Остановите войну!
for scientists:
default search action
Qingzhang Chen
- > Home > Persons > Qingzhang Chen
Publications
- 2017
- [j18]Xiaomin Zhao, Jiabin Zhu, Xueli Liang, Shuangshuang Jiang, Qingzhang Chen:
Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks. IET Inf. Secur. 11(2): 82-88 (2017) - [c23]Chunyu Miao, Lina Chen, Qingzhang Chen:
Sensor Location Verification Scheme Based on Range-Free Localizations in WSNs. HCC 2017: 354-363 - 2016
- [c22]Chunyu Miao, Guoyong Dai, Lina Chen, Hongbo Jin, Qingzhang Chen:
A Node Localization Verification Model for WSN. HCC 2016: 296-309 - 2015
- [j12]Chun-Yu Miao, Guoyong Dai, Keji Mao, Yidong Li, Qingzhang Chen:
RI-MDS: Multidimensional Scaling Iterative Localization Algorithm Using RSSI in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 687258:1-687258:8 (2015) - [j11]Chunyu Miao, Guoyong Dai, Xiaomin Zhao, Zhongze Tang, Qingzhang Chen:
3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 721921:1-721921:11 (2015) - [j10]Chunyu Miao, Guoyong Dai, Kezhen Ying, Qingzhang Chen:
Collaborative Localization and Location Verification in WSNs. Sensors 15(5): 10631-10649 (2015) - 2014
- [c21]Chunyu Miao, Guoyong Dai, Xiaomin Zhao, Zhongze Tang, Qingzhang Chen:
3D Self-Deployment Algorithm in Mobile Wireless Sensor Networks. CWSN 2014: 27-41 - [c20]Chunyu Miao, Guoyong Dai, Keji Mao, Yidong Li, Qingzhang Chen:
RI-MDS: Multidimensional Scaling Iterative Localization Algorithm Using RSSI in Wireless Sensor Networks. CWSN 2014: 164-175 - [c19]Guoyong Dai, Chunyu Miao, Yidong Li, Keji Mao, Qingzhang Chen:
Study on Tree-Based Clustering MDS Algorithm for Nodes Localization in WSNs. CWSN 2014: 176-186 - [c18]Guoyong Dai, Chunyu Miao, Kai Wang, Qingzhang Chen:
A MAC Protocol for Data Gathering in Linear Wireless Sensor Network Based on Selective Relay Nodes. CWSN 2014: 321-331 - [c17]Chunyu Miao, Guoyong Dai, Qingzhang Chen:
Cooperative Localization and Location Verification in WSN. HCC 2014: 193-205 - 2013
- [j5]Keji Mao, Xiaomin Zhao, Qike Shao, Wenxiu He, Yanqiang Ou, Qingzhang Chen:
Data Storage Scheme Supporting for Multidimensional Query. Int. J. Distributed Sens. Networks 9 (2013) - [j4]Keji Mao, Qike Shao, Wenxiu He, Rong Chen, Qingzhang Chen:
Beacon moving location algorithm in WSN. Int. J. Sens. Networks 14(2): 82-91 (2013) - 2011
- [j2]Qingzhang Chen, Yujie Pei, Yan Jin, Hui Zhou:
Design and Implement of Enterprise Knowledge - In case of Zhejiang Electric Power Test and Research Institute. J. Softw. 6(8): 1570-1577 (2011) - [c15]Keji Mao, Xiaomin Zhao, Wenxiu He, Lei Wang, Qingzhang Chen:
Area Division Based Semi-auto DV-Hop Localization algorithm in IEEGS. FSKD 2011: 2249-2253 - [c14]Qingzhang Chen, Qiaoyan Chen, Kai Wang, Zhongzhe Tang, Yujie Pei:
Research on Automatic Recommender System Based on Data Mining. WISM (3) 2011: 28-35 - 2010
- [j1]Xiaomin Zhao, Keji Mao, Shaohua Cai, Qingzhang Chen:
Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network. Wirel. Sens. Netw. 2(9): 710-717 (2010) - [c13]Qingzhang Chen, Yan Jin, Peng Wang:
A framework of awareness for Collaborative e-Commerce. CSCWD 2010: 33-36 - [c12]Qingzhang Chen, Xiaomei Tang, Shuojin Fang:
The design and implement of Internet intelligence agent in electronic commerce environment. CSCWD 2010: 300-305 - 2009
- [c11]Yiming Fan, Qingzhang Chen, Jianjun Yu:
Topology Control Algorithm Based on Bottleneck Node for Large-Scale WSNs. CIS (1) 2009: 592-597 - [c10]Keji Mao, Jian Wu, Qingzhang Chen:
The Design and Implementation of Case-Based Learning in Adaptive Learning. ScalCom-EmbeddedCom 2009: 571-576 - 2007
- [c9]Qingzhang Chen, Chao Chen, Xiaoying Chen:
An Intelligent Knowledge Discovery System with a Novel Knowledge Acquisition Methodology. FSKD (4) 2007: 322-327 - 2006
- [c8]Qingzhang Chen, Yungang Lai, Jianghong Han:
A Implementation for Distributed Backpropagation Using Corba Architecture. IEEE ICCI 2006: 830-834 - [c7]Qingzhang Chen, Jianghong Han, Yuqing Chu, Xiaodong Ying:
Mining Consumers' Most Adaptive Products by Efficient Clustering Algorithm. ICAT Workshops 2006: 195-199 - [c6]Qingzhang Chen, Jianghong Han, Keji Mao:
Design of the Multimedia Communication Protocol and System for Wireless LAN. ICAT 2006: 1018-1025 - [c5]Qingzhang Chen, Weiyi Zhang, Xiaoying Chen, Jianghong Han:
A Facial Expression Classification Algorithm Based on Principle Component Analysis. ISNN (2) 2006: 55-62 - 2005
- [c4]Qingzhang Chen, Jianghong Han, Wenxiu He, Yungang Lai:
Utilize Fuzzy Data Mining to Find the Travel Pattern of Browsers. CIT 2005: 228-232 - [c3]Qingzhang Chen, Jianghong Han, Yungang Lai, Wenxiu He, Keji Mao:
The Research on Fuzzy Data Mining Applied on Browser Records. ADMA 2005: 527-535 - [c2]Qingzhang Chen, Jianghong Han, Yungang Lai, Wenxiu He, Keji Mao:
Clustering Problem Using Adaptive Genetic Algorithm. ICNC (3) 2005: 782-786 - 2004
- [c1]Tongshen Hu, Xiamin, Qingzhang Chen, Kezhen Ying:
Design and implement of firewall-log-based online attack detection system. InfoSecu 2004: 146-149
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint