Entity

Time filter

Source Type

Donggang, China

Zhaoqing University is a public university based in the Duanzhou District of the prefecture level city of Zhaoqing, Guangdong Province, China. Zhaoqing University is a provincial comprehensive university which enrolls students on four-year degree programmes. Wikipedia.


Wan L.,Wuhan Textile University | Zhou Q.,Zhaoqing University
Nonlinear Analysis: Real World Applications | Year: 2011

This paper investigates the attractor and ultimate boundedness for stochastic cellular neural networks with delays. By employing the Lyapunov method and a Lasalle-type theorem, novel results and sufficient criteria on the attractor and ultimate boundedness are obtained. © 2011 Elsevier Ltd. All rights reserved. Source


Unusual trimeric and tetrameric water clusters have been observed in a complex of [Cu(DBA)(phen) 2·(H 2O) 4·(NO 3)] (1), (HDBA = benzilic acid, phen = 1,10-phenanthroline), which was prepared under solvothermal conditions and characterized by elemental analysis, IR spectroscopy, thermogravimetric analysis (TGA), UV-Vis spectroscopy, powder X-ray diffraction and single-crystal X-ray diffraction. In 1, a butterfly-like water-nitrate trimer formed by two water molecules and one nitrate anion, as well as a cyclic tetrameric water cluster are observed. The uncoordinated carboxylate oxygen atoms of DBA ligands, water molecules and nitrate anions interact via hydrogen bonds and extend 1 into a water-anion-cation tape, which in turn join to form a double water-anion-cation tape via π···π stacking interactions involving neighboring pyridyl and phenyl groups of DBA ligands. © 2012 Elsevier B.V. All rights reserved. Source


Peng S.,Zhaoqing University | Yu S.,Deakin University | Yang A.,Guangdong University of foreign Studies
IEEE Communications Surveys and Tutorials | Year: 2014

Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to legitimate users, we survey the current smartphone malware status and their propagation models. The content of this paper is presented in two parts. In the first part, we review the short history of mobile malware evolution since 2004, and then list the classes of mobile malware and their infection vectors. At the end of the first part, we enumerate the possible damage caused by smartphone malware. In the second part, we focus on smartphone malware propagation modeling. In order to understand the propagation behavior of smartphone malware, we recall generic epidemic models as a foundation for further exploration. We then extensively survey the smartphone malware propagation models. At the end of this paper, we highlight issues of the current smartphone malware propagation models and discuss possible future trends based on our understanding of this topic. © © 2014 IEEE. Source


Peng S.,Zhaoqing University | Wang G.,Central South University | Yu S.,Deakin University
Journal of Computer and System Sciences | Year: 2013

Smartphones combine the communication capabilities of cellphones and the functions of PDA (personal digital assistant), which enable us to access a large variety of ubiquitous services, such as surfing the web, sending/receiving emails, MMS, and online shopping. However, the availability of these services provided by smartphones increases the vulnerability to worm attacks. In addition, modeling on worm propagation in smartphones is particularly challenging because it is difficult to piece together dynamics from pair-wise device interactions. To characterize the propagation dynamics of worms in smartphones, we propose an efficient worm propagation modeling scheme using a two-dimensional cellular automata based on the epidemic theory. A set of suitable local transition rules is designed for the two-dimensional cellular automata in this scheme. Moreover, this scheme integrates an infection factor to evaluate the spread degree of infected nodes, and a resistance factor to evaluate the degree that susceptible nodes resist. Five classes of epidemic states are considered: susceptible, exposed, infected, diagnosed, and recovered. We explore a strategy for simulating the dynamics of worm propagation process from a single node to the entire network. The effectiveness and rationality of the proposed model have been validated through extensive simulations. © 2012 Elsevier Inc. Source


Xu S.,Zhaoqing University
Nonlinear Analysis: Real World Applications | Year: 2010

In this paper, a free boundary problem modeling tumor growth under the direct effect of an inhibitor with time delays is studied. The delays represent the time taken for cells to undergo mitosis. Nonnegativity of solutions, the existence of the stationary solutions and their asymptomatic behavior are studied. The results show that when the inhibitor is large, and the initial tumor is not too large, the tumor will disappear. If however, the initial tumor is large enough, then it will grow. When the inhibitor is not as large, the growth of the tumor is determined by the size of the nutrients and whether the initial tumor is large or not. When the inhibitor is smaller, the tumor will grow no matter if the initial tumor is large or not. © 2008 Elsevier Ltd. All rights reserved. Source

Discover hidden collaborations