Jia Liu

ORCID: 0000-0001-7081-1659
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed Control Multi-Agent Systems
  • Neural Networks Stability and Synchronization
  • Adaptive Control of Nonlinear Systems
  • Mobile Ad Hoc Networks
  • Wireless Networks and Protocols
  • Advanced Wireless Network Optimization
  • Advanced Memory and Neural Computing
  • Opportunistic and Delay-Tolerant Networks
  • Cooperative Communication and Network Coding
  • Software-Defined Networks and 5G
  • Neural Networks and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Wireless Communication Security Techniques
  • Brain Tumor Detection and Classification
  • Bluetooth and Wireless Communication Technologies
  • AI in cancer detection
  • Network Security and Intrusion Detection
  • Advanced Computational Techniques and Applications
  • Cultural Heritage Materials Analysis
  • User Authentication and Security Systems
  • Metaheuristic Optimization Algorithms Research
  • Pigment Synthesis and Properties
  • Quantum-Dot Cellular Automata
  • Iterative Methods for Nonlinear Equations
  • DNA and Biological Computing

State Grid Corporation of China (China)
2020-2021

Hunan Normal University
2014-2020

Tianjin University of Technology and Education
2013-2020

Beijing University of Posts and Telecommunications
2012-2018

Tianjin University
2007-2018

Changsha Normal University
2014

Jiangnan University
2014

Nankai University
2010-2013

Guilin University of Electronic Technology
2013

Nokia (China)
2012

In this letter, an analytical model is proposed for 3-channel-based neighbor discovery in Bluetooth Low Energy (BLE) networks. The can be used to determine some important performance metrics, such as average latency or energy consumption during the course of discovering neighbors. Since intermittent connections are frequently encountered practical scenarios BLE, modeling results provide a beneficial guidance customize advertising scanning behavior towards user desired performance.

10.1109/lcomm.2012.073112.120877 article EN IEEE Communications Letters 2012-08-03

Bluetooth Low Energy (BT LE) is a low power air interface technology recently released by the Special Interest Group SIG). As promising radio, BT LE realizes many designing features to fulfill foreseeable requirements of short range communication, such as fast device discovery, power-saving transmitting, encryption and authentication, etc. In this paper, we focus on modeling performance analyzing discovery process in networks. A general model for multi-channel proposed primarily, which then...

10.1109/glocom.2012.6503332 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2012-12-01

Abstract By numerical propagation of the coupled Gross-Pitaevskii equations, ground state phase a SU(3) spin-orbit Bose gas with nonlocal soft-core interactions has been investigated within all parameter space, showing strong dependence on strength coupling, interactions, spin-exchange and Rydberg blockade radius. More specially, we also perform detailed study interaction radius at point rotational symmetry breaking. Our results show that under combined effects such parameters, shows...

10.1088/1674-1056/adc36b article EN Chinese Physics B 2025-03-21

Journal Article Leader-following consensus of multi-agent systems with delayed impulsive control Get access Jia Liu, Liu School Science, Jiangnan University, Wuxi 214122, China Search for other works by this author on: Oxford Academic Google Scholar Liuxiao Guo, Guo * *Corresponding author: guo_liuxiao@126.com Manfeng Hu, Hu Zhenyuan Xu, Xu Yongqing Yang IMA Mathematical Control and Information, Volume 33, Issue 1, March 2016, Pages 137–146, https://doi.org/10.1093/imamci/dnu037 Published:...

10.1093/imamci/dnu037 article EN IMA Journal of Mathematical Control and Information 2014-10-21

The traditional IC card authentication method is single, once set, that can not be modified. In this paper, we propose an attack defense used to define the algorithm. set according user's own algorithm authentication. This paper supports divided into 8-byte packet and 16-byte length of two algorithms, certification specified by type complete in order achieve a certain security permissions need Operation authority certification. defense, which limit maximum number external key attempts ensure...

10.12783/dtetr/eeta2017/7750 article EN DEStech Transactions on Engineering and Technology Research 2017-04-21

This paper addresses relay selection(RS) and power allocation(PA) issues for a physical-layer network coding (PNC) based secondary user (SU) communication in cognitive radio networks, which two transceiver nodes exchange their information with the assistance of under interference threshold (IPT) constraints. We propose an optimal energy-efficient RS PA (OE-RS-PA) scheme to minimize total energy consumption per bit sum rate constraint IPT A closed-form solution allocation transmit among SU...

10.1109/vtcfall.2013.6692329 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2013-09-01

Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI

10.2139/ssrn.4676212 preprint EN 2024-01-01

10.1007/s11766-009-2092-5 article EN Applied mathematics/Applied Mathematics. A Journal of Chinese Universities/Gao-xiao yingyong shuxue xuebao 2009-09-01

Quasi-Newton (QN) methods are now widely used for NN training due to their high effectiveness. In practice, the iterative process of QN implemented in software is often very time-consuming. To accelerate process, floating-point BFGS-QN implementation has been realized on FPGA. By analyzing performance implementation, it found that updating inverse approximate Hessian matrix B most computation and memory intensive part. Therefore, a fixed-point hardware design proposed this paper. The...

10.1109/fpl.2018.00058 article EN 2018-08-01

The key technology of data fusion and mining in wireless sensor network has been addressed, then the tropical crop monitoring system based on is proposed, which can collect perception information from source node efficiently. To real-time monitor control within regional, knowledge technologies, such as timing associated, genetic classification, isolated points detection, have implemented system. Simulations show that reduce consumption energy extend lifetime.

10.1109/icinis.2012.19 article EN 2012-11-01

This paper combines the traditional output regulation (OR) theory with fuzzy identification method, and designs a distributed regulator for multi-agent system (MAS). In view of situation that follower model in MAS cannot be obtained accurately, is established to make it approximate considered nonlinear discrete agent first. By employing method OR theory, controller proposed, agents track reference signal given by dynamic leader. Two numerical examples demonstrate results.

10.1142/s0218001421590217 article EN International Journal of Pattern Recognition and Artificial Intelligence 2020-12-02
Coming Soon ...