@inproceedings{liang_wang_krirn_2016, title={A behavior-based evaluation of product quality}, DOI={10.1109/icassp.2016.7472010}, abstractNote={In the pharmaceutical industry, quality is often measured by the impact of a product on a population. Knowledge about the behaviour of mosquitos responding to a repellent is a case in point in helping to improve the effect of insect repellent. It is ideally carried out using 3D videos which require a stereoscopic apparatus. To do so using 2D video and effectively evaluate the repellent is an difficult problem as is known in the biotechnology research field. In this paper, we propose a general framework for the swarm motion analysis of multiple mosquitos based on 2D videos. The effectiveness and robustness of our algorithm are verified by multiple 2D videos capturing mosquitos behavior in different experimental conditions.}, booktitle={International conference on acoustics speech and signal processing}, author={Liang, W. and Wang, H. and Krirn, H.}, year={2016}, pages={1916–1920} } @article{fang_liang_lee_2008, title={A new solution branch for the Blasius equation-A shrinking sheet problem}, volume={56}, ISSN={["1873-7668"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-55649105432&partnerID=MN8TOARS}, DOI={10.1016/j.camwa.2008.07.027}, abstractNote={In this work, a similarity equation of the momentum boundary layer is studied for a moving flat plate with mass transfer in a stationary fluid. The solution is applicable to the practical problem of a shrinking sheet with a constant sheet velocity. Theoretical estimation of the solution domain is obtained. It is shown that the solution only exists with mass suction at the wall surface. The equation with the associated boundary conditions is solved using numerical techniques. Greatly different from the continuously stretching surface problem and the Blasius problem with a free stream, quite complicated behavior is observed in the results. It is seen that there are three different solution zones divided by two critical mass transfer parameters, f01≈1.7028 and f02≈1.7324. When f0f02). There is a terminating point for the solution domain and the terminating point corresponds to a special algebraically decaying solution for the current problem. The current results provide a new solution branch of the Blasius equation, which is greatly different from the previous study and provide more insight into the understanding of the Blasius equation.}, number={12}, journal={COMPUTERS & MATHEMATICS WITH APPLICATIONS}, author={Fang, Tiegang and Liang, Wei and Lee, Chia-fon F.}, year={2008}, month={Dec}, pages={3088–3095} } @article{wang_liang_agarwal_2005, title={Integration of authentication and mobility management in third generation and WLAN data networks}, volume={5}, ISSN={["1530-8677"]}, DOI={10.1002/wcm.335}, abstractNote={Abstract}, number={6}, journal={WIRELESS COMMUNICATIONS & MOBILE COMPUTING}, author={Wang, WY and Liang, W and Agarwal, AK}, year={2005}, month={Sep}, pages={665–678} } @article{liang_wang_2005, title={On performance analysis of challenge/response based authentication in wireless networks}, volume={48}, ISSN={["1872-7069"]}, DOI={10.1016/j.comnet.2004.10.016}, abstractNote={The emergence of public access wireless networks enables ubiquitous Internet services, whereas inducing more challenges of security due to open mediums. As one of the most widely used security mechanisms, authentication is to provide secure communications by preventing unauthorized usage and negotiating credentials for verification. Meanwhile, it generates heavy overhead and delay to communications, further deteriorating overall system performance. Therefore, it is very important to have an in-depth understanding of the relationship between the security and quality of service (QoS) through the authentication in wireless networks. In this paper, we analyze the impact of authentication on the security and QoS quantitatively. First, a system model based on challenge/response authentication mechanism is introduced, which is wide applied in various mobile environments. Then, the concept of security levels is proposed to describe the protection of communications with regard to the nature of security, i.e., information secrecy, data integrity, and resource availability. Third, traffic and mobility patterns are taken into account for quantitative analysis of QoS. Finally, we provide numerical results to demonstrate the impact of security levels, mobility and traffic patterns on overall system performance in terms of authentication cost, delay, and call dropping probability.}, number={2}, journal={COMPUTER NETWORKS}, author={Liang, W and Wang, WY}, year={2005}, month={Jun}, pages={267–288} }