Current location - Education and Training Encyclopedia - Graduation thesis - Award-winning situation of Wang Yinglong
Award-winning situation of Wang Yinglong
(1) Computer Digital Evidence Security Backup and Retrieval System, Wang Yinglong, Zhang, Zhou Yang, Kong Zhigang, Guo Qiuxiang, Zhang Ruichao, Yang Poplar Cotton, Wu Junli, First Prize of Shandong Science and Technology Progress, 20 10.

(2) Research and development of handheld wireless LAN tester, second prize of Shandong Science and Technology Progress Award, Wang Yinglong, Chen Jing, Wang Meiqin, Pan Jingshan, Guo Mu, Zhang Zanjun and Wang Jizhi.

(3) Research on security solution of 3)AdHoc mobile network and security evaluation method of routing protocol, second prize of scientific and technological progress of Academy of Sciences, Wang Meiqin, Pan Jingshan, Wang, Zhang Zanjun,.

(4) Research on Detection and Evaluation Standards of Computer Networks in Shandong Province, Second Prize of Shandong Science and Technology Progress, Wang Yinglong, Wang Lianhai, Li Depeng, Gu Weidong, Yang Zijiang.

(5) Research and Application of Key Technologies of Software Quality Control, third prize of Shandong Science and Technology Progress Award, Wang Yinglong, Han, Dong Huomin, Wei Xiuhua.

(6) Research and Implementation of Software Metric Model, second prize of Shandong Science and Technology Progress Award, Wang Yinglong, Zou Fengyi, Han, Zheng, Wang.

(7) The Research and Application of Software Testing Method System won the third prize of Shandong Science and Technology Progress Award, Han, Wang Yinglong, Gu Weidong, Ma Jun.

Relevant representative papers

(1) Collision Problems and Analysis of Hash Functions with Keys Based on Chaos, Wang Jizhi, Wang Yinglong, Wang Meiqin, Journal of Physics, 57(5): 2737-2742, (SCI)

(2) Feature Selection of Traffic Flow Forecasting, Sun Zhanquan, Wang Yinglong, Pan Jingshan, 7th Global Conference on Intelligent Control and Automation, pp. 2864-2869, (EI)

(3) Short-term $ TERM traffic flow forecasting based on clustering and feature selection, Sun Zhanquan, Wang Yinglong, Pan Jingshan, 2008 IEEE International Joint Neural Network Conference, pages 577-583, (EI)

(4) End-to-end authentication protocol for mobile communication based on WPKI, Wang Jizhi, Wang Yinglong, Computer Application Research, 24(8): 146- 148, (a core publication in China).

(5) Collision defect of a Hash function method based on chaotic mapping, Wang Jizhi, Wang Yinglong, Wang Meiqin, Journal of Physics, 55( 10): 48-53, (SCI).

(6) Security Analysis of ad hoc Network Routing Protocol Based on Improved Strand Space, Wang Jizhi, Wang Yinglong, Journal of Software, 17 (Supplement): 256-26 1, (ei)

(7) Routing Strategies for Pervasive Computing, Wang Jizhi, Wang Yinglong, Wang MEIqin, 2006, 802-804, (ei)

(8) Wireless mobile multimedia QoS routing protocol based on ultra-wideband technology, Wang Jizhi, Wang Yinglong, Wang MEIqin, China Journal of Image and Graphics,10 (11):1394-1397, (ei).

(9) A New Type of Multiple Digital Signature, Wang Yinglong, Wang Lianhai, Proceedings of the 9th CSCW International Design Conference, pp. 750-754, (ISTP).

(10) The periodicity of a class of N-dimensional Arnold-type transformations and its application,, Wang Yinglong, Wang MEIqin, IEEE ISI' 07,376, (ei)

(1 1) Research on proxy multi-digital signature scheme based on DLP, Wang Lianhai, Wang Yinglong, Journal of Communications, Vol.26, No.0/2, (ISTP).

(12) A New Signature Scheme —— Research on Multi-signature Based on Agent, Wang Yinglong, Computer Engineering and Application, 2005. 10 pp77-79, (ISTP).

(13) Analysis of Fast Ethernet Service Transmission Model, Wang Yinglong, et al., Computer Engineering and Application, 2001.1(20th issue), pp. 74-76, (ISTP).

(14) Security Analysis of Routing Protocol in ad hoc Mobile Network Based on BAN Logic, Wang Yinglong, Wang Meiqin, Journal of Communication, 21(4):125-129, (ei)

(15) parking choice behavior model with parking guidance information, Ding Qingyan, Pan Jingshan, Wang Yinglong,, Zhang Lidong, 07, 2007, 1: 3 1-36, (ei).

(16) Study on Urban Associated Road Sections Based on Fuzzy Graph Theory, Zhang Lidong, Wang Yinglong, Guo Mu, Pan Jingshan, Ding Qingyan, 07, 3:2669-2674, (EI).

(17) security analysis of ad hoc routing protocol based on improved strand, special purpose acquisition company, Wang Yinglong, Wang Jizhi, Wang MEIqin, SPCA 2006, 585-588, (ei)

(18) Intelligent Handover Decision in Wireless Heterogeneous Networks, Guo Qiang, Wang Yinglong, Journal of Harbin Institute of Technology, 2008. 12, (ei).