Formal Verification Based on Yu-Cao Delayed Chaotic Neural Network
A Formal Verification Based on Yu-Cao Delayed Chaotic Neural Network Open
Yu and Cao proposed “Cryptography based on delayed chaotic neural networks” in 2006. However, in 2009, Yang et al. pointed out the Yu-Cao scheme can not against chosen plaintext attack. Liu et al. studies exclusiveor logical operation very…
View article: Innovative Strategies to Fuel Organic Food Business Growth: A Qualitative Research
Innovative Strategies to Fuel Organic Food Business Growth: A Qualitative Research Open
This study aimed to identify the factors affecting consumer behavior and customer loyalty toward organic food. Whether consumers seek organic food for a healthy body or more as food for thought continues to be debated. However, since consu…
View article: Research on an Intelligent Recommendation Method for Product Design Knowledge Based on Long- and Short-Term User Behavior Sequences
Research on an Intelligent Recommendation Method for Product Design Knowledge Based on Long- and Short-Term User Behavior Sequences Open
View article: SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation
SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation Open
View article: B4SDC: A Blockchain System for Security Data Collection in MANETs
B4SDC: A Blockchain System for Security Data Collection in MANETs Open
Security-related data collection is an essential part for attack detection and security measurement in Mobile Ad Hoc Networks (MANETs). Due to no fixed infrastructure of MANETs, a detection node playing as a collector should discover avail…
View article: A Study of Authenticated Communication Based on Magic Square and Goldbach’s Conjecture
A Study of Authenticated Communication Based on Magic Square and Goldbach’s Conjecture Open
Although the magic square is a historical and universal study, its progress has been limited, to numeric games, which is closer to digital games or word games, and lacks the connection with mainstream mathematics. Recently, its study has e…
View article: How Geographical Isolation and Aging in Place Can Be Accommodated Through Connected Health Stakeholder Management: Qualitative Study With Focus Groups
How Geographical Isolation and Aging in Place Can Be Accommodated Through Connected Health Stakeholder Management: Qualitative Study With Focus Groups Open
Background In remote areas, connected health (CH) is needed, but as local resources are often scarce and the purchasing power of residents is usually poor, it is a challenge to apply CH in these settings. In this study, CH is defended as a…
View article: “Nomen Omen”: Exploring Connected Healthcare through the Perspective of Name Omen
“Nomen Omen”: Exploring Connected Healthcare through the Perspective of Name Omen Open
Background: The evolution of names, from “medical informatics” to “connected health”, implies that the evolvement of technology in health care has been shifted from technology-oriented to healthcare-oriented implementation. Connected healt…
View article: B4SDC: A Blockchain System for Security Data Collection in MANETs
B4SDC: A Blockchain System for Security Data Collection in MANETs Open
Security-related data collection is an essential part for attack detection and security measurement in Mobile Ad Hoc Networks (MANETs). A detection node (i.e., collector) should discover available routes to a collection node for data colle…
View article: “Nomen Omen”: Exploring Connected Healthcare through the Perspective of Name Omen
“Nomen Omen”: Exploring Connected Healthcare through the Perspective of Name Omen Open
Background: The evolution of names, from “medical informatics” to “connected health”, implies that the evolvement of technology in health care has been shifted from technology-oriented to healthcare-oriented implementation. Connected healt…
View article: Fad or Trend? Rethinking the Sustainability of Connected Health
Fad or Trend? Rethinking the Sustainability of Connected Health Open
Policymakers, academics, and industry players have been focused on determining whether connected health (CH) is a fad or a trend by looking at its sustainability. Although the significance of innovation in healthcare is gradually rising, a…
View article: Lightweight Privacy-Preserving Raw Data Publishing Scheme
Lightweight Privacy-Preserving Raw Data Publishing Scheme Open
Data publishing or data sharing is an important part of analyzing network environments and improving the Quality of Service (QoS) in the Internet of Things (IoT). In order to stimulate data providers (i.e., IoT end-users) to contribute the…
View article: Factors Influencing the Application of Connected Health in Remote Areas, Taiwan: A Qualitative Pilot Study
Factors Influencing the Application of Connected Health in Remote Areas, Taiwan: A Qualitative Pilot Study Open
This pilot study investigated factors influencing the application of connected health (CH) in Taiwanese remote areas. These factors cover issues of cost, infrastructure, technology, business sustainability, business model, collaboration, a…
View article: Optimal Transceiver Design for SWIPT in Interference Alignment Network
Optimal Transceiver Design for SWIPT in Interference Alignment Network Open
This paper studies simultaneous wireless information and power transfer in a K-user multiple-input multiple-output interference channel. A new scheme jointly designing interference alignment (IA) and wireless energy harvesting is proposed.…
View article: An Adaptive Network Data Collection System in SDN
An Adaptive Network Data Collection System in SDN Open
Network data collection is a vital part in the process of network monitoring, traffic billing, network management and intrusion detection. As a new kind of network architecture, Software Defined Network (SDN) provides a possibility of inte…