Weimin Li

ORCID: 0000-0001-6514-7554
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Remote Desktop Technologies
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Caching and Content Delivery
  • Distributed and Parallel Computing Systems
  • Blockchain Technology Applications and Security
  • Wastewater Treatment and Nitrogen Removal
  • Advanced Computational Techniques and Applications
  • Industrial Technology and Control Systems
  • Parallel Computing and Optimization Techniques
  • Recommender Systems and Techniques
  • Data Mining Algorithms and Applications
  • Advanced Sensor Technologies Research
  • Simulation and Modeling Applications
  • Advanced Database Systems and Queries
  • Sensor Technology and Measurement Systems
  • Service-Oriented Architecture and Web Services
  • Wireless Networks and Protocols
  • Risk Perception and Management
  • Protist diversity and phylogeny
  • Radiation Effects in Electronics
  • Cryptography and Residue Arithmetic
  • Cancer-related molecular mechanisms research
  • Power Systems and Technologies
  • IPv6, Mobility, Handover, Networks, Security

Hunan University of Humanities, Science and Technology
2017-2024

China Academy of Launch Vehicle Technology
2023

Central South University
1998-2020

ZTE (China)
2020

China Mobile (China)
2020

Army Medical University
2007-2011

Shanxi Datong University
2009

Liaoning University of Technology
2006

Broadcom (United States)
2002

Sichuan Agricultural University
2002

Epstein-Barr virus (EBV) is a tumorigenic that can cause various human malignancies such as nasopharyngeal carcinoma (NPC) and gastric cancer (GC). EBV encodes 44 mature micro (mi)RNAs, mostly exhibiting oncogenic properties promoting progression. However, we have previously found one EBV-encoded miRNA, namely EBV-miR-BART6-3p, acts tumor suppressor by inhibiting metastasis invasion. Here, report EBV-miR-BART6-3p inhibits the proliferation of EBV-associated cancers, NPC, GC, targeting...

10.1096/fj.202000039rr article EN The FASEB Journal 2020-04-18

In recent years, the outbreak of numerous environmental risk incidents aroused widespread public concern about amplification mechanism in China. However, few studies have investigated influence path perception on behavioral responses Chinese context from a micro perspective. this article, we develop multidimensional model to responses, which aims investigate how public’s its different including radical behavior, behavior and protection behavior. A survey data General Social Survey 2013...

10.3390/ijerph16162856 article EN International Journal of Environmental Research and Public Health 2019-08-10

The edge computing service mode has entered the federation stage, where comprehensive resources are supported to collaborate between vertical cloud-edge and horizontal nodes. massive data processing poses a severe challenge traditional storage mechanism. In this paper, we propose an efficient resource collaboration model that leverages selection of collaborative nodes allocation among nodes, which can provide balanced services solutions. Specifically, selecting is multi-objective integer...

10.1109/tvt.2022.3179363 article EN IEEE Transactions on Vehicular Technology 2022-06-01

Quantum machine learning stands out as one of the most promising applications quantum computing, widely believed to possess potential advantages. In era noisy intermediate-scale quantum, scale and quality computers are limited, algorithms based on fault-tolerant computing paradigms cannot be experimentally verified in short term. The variational algorithm design paradigm can better adapt practical characteristics hardware is currently solutions. However, algorithms, due their highly...

10.3390/math12111627 article EN cc-by Mathematics 2024-05-22

The Internet of Things (IoT) has received a lot attention, especially in industrial scenarios. One the typical applications is intelligent mine, which actually constructs Six-Hedge underground systems with IoT platforms. Based on case study Six Systems metal this paper summarizes main challenges from aspects heterogeneity devices and resources, security, reliability, deployment maintenance costs. Then, novel resource service model for based Transparent Computing (TC) presented, supports...

10.3390/s18040981 article EN cc-by Sensors 2018-03-26

Systems that integrate distributed databases and existing blockchain platforms have recently emerged, which conveniently leverage their respective strengths to build efficient, secure, usable data sharing collaboration environments for different organizations. However, the performance of such systems can be limited by native due high latency transactions. In this paper, we present CoralDB, a bottom-up fully redesigned hybrid system database, aimed at enabling untrusted organizations...

10.1109/tmc.2024.3357499 article EN IEEE Transactions on Mobile Computing 2024-01-23

Wildlife re-identification (Re-ID) techniques are key to animal tracking and preservation. However, the performance of current deep learning methods is unsatisfactory in cross-camera scenarios, especially terms mean average precision (mAP). This work introduces ReDeformTR, a novel model designed for wildlife Re-ID tasks, particularly focusing on identification individual animals' images captured by different cameras. ReDeformTR integrates lightweight deformable transformer architecture...

10.1109/access.2024.3436813 article EN cc-by-nc-nd IEEE Access 2024-01-01

10.18429/jacow-ipac2018-thpmk121 article EN 9th Int. Particle Accelerator Conf. (IPAC'18), Vancouver, BC, Canada, April 29-May 4, 2018 2018-06-01

10.18429/jacow-ipac2017-wepab060 article EN 8th Int. Particle Accelerator Conf. (IPAC'17), Copenhagen, Denmark, 14–19 May, 2017 2017-05-01

Remembering software library components and mastering their application programming interfaces (APIs) is a daunting task for programmers, due to the sheer volume of available libraries. API completion tools, which predict subsequent APIs based on code context, are essential improving development efficiency. Existing techniques, however, face specific weaknesses that limit performance. Pattern-based methods rely statistical information excel in extracting common usage patterns sequences....

10.3390/electronics13183669 article EN Electronics 2024-09-15

Formal verification techniques attract great attention from industry because of their ability to discover subtle design errors where simulation fails. However, due the state explosion problem, formal usually cannot handle large designs. This paper introduces a semi-formal methodology in which and are tightly coupled. In this methodology, we apply verify few "difficult" block level The verified properties valid traces carried over random based system validation. These legal not only can new...

10.1109/icasic.2001.982491 article EN 2002-11-13

In recent years, social networking services and e-commerce have been developing rapidly. The research of recommending in service mainly focused on using the collaborative filtering algorithm. But algorithm had limitations data sparsity cold start. This paper presents a model TagIEA expert degree metrics context services, where tag information are integrated into comprehensive recommendation based can effectively mitigate problems start sparsity. Finally, this verifies effectiveness improved...

10.1504/ijcse.2017.10005744 article EN International Journal of Computational Science and Engineering 2017-01-01

The performance bottleneck of transparent computing (TC) is on the server side. Caching one key factors server-side performance. count disk input/output (I/O) can be reduced if multiple data blocks that are correlated with block currently accessed prefetched in advance. As a result, service and user experience quality TC improved. In this study, we propose caching strategy for side based relevance, which called correlation pattern-based (CPCS). method, adjust model frequent pattern tree...

10.3390/info9020042 article EN cc-by Information 2018-02-22

10.18429/jacow-ipac2016-thpmb022 article EN 7th International Particle Accelerator Conference (IPAC'16), Busan, Korea, May 8-13, 2016 2016-06-01

10.18429/jacow-ipac2017-thpab032 article EN 8th Int. Particle Accelerator Conf. (IPAC'17), Copenhagen, Denmark, 14–19 May, 2017 2017-05-01

In recent years, social networking services and e-commerce have been developing rapidly. The research of recommending in service mainly focused on using the collaborative filtering algorithm. But algorithm had limitations data sparsity cold start. This paper presents a model TagIEA expert degree metrics context services, where tag information are integrated into comprehensive recommendation based can effectively mitigate problems start sparsity. Finally, this verifies effectiveness improved...

10.1504/ijcse.2017.084684 article EN International Journal of Computational Science and Engineering 2017-01-01

The further integration of telecommunications and industry has been considerable is expected to bring significant benefits society economics. It also leads some evolution trends for next-generation communication systems, including rises in machine-type communications (MTC), uplink-dominated decentralized structures. However, the existing access protocols are not friendly these trends. This paper analyzes problems provides novel technologies solve them. These include contention-based NOMA,...

10.23919/ituk50268.2020.9303211 article EN 2020-12-07

In recent years, the maturity of cloud computing technology has greatly promoted wide application smart home. As key function home system, device management can not meet user's efficient and secure requirements only relying on platform. Therefore, this paper applies idea edge to field home, takes gateway near side as server, basis, constructs corresponding mechanism. The main work includes construction data centric discovery mechanism plug-in control mechanism, which provides an effective...

10.1109/icisce50968.2020.00232 article EN 2020-12-01
Coming Soon ...