Wei Wei

ORCID: 0000-0001-5149-6542
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Energy Efficient Wireless Sensor Networks
  • Robotics and Sensor-Based Localization
  • Internet Traffic Analysis and Secure E-voting
  • Infrared Target Detection Methodologies
  • Caching and Content Delivery
  • Indoor and Outdoor Localization Technologies
  • Calibration and Measurement Techniques
  • Software-Defined Networks and 5G
  • Advanced Computational Techniques and Applications
  • Target Tracking and Data Fusion in Sensor Networks
  • Cardiac electrophysiology and arrhythmias
  • Antenna Design and Analysis
  • Advanced Data Storage Technologies
  • Microwave Engineering and Waveguides
  • Distributed and Parallel Computing Systems
  • Advanced Measurement and Detection Methods
  • IoT and Edge/Fog Computing
  • ECG Monitoring and Analysis
  • Inertial Sensor and Navigation
  • Image and Object Detection Techniques
  • Mobile Ad Hoc Networks
  • Advanced Optical Network Technologies
  • Power Systems and Technologies

Guizhou Electric Power Design and Research Institute
2023-2024

Xi'an University of Technology
2015-2024

Shanghai Normal University
2024

Guangxi Zhuang Autonomous Region Health and Family Planning
2024

Guangdong Academy of Medical Sciences
2017-2023

Guangdong Provincial People's Hospital
2019-2023

Hefei Institutes of Physical Science
2023

Beijing Institute of Technology
2023

Haier Group (China)
2023

Southern Medical University
2023

Existing static grid resource scheduling algorithms, which are limited to minimizing the makespan, cannot meet needs of required by cloud computing. Current infrastructure solutions provide operational support at level only. When hardware resources form virtual pool, machines deployed for use transparently. Considering competing characteristics multi-tenant environments in computing, this paper proposes a allocation model based on an imperfect information Stackelberg game (CSAM-IISG) using...

10.1109/tsc.2016.2528246 article EN IEEE Transactions on Services Computing 2016-02-29

Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many have indicated that may put systems at risk. Severe resource constraints insufficient design are two major causes of problems applications. As an extension cloud, emerging edge computing with rich resources provides a new venue deploy novel solutions for Although there some research efforts this area, edge-based designs still its infancy. This...

10.1016/j.dcan.2019.08.006 article EN cc-by-nc-nd Digital Communications and Networks 2019-09-06

Due to the development of computer vision, machine learning, and deep learning technologies, research community focuses not only on traditional SLAM problems, such as geometric mapping localization, but also semantic SLAM. In this paper, we propose a Semantic system which builds maps with object-level entities, it is integrated into RGB-D framework. The combines object detection module that realized by deep-learning method, localization seamlessly. proposed system, used perform recognition,...

10.1109/access.2018.2873617 article EN cc-by-nc-nd IEEE Access 2018-01-01

DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets victim. But most current DRDoS detection mechanisms are associated specific protocols and cannot be used for unknown protocols. It is found that because being stimulated by same attacking flow, responsive flows from reflectors have inherent...

10.1109/lcomm.2012.121912.122257 article EN IEEE Communications Letters 2013-01-01

Concentrating on the influence of DDoS applied to ad hoc networks, we introduced three classic queue management algorithms: Drop-Tail, random early detection (RED), and exponential marking (REM). We analyzed compared defensive abilities these algorithms networks with NS2 under attack. The results showed that active algorithms, such as REM RED, exhibited stronger than passive algorithm Drop-Tail medium- small-scale attacks; however, large-scale attack, all insufficient capabilities. This...

10.1109/access.2017.2681684 article EN cc-by-nc-nd IEEE Access 2017-01-01

Electrocardiogram (ECG) signal is a direct and effective way to find cardiovascular disease timely, which can intuitively reflect changes of the heart beat activities different parts. Due noise interference from surroundings, acquisition real-time high-quality ECG big challenge for portable mobile medical systems. Integer coefficients infinite impulse response (IIR) digital filter suitable platform, but it will be little bit distortion. So, an improved integer IIR monitors presented in this...

10.1109/access.2016.2612222 article EN cc-by-nc-nd IEEE Access 2016-10-26

With the development of e-commerce, a large amount personalized information is produced daily. To utilize diverse to improve recommendation accuracy, we propose hybrid model based on users' ratings, reviews, and social data. Our consists six steps, review transformation, feature generation, community detection, training, blending, prediction evaluation. Three groups experiments are performed in this paper. Experiments A used identify regression algorithm our model, B analyze texts detect...

10.1109/access.2019.2897586 article EN cc-by-nc-nd IEEE Access 2019-01-01

Coverage is one of the important performance indexes in wireless sensor networks. When target covered by k degrees sensor, more redundant data are generated, which may lead to network congestion, thus reducing communication and coverage leading a rapid depletion energy. Therefore, this paper presents an energy balance control algorithm for overlay model based on node position relations. Areas given analysis model. In terms consumption, nodes with low consumption scheduled proportion expected...

10.1109/access.2017.2682845 article EN cc-by-nc-nd IEEE Access 2017-03-20

In order to simultaneously power and cool hundreds of thousands servers, large-scale data centers usually consume several tens megawatts electricity. This enormous electricity consumption leads considerable concerns in the cost including both bills carbon tax. To achieve a sustainable center, many Internet service providers begin build their own on-site renewable energy plants help reduce cost. However, considering performance constraint delay tolerant workloads lack future information about...

10.1109/tsusc.2017.2711925 article EN IEEE Transactions on Sustainable Computing 2017-04-01

We present a method for the removal of movement artifacts from recordings electroencephalography (EEG) signals in context sports health. use smart wearable Internet Things-based signal recording system to record physiological human [EEG, electrocardiography (ECG)] real time. Then, are removed using ECG as reference and baseline estimation denoising with sparsity (BEADS) filter algorithm trend removal. The parameters (cut-off frequency) BEADS optimized respect number QRS complexes detected...

10.1109/access.2018.2890335 article EN cc-by-nc-nd IEEE Access 2019-01-01

As an important part of intrusion detection, feature selection plays a significant role in improving the performance detection. Krill herd (KH) algorithm is efficient swarm intelligence with excellent data mining. To solve problem low efficiency and high false positive rate detection caused by increasing high-dimensional data, improved krill based on linear nearest neighbor lasso step (LNNLS-KH) proposed for network The number selected features classification accuracy are introduced into...

10.1155/2021/8830431 article EN cc-by Security and Communication Networks 2021-01-06

Background: Catheter ablation (CA) is an important treatment strategy to reduce the burden and complications of atrial fibrillation (AF). This study aims predict risk recurrence in patients with paroxysmal AF (pAF) after CA by artificial intelligence (AI)-enabled electrocardiography (ECG) algorithm. Methods Results: 1618 ≥ 18 years old pAF who underwent Guangdong Provincial People's Hospital from 1 January 2012 31 May 2019 were enrolled this study. All pulmonary vein isolation (PVI)...

10.3390/jcm12051933 article EN Journal of Clinical Medicine 2023-03-01

Virtual machine (VM) consolidation techniques are a means to improve energy efficiency and the utilization of cloud data center resources. However, aggressive VM approaches lead physical host over-utilization generate massive undesired migrations, which cause degradation performance both hosts VM. Additionally, it has been significant challenge resource in while delivering services with guaranteed quality service (QoS). To address problem, we propose an enhancing energy-efficient QoS dynamic...

10.1109/access.2018.2835670 article EN cc-by-nc-nd IEEE Access 2018-01-01

Underwater target tracking system can be kept covert using the bearing-only or bearing-Doppler measurements (passive measurements), which will reduce risk of been detected. According to characteristics underwater tracking, square root unscented Kalman filter (SRUKF) algorithm, is based on Bayesian theory, was applied and non-maneuverable problem. Aiming at shortcomings (UKF), SRUKF uses QR decomposition Cholesky factor updating, in order avoid that process noise covariance matrix loses its...

10.3390/e21080740 article EN cc-by Entropy 2019-07-28

City governments prioritize mobility in urban planning and policy. Greater a city leads to happier citizens. Although enhanced is helpful, it comes with costs, notably terms of climate change. Transportation systems that enable often emit greenhouse gases. Cities must digital carbon footprint awareness. may reduce the environmental impact while keeping its benefits by close monitoring reducing technologies like transportation applications, ride-sharing platforms, smart traffic control...

10.1016/j.asoc.2023.111136 article EN cc-by Applied Soft Computing 2023-12-20
Coming Soon ...