Jiujiang, China
Jiujiang, China

The Jiujiang University is a college in Jiujiang, northern Jiangxi Province in China. Wikipedia.


Time filter

Source Type

Lei Y.H.,Jiujiang University
Applied Mechanics and Materials | Year: 2014

With the rapid development of industry and urbanization speeding up, the haze days increased rapidly. This kind of phenomenon had been aroused widespread concerned. briefly the definition of haze were introduced with composition, formation characteristics, the influence of fog and the meteorological conditions and the harm to human body health. The relevant measures to prevent fog weather were put forward in order to deepen the public understanding of the haze of knowledge and guide the public to strengthen environmental protection consciousness. conclusion Since chinese reform and opening up, the industry developed rapidly with expanding urbanization. A large number of industrial pollutants and dust were discharged into the atmosphere, haze weather was increasingly frequent. The haze weather of the eastern Chinese city area from 1950 to 1970 presented each year more than 100-200 days. Pro zhong recently was very concerned about the haze weather and remind to be highly alert to the dangers of smog. His preliminary conclusion was that the haze harmed popular respiratory system, nerve system, cardiovascular system, especially leading lung cancer.Numerous media also appeared constantly reports, haze had caused widespread concern and becomed a social hot spot in recent years © (2014) Trans Tech Publications, Switzerland.


Wu Q.,Jiujiang University
Computers and Education | Year: 2015

The researcher developed a Basic4Android smartphone app (named as Word Learning-CET6) and investigated its effectiveness as a tool in helping English as a Foreign Language college students learn English vocabulary. The app, containing 1274 English words, was designed to be installed into smartphones with Android operating system. To test the program's effectiveness, two groups of students were set up as a test group (those with Word Learning-CET6) and a control group (those without Word Learning-CET6). Knowledge of the vocabulary was tested before and after the study to assess the impact of the program. The study showed that the students using the program significantly outperformed those in the control group in acquiring new vocabulary. At the conclusion of this study, the researcher designed an app and established a pedagogical paradigm which can be followed as a way of mobile learning. © 2015 Elsevier Ltd. All rights reserved.


In order to decrease the negative effect of limitation factors like distance,region and time in the system of wireless image monitoring, this paper designs a wireless remote image monitoring system which based on ARM and GPRS through digital imaging and network transmission technique. The system give full play of embedded picture collection and processer: small volume,low power consumption,high reliability and low cost of GRPS network. The result in the experiment shows that the system have advantages of easy to design,reliable performance,the real-time image which stratify the demand of remote transmission,checking at anytime and anyplace for users, it will have a wide perspective. © 2011 Published by Elsevier Ltd.


Cai B.,Jiujiang University
Lecture Notes in Electrical Engineering | Year: 2014

In this paper, we present a novel NSSA framework which includes two parts: NSSV and intrusion process. The framework can make the CND decision maker to know the degree of impact on the network security and how the network security is affected. To compute NSSV, first upon AHP, present a novel algorithm to evaluate the serviceweight to the CNDmission. Then take CVSS to assess the impact severity of vulnerabilities and attack actions, last fuse these data to calculate the NSSV upon logical hierarchical network structure. Otherwise uponAGT to associate attack actions for the discovery of intrusion process. © Springer-Verlag Berlin Heidelberg 2014.


Duan X.,Jiujiang University | Jiang Y.,Jiujiang University
Applied Surface Science | Year: 2010

N-type Bi2Te2.7Se0.3 thermoelectric thin films with thickness 800 nm have been deposited on glass substrates by flash evaporation method at 473 K. Annealing effects on the thermoelectric properties of Bi2Te2.7Se0.3 thin films were examined in the temperature range 373-573 K. The structures, morphology and chemical composition of the thin films were characterized by X-ray diffraction, field emission scanning electron microscope and energy dispersive X-ray spectroscopy, respectively. Thermoelectric properties of the thin films have been evaluated by measurements of the electrical resistivity and Seebeck coefficient at 300 K. The Hall coefficients were measured at room temperature by the Van der Pauw method. The carrier concentration and mobility were calculated from the Hall coefficient. The films thickness of the annealed samples was measured by ellipsometer. When annealed at 473 K, the electrical resistivity and Seebeck coefficient are 2.7 mΩ cm and -180 μV/K, respectively. The maximum of thermoelectric power factor is enhanced to 12 μW/cm K2.© 2010 Elsevier B.V.


Zhou C.,Jiujiang University
Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014 | Year: 2014

Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm and one key pair, which is very suitable for storage-constrained environments, like the embedded systems, smart cards and wireless sensor networks. In this paper, a multi-receiver identity-based generalized signcryption scheme (MID-GSC) is proposed, the formal definition and security notions are defined, and the concrete scheme is proved to be confidential under the bilinear Diffie-Hellman assumption and existentially unforgeable under the computational Diffie-Hellman assumption in the random oracle model. By using the randomness reuse technique, the scheme only needs one pairing computation to generally sign crypt a single message for n receivers. Compared with the traditional approach, the new scheme is of high efficiency. © 2014 IEEE.


Shu-yue M.,Jiujiang University
Advances in Information Sciences and Service Sciences | Year: 2012

In traditional application of chaotic theory in encryption, we can find the computation rate is low. In order to solve such problems, this paper proposes a chaotic image encryption algorithm based on maximum entropy. Firstly, we have to regard the image for encryption as a common data flow, and then we exert the image features with an algorithm based on maximum entropy. Next, we encrypted the data flow regarding the chaotic binary sequence with chaotic theory as the key. Through the design of encryption algorithm with a chaotic binary sequence, the computation cost and efficiency in encryption and de-encryption have been comparatively improved. The analysis algorithm has strong anti-key brute-force attack and resistance capabilities. The experimental results show that the algorithm proposed in this paper has features of effectiveness and practice. In addition, the image encryption has reached a higher security level.


Hui-fen L.,Jiujiang University
Advances in Information Sciences and Service Sciences | Year: 2012

The methods for intrusion of network is diverse, as for the attack of virus and hacker, there are some issues that the detection speed is slow and accuracy is low due to unreasonable set of initial value of traditional method. In order to improve the accuracy of network detection, a genetic algorithm is proposed to optimize RBF neural network weight value. At first, by genetic algorithm find the most reasonable weight value of RBF neutral network, then study and detect the network data by adopting optimized RBF neural network. The test indicates compared with traditional network intrusion detection algorithm, the optimized RBF neural network improves the accuracy of network intrusion data detection, accelerates the speed of network intrusion, and improve the efficiency of detection.


Three drugs such as atropine sulfate, vitamin C, aminophylline were simultaneously determined by a spectrophotometric method comined with the aid ofchemometrics. The result revealed that the principle component regression and the partial least square method overcome the overlapping of their absorption curves in the UV spectral region. It was shown that the predictive errors obtained by the PCR method was 1.59%. Recovery of the method by standard addition method was respectively valued 100.31% (for atropine sulfate) and 99.42% (for vitamin C) and 97.11% (for aminophylline),. © (2013) Trans Tech Publications, Switzerland.


Wang Y.F.,Jiujiang University
Applied Mechanics and Materials | Year: 2014

The author analyzes the traditional foreign language teaching website system structure and function, and points out the weakness of its client/server network computing model. By using the Peer to Peer (P2P) system, we can make full use of every online node computing power and communication bandwidth; we can provide better online communication resource sharing among students, teachers, students and teachers. This paper proposes a foreign language teaching system based on P2P, which can effectively make up for the inadequacy of traditional teaching website. We can also explore the application of P2P technology in multimedia network teaching. © (2014) Trans Tech Publications, Switzerland.

Loading Jiujiang University collaborators
Loading Jiujiang University collaborators