About
4
Publications
351
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
40
Citations
Current institution
Publications
Publications (4)
This paper investigates the outage probability of an energy harvesting (EH) relay-aided cooperative network, where a source node transmits information to its destination node with the help of an energy harvesting cooperative node. For such a system, we derive an explicit closed-form expression of outage probability over Nakagami-m fading channels f...
This paper investigates the outage performance of an energy-harvesting(EH) relay-aided cooperative network, where the source node transmits information to its destination node with the help of multiple energy-harvesting cooperative nodes. For such a system, we derive an explicit closed-form expression of outage probability over Nakagami-m fading ch...
Although anti-phishing solutions were highly publicized, phishing attack has been still an important serious problem. In this paper, a novel phishing webpage detecting algorithm using the webpage noise and n-gram was proposed. Firstly, the phishing webpage detecting algorithm extracts the webpage noise from suspicious websites, and then expresses i...
The conventional text similarity detection usually use word frequency vectors to represent texts. But it is high-dimensional and sparse. So in this research, a new text similarity detection algorithm using component relation map (CRM-TSD) is proposed. This method is based on the mathematical expression of Chinese characters with which Chinese chara...