Yi Yin

ORCID: 0000-0002-4359-916X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Packet Processing and Optimization
  • Network Security and Intrusion Detection
  • HIV, Drug Use, Sexual Risk
  • Internet Traffic Analysis and Secure E-voting
  • HIV/AIDS Research and Interventions
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • HIV/AIDS drug development and treatment
  • Adolescent Sexual and Reproductive Health
  • Caching and Content Delivery
  • Interconnection Networks and Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Retinal Imaging and Analysis
  • Mobile Agent-Based Network Management
  • Natural Language Processing Techniques
  • Neurosurgical Procedures and Complications
  • Peer-to-Peer Network Technologies
  • Glaucoma and retinal disorders
  • Network Time Synchronization Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Artificial Immune Systems Applications
  • Regional Economic and Spatial Analysis
  • Advanced Data Compression Techniques
  • Advanced Optical Network Technologies
  • Power Line Communications and Noise

Nanjing Normal University
2010-2024

Nanjing Medical University
2021-2022

The University of Sydney
2019

Southeast University
2017

Wuhan University of Science and Technology
2008-2011

Oral pre-exposure prophylaxis (PrEP) and antiretroviral therapy (ART) can effectively prevent HIV infections among men who have sex with (MSM), but the emergence transmission of drug-resistance (HIVDR) may compromise their benefits. The costs benefits expanding PrEP ART coverage in presence HIVDR China remain unknown.We developed a comprehensive dynamic model incorporating transmitted (TDR) acquired (ADR) drug resistance. was calibrated by surveillance data from 2009 to 2019 MSM Jiangsu...

10.1016/j.lanwpc.2022.100462 article EN cc-by-nc-nd The Lancet Regional Health - Western Pacific 2022-05-03

Purpose: To establish an accurate risk prediction model of diabetic retinopathy (DR) using cost effective and easily available patients' characteristics clinical biomarkers. Patients Methods: Totally 18,904 cases diagnosed type 2 diabetes mellitus (T2DM) were collected, among which 13,980 selected after quality screening. The least absolute shrinkage selection operator (LASSO) regression models used for univariate analysis factors selection, the multi-factor logistic was to model....

10.2147/dmso.s354611 article EN cc-by-nc Diabetes Metabolic Syndrome and Obesity 2022-04-01

Abstract Objective To predict the trend of AIDS in specific age groups and to determine objective population for screening, this study explored three transmission routes characterized each patient group using APC model based on whole, local, immigrant populations Zhejiang, China. Methods The data recruited paper was obtained from national Comprehensive Prevention Control Information System - Antiviral Therapy Management database Chinese Disease Statistical Yearbook An used estimate impact...

10.1186/s12889-021-11050-x article EN cc-by BMC Public Health 2021-06-05

With rapid increase in the use of traffic-intensive applications, approaches that improve users experience by reducing delay are recently receiving enormous attention. Caching Device-to-Device (D2D) networks, particular, is considered as an effective technique to service quality network. In this paper, agglomerative hierarchical clustering algorithm proposed for a cache-assisted D2D communication The considers preferences and groups them into same cluster based on similarity their requested...

10.1109/ccnc.2019.8651785 article EN 2019-01-01

Firewalls play a vitally important role to network security. Packet filtering in firewall either accepts or denies packets based upon set of pre-defined rules called policy. Management policy is boring task and always prone error. There have been lot analysis methods for anomalies detection IPv4 But, the reason enormous address space, these could not be used deal with IPv6 directly, low effectiveness. In this work, we propose method by using formal that can analyze inclusion relations...

10.1109/hpcc/smartcity/dss.2019.00241 article EN 2019-08-01

<abstract><p>This paper elucidates that the AIDS/HIV incidence rate differences exist among different population and regions, especially old college students. Due to effect of age, AIDS peak in males aged 20–35 years 50 both Chongqing Shenzhen, increasing spread was higher than females under period effect. In local over 40, below whole age groups are predicted increase sharply future six years, while females, rates 40-year-old were as well. The homosexually transmitted patients...

10.3934/mbe.2021346 article EN cc-by Mathematical Biosciences & Engineering 2021-01-01

Varicella (chickenpox) is highly contagious among children and frequently breaks out in schools. In this study, we developed a dynamic compartment model to explore the optimal schedule for varicella vaccination Jiangsu Province, China. A susceptible-infected-recovered (SIR) was proposed simulate transmission of different age groups. The basic reproduction number computed by kinetic model, impact three prevention factors assessed through global sensitivity analysis. Finally, effect various...

10.3390/tropicalmed8010017 article EN cc-by Tropical Medicine and Infectious Disease 2022-12-27

To establish a machine learning model for identifying patients coinfected with hepatitis B virus (HBV) and human immunodeficiency (HIV) through two sexual transmission routes in Jiangsu, China.A total of 14197 HIV cases transmitted by homosexual heterosexual were recruited. After data processing, 12469 (HIV HBV, 1033; HIV, 11436) left further analysis, including 7849 4620 transmission. Univariate logistic regression was used to select variables significant P value odds ratio multivariable...

10.1155/2021/6696041 article EN cc-by BioMed Research International 2021-03-29

10.1109/icsip61881.2024.10671495 article EN 2022 7th International Conference on Signal and Image Processing (ICSIP) 2024-07-12

Packet filtering in firewall either accepts or denies network packets based upon a set of pre-defined filters called policy. Firewall policy is designed under the instruction security A generic document that outlines needs for computer access permissions. And it determines how are designed. If inconsistencies, such as redundant filters, insufficient contradict exist between and policy, could not filter exactly, protected by will be affected. To resolve this problem, we propose an...

10.1109/ic-nc.2010.45 article EN 2010-11-01

Firewalls have been a very important secure tool to protect networks against attacks, which usually filter the unauthorized traffic entering secured network. The packet filtering based on predefined collection of ordered rules. Along with IPv6 protocol is widely used, and security issues comes it. Firewall for network, as an element network security, it will be not able packets correctly if there are conflicts that caused by same matching two or more In addition, new kind firewall time...

10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00069 article EN 2019-12-01

Snort is the most popular Intrusion Detection Systems (IDS). It will generate alert messages when an arrival packet matches some of pre-defined rules. has problems as follows: it tries matching for all rules even never in case other rules, and provides contradictory redundant a set erroneous poorly-organized given. This paper proposes method characterizing relations between towards solutions above problems. The proposed calculates topological based on theory.

10.1109/candar.2014.58 article EN 2014-12-01

Available bandwidth estimation is useful for route selection in overlay networks, QoS, and traffic engineer-ing. Many measurement algorithms, such as Pathload, Pathchar, Packet Transmission Rate (PTR) method, etc. have been proposed. PTR method sends a sequence of packet trains to characterize the interac-tion between probing packets competing traffic, uses average rate train an estimate available bandwidth. However, this algorithm does not fully consider situation that detection lost...

10.4236/ijcns.2009.28086 article EN cc-by International Journal of Communications Network and System Sciences 2009-01-01

Background: Oral pre-exposure prophylaxis (PrEP) and antiretroviral therapy (ART) can effectively prevent HIV infections among men who have sex with (MSM), but the emergence transmission of drug-resistance (HIVDR) may compromise their benefits. The costs benefits expanding PrEP ART coverage in presence HIVDR China remain unknown.Methods: We developed a comprehensive dynamic model incorporating transmitted (TDR) acquired (ADR) drug resistance. was calibrated by surveillance data from 2009 to...

10.2139/ssrn.3950264 article EN SSRN Electronic Journal 2021-01-01

Input-queued scheduling algorithms are designed to improve the throughput which use input and output terminal in router obtain maximum packets. And length of queue is an important target, that can decides superiority-inferiority about capability algorithm. With existing algorithms, main content algorithm ensuring packets' high priority low level. But most these do not consider queue. In this paper, we change when packets enter channel at router, put forward a shortest time-slot adapting...

10.1109/icinis.2009.113 article EN 2009-11-01

Objective To identify independent risk factor(s) in deaths of patients with primary brainstem hemorrhage. Methods A total 132 hemorrhage (survival 88 cases and death 44 cases) were retrospectively enrolled into this study who admitted to Department Neurosurgery, Southwest Hospital, Army Medical University from January 2000 December 2016. Chi-square test for age, sex, medical history, vital signs at admission or the rank sum hematoma volume was performed between two groups affecting...

10.3760/cma.j.issn.1001-2346.2019.06.010 article EN Zhonghua shenjing waike zazhi 2019-06-28

Firewall is the first defense line for network security. Packet filtering a basic function in firewall, which filter packets according to series of rules called firewall policy. The design policy invariably under instruction security policy, generic guideline that lists needs access permissions. should observe regulations However, even IPv4 it extremely difficult keep consistency between and Some decision methods were proposed. address space IPv6 very large, existing can not be directly used...

10.1109/icicsp54369.2021.9611983 article EN 2021-09-24

As the network service have been increased fleetly, packets in conversion process are not resolved forward direction by uncontrolled situation. That means traditional single-hop routing has satisfied increasing of applications. Therefore, based on multi-hop mechanism, a distinguish queuing which product forwarding control mechanism could be propounded this paper. This can use coordination scheduling with single output port, and method match distributed dynamic matching. The simulation...

10.1109/icist.2011.5765156 article EN International Conference on Information Science and Technology 2011-03-01

360-degree video has been steadily gaining popularity in recent years for its ability to offer users a more immersive viewing experience. However, streaming over the current best-effort Internet with single network path poses challenges meeting high bandwidth and low motion-to-photon (MTP) delay requirements.This paper addresses these by advocating adoption of multi-path (multiple access network) approaches enhance performance streaming. The proposed solution introduces scheduling algorithm,...

10.1109/cbd63341.2023.00042 article EN 2023-12-18

TCP-shape algorithm is used to control the network congestion and regulate transmission rate of packets based on available bandwidth. The sends dummy probes detect background flow obtains status with return value. But cannot consider some relationship between probe. This paper improves algorithm. First, we adjust probe's sending time record probe number. Second, match number gap source destination resolve problem lost. Finally, do experiments compare improved value can be observed favorably,...

10.1109/ebiss.2009.5137968 article EN 2009-05-01
Coming Soon ...