Jiujiang, China

Jiujiang University

Jiujiang, China

The Jiujiang University is a college in Jiujiang, northern Jiangxi Province in China. Wikipedia.

Time filter
Source Type

Jiang R.,Jiujiang University
Journal of Computational and Theoretical Nanoscience | Year: 2016

In order to make the simulation results for the path of badminton movement more real and reliable, combined with the airflow characteristics of badminton movement, a simulation method of the badminton movement and rotation based on four-dimensional polar coordinate fluid mechanics model has been proposed. This paper takes manufacturing parameters of a certain type of domestic badminton as the background to firstly establish a two-dimensional model comprised of equal-proportion badminton sphere with standard and natural badminton as the prototype and its surrounding cylinder range domain; secondly, set up 4 coordinate systems including badminton field, badminton flight, badminton speed and badminton sphere based on the state equation of badminton space motion under actual environment and use the Newton's Second Law and other methods to directly derive the motion equation of badminton flight path in these coordinate systems. Finally, the effectiveness of the proposed model is verified by experimental simulation. © 2016 American Scientific Publishers All rights reserved.

Liu J.,Jiujiang University
Microwave and Optical Technology Letters | Year: 2017

Terahertz spectroscopy coupled with chemometrics is illustrated to be a useful tool to identify the transgenic corn oil. Terahertz and physicochemical data are gather about transgenic and non-transgenic corn oils. The two identification models of partial least squares discriminate analyses (PLS-DA) are established and compared by using terahertz spectroscopy data and physicochemical data respectively. The result shows that PLS-DA model with physicochemical data can not accurately distinguish between transgenic and non-transgenic corn oils. Quite the contrary, the PLS-DA model with terahertz spectroscopy data is better in the validation set; this model accurately identified transgenic corn oil with accuracy of 98.7%. The proposed method has advantages of fast, simple, nondestructive, and easy to operate. The results indicated that Terahertz spectroscopy coupled with chemometrics as a powerful tool to identify transgenic oil. © 2017 Wiley Periodicals, Inc. Microwave Opt Technol Lett 59:654–658, 2017. © 2017 Wiley Periodicals, Inc.

Lei Y.H.,Jiujiang University
Applied Mechanics and Materials | Year: 2014

With the rapid development of industry and urbanization speeding up, the haze days increased rapidly. This kind of phenomenon had been aroused widespread concerned. briefly the definition of haze were introduced with composition, formation characteristics, the influence of fog and the meteorological conditions and the harm to human body health. The relevant measures to prevent fog weather were put forward in order to deepen the public understanding of the haze of knowledge and guide the public to strengthen environmental protection consciousness. conclusion Since chinese reform and opening up, the industry developed rapidly with expanding urbanization. A large number of industrial pollutants and dust were discharged into the atmosphere, haze weather was increasingly frequent. The haze weather of the eastern Chinese city area from 1950 to 1970 presented each year more than 100-200 days. Pro zhong recently was very concerned about the haze weather and remind to be highly alert to the dangers of smog. His preliminary conclusion was that the haze harmed popular respiratory system, nerve system, cardiovascular system, especially leading lung cancer.Numerous media also appeared constantly reports, haze had caused widespread concern and becomed a social hot spot in recent years © (2014) Trans Tech Publications, Switzerland.

Wu Q.,Jiujiang University
Computers and Education | Year: 2015

The researcher developed a Basic4Android smartphone app (named as Word Learning-CET6) and investigated its effectiveness as a tool in helping English as a Foreign Language college students learn English vocabulary. The app, containing 1274 English words, was designed to be installed into smartphones with Android operating system. To test the program's effectiveness, two groups of students were set up as a test group (those with Word Learning-CET6) and a control group (those without Word Learning-CET6). Knowledge of the vocabulary was tested before and after the study to assess the impact of the program. The study showed that the students using the program significantly outperformed those in the control group in acquiring new vocabulary. At the conclusion of this study, the researcher designed an app and established a pedagogical paradigm which can be followed as a way of mobile learning. © 2015 Elsevier Ltd. All rights reserved.

In order to decrease the negative effect of limitation factors like distance,region and time in the system of wireless image monitoring, this paper designs a wireless remote image monitoring system which based on ARM and GPRS through digital imaging and network transmission technique. The system give full play of embedded picture collection and processer: small volume,low power consumption,high reliability and low cost of GRPS network. The result in the experiment shows that the system have advantages of easy to design,reliable performance,the real-time image which stratify the demand of remote transmission,checking at anytime and anyplace for users, it will have a wide perspective. © 2011 Published by Elsevier Ltd.

Cai B.,Jiujiang University
Lecture Notes in Electrical Engineering | Year: 2014

In this paper, we present a novel NSSA framework which includes two parts: NSSV and intrusion process. The framework can make the CND decision maker to know the degree of impact on the network security and how the network security is affected. To compute NSSV, first upon AHP, present a novel algorithm to evaluate the serviceweight to the CNDmission. Then take CVSS to assess the impact severity of vulnerabilities and attack actions, last fuse these data to calculate the NSSV upon logical hierarchical network structure. Otherwise uponAGT to associate attack actions for the discovery of intrusion process. © Springer-Verlag Berlin Heidelberg 2014.

Zhou C.,Jiujiang University
Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014 | Year: 2014

Generalized signcryption (GSC) can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm and one key pair, which is very suitable for storage-constrained environments, like the embedded systems, smart cards and wireless sensor networks. In this paper, a multi-receiver identity-based generalized signcryption scheme (MID-GSC) is proposed, the formal definition and security notions are defined, and the concrete scheme is proved to be confidential under the bilinear Diffie-Hellman assumption and existentially unforgeable under the computational Diffie-Hellman assumption in the random oracle model. By using the randomness reuse technique, the scheme only needs one pairing computation to generally sign crypt a single message for n receivers. Compared with the traditional approach, the new scheme is of high efficiency. © 2014 IEEE.

Shu-yue M.,Jiujiang University
Advances in Information Sciences and Service Sciences | Year: 2012

In traditional application of chaotic theory in encryption, we can find the computation rate is low. In order to solve such problems, this paper proposes a chaotic image encryption algorithm based on maximum entropy. Firstly, we have to regard the image for encryption as a common data flow, and then we exert the image features with an algorithm based on maximum entropy. Next, we encrypted the data flow regarding the chaotic binary sequence with chaotic theory as the key. Through the design of encryption algorithm with a chaotic binary sequence, the computation cost and efficiency in encryption and de-encryption have been comparatively improved. The analysis algorithm has strong anti-key brute-force attack and resistance capabilities. The experimental results show that the algorithm proposed in this paper has features of effectiveness and practice. In addition, the image encryption has reached a higher security level.

Hui-fen L.,Jiujiang University
Advances in Information Sciences and Service Sciences | Year: 2012

The methods for intrusion of network is diverse, as for the attack of virus and hacker, there are some issues that the detection speed is slow and accuracy is low due to unreasonable set of initial value of traditional method. In order to improve the accuracy of network detection, a genetic algorithm is proposed to optimize RBF neural network weight value. At first, by genetic algorithm find the most reasonable weight value of RBF neutral network, then study and detect the network data by adopting optimized RBF neural network. The test indicates compared with traditional network intrusion detection algorithm, the optimized RBF neural network improves the accuracy of network intrusion data detection, accelerates the speed of network intrusion, and improve the efficiency of detection.

Wang Y.F.,Jiujiang University
Applied Mechanics and Materials | Year: 2014

The author analyzes the traditional foreign language teaching website system structure and function, and points out the weakness of its client/server network computing model. By using the Peer to Peer (P2P) system, we can make full use of every online node computing power and communication bandwidth; we can provide better online communication resource sharing among students, teachers, students and teachers. This paper proposes a foreign language teaching system based on P2P, which can effectively make up for the inadequacy of traditional teaching website. We can also explore the application of P2P technology in multimedia network teaching. © (2014) Trans Tech Publications, Switzerland.

Loading Jiujiang University collaborators
Loading Jiujiang University collaborators